Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

疑似“海莲花”组织早期针对国内高校的攻击活动分析

背景 360威胁情报中心近期发现了“海莲花”组织使用的新的CVE-2017-11882漏洞文档,通过对该漏洞文档及相关攻击活动的分析,我们关联到该组织近期针对南亚国家的攻击活动。并且发现了疑似“海莲花”组织在2017年5月初针对国内实施的一次集中式的攻击活动,结合内部的威胁情报数据,我们认为这是该组织利用“永恒之蓝”漏洞实施的一轮重点针对国内高校的攻击活动。...

View Article


It took hackers just 22 lines of code to steal British Airways’ customer data

Last week, British Airways acknowledged that its website had been hacked leading to380,000 customers‘data being compromised. It seems like it wasn’t too difficult either: Cybersecurity firm RiskIQ has...

View Article


Image may be NSFW.
Clik here to view.

看看深信服的下一代终端安全产品:EDR

资深一些的安全从业者都知道,传统的网络边界安全产品,如果没有终端安全的配合,一旦被突破,防御系统便无能为力。而且,即使安装了杀毒软件,也很难抵御病毒变种或未知恶意软件。而较为落后的防护体系,各种设备、工具各司其职,呈分散状态,无法有效联动,不能形成整体化的能够及时响应的有效防护体系。EDR(终端检测与响应)的概念就是基于以上问题而诞生的。...

View Article

Image may be NSFW.
Clik here to view.

IoT Technology Market Growing Steadily, But Privacy and Security Concerns...

Add to favorites The number of smart speakers/home assistants has doubled and seems to be powering ownership of other devices, but the appeal of the smart home in general has stagnated Ownership of...

View Article

Security Vulnerability in Smart Electric Outlets

A security vulnerability in Belkin's Wemo Insight "smartplugs" allows hackers to not only take over the plug, but use it as a jumping-off point to attack everything else on the network. From the...

View Article


Image may be NSFW.
Clik here to view.

Why We Need Dynamic Secrets

Secret management is one of the core use cases for Vault. Today, many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management...

View Article

Image may be NSFW.
Clik here to view.

Is Huawei a Genuine Security Threat?

Huawei is the second-largest smartphones manufacturer in the world, recently beating Apple to second place, with the Chinese company selling over 10% of all the world’s smartphones. Yet its devices are...

View Article

网络黑灰产业亟待依法共治

2017年我国网络安全产业规模为450多亿元,而黑灰产业已达千亿元规模,黑灰产业比安全产业发展得更为迅速上述一组数据来自阿里联合南方都市报发布的《2018网络黑灰产治理研究报告》,该报告于8月21日在2018网络安全生态峰会发布。《报告》建议,应构建政企多方联合机制,共筑安全“防火墙”。...

View Article


Image may be NSFW.
Clik here to view.

当资本运作遇到网络安全:尽调该怎么做?

作者:冯坚坚 袁立志 近期,某新三板挂牌公司(“A公司”)的涉嫌非法窃取巨量用户信息的新闻同时引起了网络安全与数据合规律师和资本市场律师的高度关注。前者的关注点不难理解,而资本市场律师的关注点则在于,在投融资、并购重组、挂牌上市等资本运作项目中如何进行网络安全与数据合规的尽职调查,律师如何做才能最大程度地发现风险,并证明其尽职。...

View Article


NCSC issues core questions to help boards assess cyber risk

Ciaran Martin, the CEO of the National Cyber Security Centre (NCSC), has issued five core questions boards should ask their security teams as part of a set of guidelines aimed at assessing cyber risk....

View Article

Information Security Monthly Newsletter Sep 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news...

View Article

Image may be NSFW.
Clik here to view.

In the Know: Present and Future of Artificial Intelligence in Security

You’ve seen that movie, the one where humans fabricate robots that are so human-like they end up taking over the world. What was once the plot line for every other sci-fi film is now leaking into the...

View Article

The MSP Guide to Building Your Managed Security Services: Defining and...

Managed security services provide a great way to deliver the protection that today’s small and medium businesses (SMBs) require while providing an opportunity to differentiate and grow your business...

View Article


Image may be NSFW.
Clik here to view.

BITKER区块链百科全书 第五章:区块链加密技术

BITKER 区块链百科全书:写给币圈人看的区块链科普书,从这里开启区块链世界的大门。 在区块链网络中,数字货币和区块链应用最广泛的就是非对称加密技术。正是非对称加密技术的运用,使得区块链网络有众多的节点的矿工均可实现收款、付款。同时网络的节点和区块可以无数多,网络的点对点支付成为可能,是区块链技术不可获缺的技术。那么,非对称加密技术,具体是什么呢? 非对称加密及解密过程...

View Article

DDoS Attacks Almost Five Times More Powerful Because of IoT Botnets

In a report published today, the NexusGuard cloud-based distributed denial of service (DDoS) security solution provider details their analysis of the evolution of DDoS attacks during 2018 Q2 and makes...

View Article


Hackers clone Tesla Model S key fob in 2 seconds to steal car

Feeling reckless and looking for something new to do with your Raspberry Pi? Using a Raspberry Pi 3 Model B+ , Proxmark3 , Yard Stick One , and a USB battery pack, Belgium researchers needed less than...

View Article

That British Airways breach shows hackers fine-tuning e-commerce attacks

The British Airways data breach is proof that hackers are getting more and more sophisticated. It took only 22 lines of code for the hackers to break into user data of the UK’s largest airline and...

View Article


Varonis DataPrivilege and RSA Identity Governance and Lifecycle

We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA Identity Governance and Lifecycle , with a new Implementation Blueprint. This Implementation Blueprint will help the...

View Article

Osiris Banking Trojan Displays Modern Malware Innovation

Osiris’ fundamental makeup positions it in the fore of malware trends, despite being based on old source code that’s been knocking around for years. After staying dormant for few years, the Kronos...

View Article

Image may be NSFW.
Clik here to view.

Explore Two Variables Using R

This article is in continuation of the Exploratory Data Analysis in R ― One Variable , where we discussed EDA of pseudo facebook dataset. In this article, we will learn about data aggregation,...

View Article
Browsing all 12749 articles
Browse latest View live