Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

网络安全市场“大事不断”如何寻找产业链投资机会?

9月4日至6日,亚太地区规格最高、规模最大、影响力最深远的安全盛会――2018 ISC互联网安全大会在北京国家会议中心隆重开幕。在此次ISC互联网安全大会上,上百名中外互联网安全专家汇聚一堂,探讨数字化转型时代新技术对网络安全带来的挑战,呼吁全球联手重构网络安全。 2013年至今,ISC 互联网安全大会已经举办六届,逐步发展成为全球网络安全行业的风向标。 网络安全市场“大事不断”...

View Article


Image may be NSFW.
Clik here to view.

New cold boot attack affects "nearly all modern computers"

Security researchers will detail today a new variation of a cold boot attack that can meddle with a computer's firmware to disable security measures and allow an attacker to recover sensitive data...

View Article

Image may be NSFW.
Clik here to view.

5 AI Technologies You’re Already Using

When people think about artificial technologies, many fear that “Skynet” will eventually control their lives. Relax, the terminator isn’t real and no-ones out to get you, so keep your paranoia under...

View Article

Image may be NSFW.
Clik here to view.

警惕:网络犯罪分子利用Jaxx钱包用户进行网络钓鱼

2018-09-13 20:45 技术 观点 2159 收藏 至少一个星期,Jaxx加密货币钱包网站有一个欺诈版本,提供恶意链接诱骗用户泄露保护虚拟资金的备份短语。 虽然网络钓鱼仍然是基于恶意软件基于电子邮件的攻击中的普遍威胁,但网络犯罪分子通过添加模拟组件方法来提高其成功率。...

View Article

Wanted: Data breach risk ratings, because not all breaches are equal

I recently downloaded every known, recordeddata breach by the Privacy Rights Clearinghouse , which has been the most thorough and stalwart public recorder of data breaches in the United States for...

View Article


What is Vulnerability Management Anyway?

Vulnerability management (VM) programs are the meat and potatoes of every comprehensive information security program. They are not optional anymore. In fact, many information security compliance,...

View Article

Image may be NSFW.
Clik here to view.

CDK Global and Nuspire Safeguard Automotive Dealerships With New Network...

Solution provides dealerships with 24/7 security protection to prevent hacking incidents and keep customer information safe and secure HOFFMAN ESTATES, Ill. & COMMERCE, Mich. (BUSINESS WIRE) CDK...

View Article

British Airways Site Infected with Card Skimming Code

Security researchers believe the recent data breach announced by British Airways was the result of malicious code being injected into the company’s website to steal information from payment forms....

View Article


Image may be NSFW.
Clik here to view.

腾讯手机管家同步支持一键举报骚扰电话/短信

北京时间9月13日凌晨1点,2018苹果秋季发布会在乔布斯剧院进行。发布会上,库克向全球果粉揭晓了今年的三款新手机:iPhone XS、iPhone XS Max和iPhone XR,并宣布全新iOS...

View Article


Most Modern Computers Vulnerable to Cross-Platform Cold Boot Attack

In a presentation during the SEC-T security/hacking conference taking place in Stockholm, Sweden, F-Secure researchers Olle Segerdahl and Pasi Saarinen detailed how attackers can use a firmware...

View Article

Image may be NSFW.
Clik here to view.

Industrial Internet of Things Held Back by Mistrust and Poor Connectivity

Add to favorites Forty percent of companies don’t have trust in their employees when it comes to IIoT-generated data Industry is struggling to extract insightful and relevant real-time data from...

View Article

Kernel Level Memory Corruption Discovered in macOS Webroot SecureAnywhere

Trustwave SpiderLabs' security research team unveiled aWebroot SecureAnywhere vulnerability which allows attackers to run malicious code inlocal kernel mode code. According to the advisory, the Webroot...

View Article

Image may be NSFW.
Clik here to view.

Application Security Mistake No. 5: Lack of Buy-In

We’ve been in the application security business for more than 10 years, and we’ve learned a lot in that time about what works, and what doesn’t. This is the fifth in a blog series that takes a look at...

View Article


Image may be NSFW.
Clik here to view.

【安全帮】当心! 物联网僵尸网络 Mirai 和 Gafgyt 瞄上了企业

摘要: 美国情报机构怀疑俄罗斯使用微波武器攻击其古巴中国外交官去年 8 月和今年 5 月,美国报告其驻古巴和中国的外交官出现头晕恶心等症状,怀疑他们遭到了声波攻击。 现在美国认为外交官们更可能遭到微波攻击。本月初,《纽约时报》报道称,一个医疗小组检查了在古巴受影响的 ... 美国情报机构怀疑俄罗斯使用微波武器攻击其古巴中国外交官 去年 8 月和今年 5...

View Article

Image may be NSFW.
Clik here to view.

美国政府问责局:黑客如何偷走Equifax 1.455亿用户数据?

美国政府问责局(简称 GAO)发布一份 最新报告 ,披露了大量关于 Equifax (美国三大个人信用评估机构之一) 黑客攻击的详细信息,并且披露了导致数据泄露的多个因素。 事件回顾 Equifax 公司黑客入侵事件发生在2017年5月,共导致 1.455亿 用户信息暴露,黑客得以访问到姓名、社保号码、出生日期、居住地址甚至是一部分民众的驾驶证件号码与信用卡号码。 Struts...

View Article


Image may be NSFW.
Clik here to view.

SCADA漏洞上半年翻番 可能由“踩点”转为发动破坏性攻击

从伊朗的震网到乌克兰的停电,这类针对数据采集和监视控制系统(Supervisory Control And Data Acquisition,以下简称SCADA系统)的威胁,让我们清楚地认识到,其对关键基础设施的危害。 可以说, 世界上各种关键的基础设施部门都有SCADA系统运行,因此对攻击者极具吸引力...

View Article

贡献三大高危漏洞 腾讯安全获“微软补丁日”公开致谢

北京时间9月12日,微软例行发布月度安全更新,修复了腾讯安全科恩实验室提交的三个高危漏洞,并对其公开致谢。 根据微软官网公告显示,这三个漏洞均来自腾讯安全科恩实验室安全研究员Peter Hlavaty提报,分别为两个Hyper-V漏洞(CVE-2018-8436、CVE-2018-8437)和一个SMB漏洞(CVE-2018-8335)。 值得关注的是,Peter...

View Article


Image may be NSFW.
Clik here to view.

3种方法保护遗留基础设施安全

众所周知,遗留设备(Legacy)仍将继续在关键基础设施的持续性和稳定性方面起到重要作用,尤其是在工业控制系统(ICS)中。数字政府中心最近的一次调查研究发现, 70% 的受访机构依赖遗留基础设施维持运转。 德勤会计师事务所和MAPI的另一份报告《先进制造中的网络风险》,强调了保护遗留控制系统的重要性。报告显示,现代工业控制系统比其前辈容易保护得多。对 200 多家制造企业的调查发现,过去一年里,...

View Article

Image may be NSFW.
Clik here to view.

Windows平台下实现提权的新姿势

在这篇文章中,我们将给大家演示如何通过无引号服务路径来实现在windows平台下的提权。在渗透测试的过程中,当我们以本地用户身份生成命令Shell时,我们是无法检查受限文件或目录的,因此我们才需要拿到管理员访问权。 无引号服务路径漏洞 这个漏洞跟可执行文件的路径有关,如果文件名中存在空格,或者文件路径没有包裹在双引号之中,那攻击者就可以用恶意exe文件替换掉原本合法的exe文件,并实现提权。...

View Article

Image may be NSFW.
Clik here to view.

ecshop 全系列版本网站漏洞 远程代码执行sql注入漏洞

ecshop漏洞于2018年9月12日被某安全组织披露爆出,该漏洞受影响范围较广,ecshop2.73版本以及目前最新的3.0、3.6、4.0版本都受此次ecshop漏洞的影响,主要漏洞是利用远程代码执行sql注入语句漏洞,导致可以插入sql查询代码以及写入代码到网站服务器里,严重的可以直接获取服务器的管理员权限,甚至有些网站使用的是虚拟主机,可以直接获取网站ftp的权限,该漏洞POC已公开,使用简...

View Article
Browsing all 12749 articles
Browse latest View live