Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

猫池等黑产工具首次曝光 阿里携创新技术亮相2018国家网络安全宣传周

摘要: 阿里巴巴首席风险官郑俊芳认为,保障网络安全的前提是保护好数据安全,这需要创新安全新技术、新机制,新理念,以解决网络通讯诈骗等一系列社会问题。 同时操控16张电话卡进行虚假注册的猫池,成本不足百元却能悄无声息偷走你手机短信的“2G短信嗅探设备”……9月17日,2018国家网络安全宣传周――网络安全博览会揭幕,阿里巴巴展馆首次曝光的黑灰产作案工具一经亮相,便成为关注焦点。...

View Article


Image may be NSFW.
Clik here to view.

国信证券:全方位构建可信企业移动安全支撑平台

文 / 国信证券股份有限公司 杨阳 吕斌 张梦龙 关朝辉...

View Article


Image may be NSFW.
Clik here to view.

ThreatConnect Research Reports Successful Threat Intelligence Programmes...

Organisations say protecting client information is the highest priority LONDON (BUSINESS WIRE) ThreatConnect, Inc., provider of the industry’s only extensible, intelligence-driven security platform,...

View Article

Image may be NSFW.
Clik here to view.

Be your own bank! VivusPay is just the first taste of the Optherium Ecosystem

In our global world, payments are made routinely across continents, but they can be slow, incur large commissions for conversion and handling, and be vulnerable to hacking. Our personal information...

View Article

Image may be NSFW.
Clik here to view.

The Dangerous State of IoT Security

The Dangerous State of IoTSecurity n September 2015, a nationwide warning was released to the public straight from the FBI headquarters. Acting as a warning of the dangers of IoT devices, this warning...

View Article


Image may be NSFW.
Clik here to view.

Why a Backdoor Is a Threat to Our Security.

In regular intervals, Politicians demand that companies add backdoors to their end-to-end encrypted cloud services to enable law enforcements to easier persecute criminals. This demand ignores that any...

View Article

Image may be NSFW.
Clik here to view.

2018国家网络安全宣传周正式开幕 亚信安全“网络空间平安城市”助力新时代网络强国梦

9月17日-23日,2018年国家网络安全宣传周在成都正式拉开帷幕。亚信安全积极响应“网络安全为人民,网络安全靠人民”的号召,以“联动聚力...

View Article

Understanding the Importance of Cybersecurity in Retail

Ready to learn Cybersecurity?Browse courseslike Cyber Security for the IoT developed by industry thought leaders and Experfy in Harvard Innovation Lab. Keeping the business, employees and customers...

View Article


Image may be NSFW.
Clik here to view.

谭晓生:安全大脑让网络安全“既见树木,更见森林”

“大安全时代, 安全问题变得牵一发而动全身,如果我们只是单点防御,那就是只见树木、不见森林。” 9月17日上午,在成都举办的“2018国家网络安全宣传周安全博览会新闻发布会”上,360集团技术总裁、首席安全官谭晓生表示:当下网络安全已进入“大安全”时代,需要以“360安全大脑”构建大安全时代的整体防御策略体系。 360集团技术总裁、首席安全官谭晓生...

View Article


Image may be NSFW.
Clik here to view.

The 7 Habits of Highly Effective Security Teams

Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected. Worldwide spending on digital transformation technologies is expected to...

View Article

Unikeys launches Ukey card to store cryptocurrencies in a familiar form factor

We’re still at the beginning of the blockchain and crypto journey, and making it easier to store and use cryptocurrencies through common platforms and devices will be essential to mainstream adoption....

View Article

Image may be NSFW.
Clik here to view.

4 Vital Ways Enterprise SSO Saves Your Employees Time and Provides Peace of Mind

Leading up to the 2016 U.S. presidential election, Russian hackers allegedly attacked the Hillary Clinton campaign and the Democratic National Committee with spear-phishing efforts to trick users into...

View Article

Image may be NSFW.
Clik here to view.

Renesas to Buy IDT, Expand Product Portfolio

Renesas this month has announced plans to acquire IDT, making the move as part of a larger bid to expand its product portfolio with IDT's analog mixed-signal capabilities. The takeover will enable...

View Article


IPv6 Will Bring Security Threats: What You Need to Know to be Prepared

It is no secret that the proliferation of connected devices has exhausted IPv4 addresses. This was first forecasted and examined in the 1980s, and has been in the process of being fulfilled since 2011....

View Article

Image may be NSFW.
Clik here to view.

The lifestyle of a black hat hacker

Imagine for a moment, just hypothetically, that you are one of those cybercriminals whose shenanigans are hitting the headlines day by day. Let’s try and dream up this fictional scenario. Before you...

View Article


Critical Peekaboo Vulnerability Gives Attackers Access to CCTV Cameras

Tenable Research disclosed a pair of vulnerabilities in NUUO's Video Recorder Software which allow attackers to execute code remotely in NUUO-based IoT video surveillance systems, giving access to...

View Article

Image may be NSFW.
Clik here to view.

NUUO, do not want! CCTV webcams can be hacked to spy on you

Researchers have uncovered two flaws that leave more than 100,000 NUUO-branded internet-connected surveillance cameras open to remote takeover. Tenable Research on Monday laid claim to discovering two...

View Article


Explainer Series: RDaaS Security and Managing Compliance Through Database...

As organizations move to cloud database platforms they shouldn’t forget that data security and compliance requirements remain an obligation. This article explains how you can apply database audit and...

View Article

Can Blockchain Security Safeguard IoT? Maybe. Maybe Not.

According to a well-known cyber slogan, complexity is the enemy of security . So why is it that a good number of blockchain enthusiasts hail distributed ledger technology as a sort of panacea for IoT...

View Article

Image may be NSFW.
Clik here to view.

RDP Ports Prove Hot Commodities on the Dark Web

Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves. Security trends come and go, but the sale of Remote...

View Article
Browsing all 12749 articles
Browse latest View live