猫池等黑产工具首次曝光 阿里携创新技术亮相2018国家网络安全宣传周
摘要: 阿里巴巴首席风险官郑俊芳认为,保障网络安全的前提是保护好数据安全,这需要创新安全新技术、新机制,新理念,以解决网络通讯诈骗等一系列社会问题。 同时操控16张电话卡进行虚假注册的猫池,成本不足百元却能悄无声息偷走你手机短信的“2G短信嗅探设备”……9月17日,2018国家网络安全宣传周――网络安全博览会揭幕,阿里巴巴展馆首次曝光的黑灰产作案工具一经亮相,便成为关注焦点。...
View ArticleThreatConnect Research Reports Successful Threat Intelligence Programmes...
Organisations say protecting client information is the highest priority LONDON (BUSINESS WIRE) ThreatConnect, Inc., provider of the industry’s only extensible, intelligence-driven security platform,...
View ArticleBe your own bank! VivusPay is just the first taste of the Optherium Ecosystem
In our global world, payments are made routinely across continents, but they can be slow, incur large commissions for conversion and handling, and be vulnerable to hacking. Our personal information...
View ArticleThe Dangerous State of IoT Security
The Dangerous State of IoTSecurity n September 2015, a nationwide warning was released to the public straight from the FBI headquarters. Acting as a warning of the dangers of IoT devices, this warning...
View ArticleWhy a Backdoor Is a Threat to Our Security.
In regular intervals, Politicians demand that companies add backdoors to their end-to-end encrypted cloud services to enable law enforcements to easier persecute criminals. This demand ignores that any...
View Article2018国家网络安全宣传周正式开幕 亚信安全“网络空间平安城市”助力新时代网络强国梦
9月17日-23日,2018年国家网络安全宣传周在成都正式拉开帷幕。亚信安全积极响应“网络安全为人民,网络安全靠人民”的号召,以“联动聚力...
View ArticleUnderstanding the Importance of Cybersecurity in Retail
Ready to learn Cybersecurity?Browse courseslike Cyber Security for the IoT developed by industry thought leaders and Experfy in Harvard Innovation Lab. Keeping the business, employees and customers...
View Article谭晓生:安全大脑让网络安全“既见树木,更见森林”
“大安全时代, 安全问题变得牵一发而动全身,如果我们只是单点防御,那就是只见树木、不见森林。” 9月17日上午,在成都举办的“2018国家网络安全宣传周安全博览会新闻发布会”上,360集团技术总裁、首席安全官谭晓生表示:当下网络安全已进入“大安全”时代,需要以“360安全大脑”构建大安全时代的整体防御策略体系。 360集团技术总裁、首席安全官谭晓生...
View ArticleThe 7 Habits of Highly Effective Security Teams
Security requires smart people, processes, and technology. Too often, the "people" portion of the PPT equation is neglected. Worldwide spending on digital transformation technologies is expected to...
View ArticleUnikeys launches Ukey card to store cryptocurrencies in a familiar form factor
We’re still at the beginning of the blockchain and crypto journey, and making it easier to store and use cryptocurrencies through common platforms and devices will be essential to mainstream adoption....
View Article4 Vital Ways Enterprise SSO Saves Your Employees Time and Provides Peace of Mind
Leading up to the 2016 U.S. presidential election, Russian hackers allegedly attacked the Hillary Clinton campaign and the Democratic National Committee with spear-phishing efforts to trick users into...
View ArticleRenesas to Buy IDT, Expand Product Portfolio
Renesas this month has announced plans to acquire IDT, making the move as part of a larger bid to expand its product portfolio with IDT's analog mixed-signal capabilities. The takeover will enable...
View ArticleIPv6 Will Bring Security Threats: What You Need to Know to be Prepared
It is no secret that the proliferation of connected devices has exhausted IPv4 addresses. This was first forecasted and examined in the 1980s, and has been in the process of being fulfilled since 2011....
View ArticleThe lifestyle of a black hat hacker
Imagine for a moment, just hypothetically, that you are one of those cybercriminals whose shenanigans are hitting the headlines day by day. Let’s try and dream up this fictional scenario. Before you...
View ArticleCritical Peekaboo Vulnerability Gives Attackers Access to CCTV Cameras
Tenable Research disclosed a pair of vulnerabilities in NUUO's Video Recorder Software which allow attackers to execute code remotely in NUUO-based IoT video surveillance systems, giving access to...
View ArticleNUUO, do not want! CCTV webcams can be hacked to spy on you
Researchers have uncovered two flaws that leave more than 100,000 NUUO-branded internet-connected surveillance cameras open to remote takeover. Tenable Research on Monday laid claim to discovering two...
View ArticleExplainer Series: RDaaS Security and Managing Compliance Through Database...
As organizations move to cloud database platforms they shouldn’t forget that data security and compliance requirements remain an obligation. This article explains how you can apply database audit and...
View ArticleCan Blockchain Security Safeguard IoT? Maybe. Maybe Not.
According to a well-known cyber slogan, complexity is the enemy of security . So why is it that a good number of blockchain enthusiasts hail distributed ledger technology as a sort of panacea for IoT...
View ArticleRDP Ports Prove Hot Commodities on the Dark Web
Remote desktop protocol access continues to thrive in underground markets, primarily to hackers who lack expertise to find exposed ports themselves. Security trends come and go, but the sale of Remote...
View Article