Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

NY Attorney General: Cryptocurrency exchanges lack security, fairness, and...

Cryptocurrency exchanges may not be as safe as we first thought. A report from the state of New York’s attorney general has revealed that most exchanges do not have basic consumer protections in...

View Article


Image may be NSFW.
Clik here to view.

Tenable Research discloses Peekaboo vulnerability affecting video surveillance

Hackers have proven capable of staging a hijack of surveillance camera footage. Security hounds are calling the zero day vulnerability Peekaboo. In brief, certain internet-connected surveillance...

View Article


Image may be NSFW.
Clik here to view.

鼻子解锁手机、充电宝窃取数据,这是一堂生动的网络安全课

以前经常听到,上大学就是提前适应社会、适应职场。大学本身是一种浓缩型的社会形态,人际社交、生活模式都有很类似的地方,好处在于大学生活有很高的容错率,可能还会有重新再来的机会。但对于现如今的学生来说,有一个无形的世界是没有办法提前实习的――网络安全。...

View Article

Making Risk Count: Winning Strategies from Global CISOs

A little over sixty years ago, Risk ―arguably the elder statesman of popular strategy board games―was introduced. Much like the role of today’s security professionals, excelling at the game of Risk...

View Article

Image may be NSFW.
Clik here to view.

New LiDAR-Driven Security Solution Offers Innovative Way to Secure Sensitive...

Security experts and technology companies debut solution for more capable and cost-effective perimeter security SUNNYVALE, Calif. (BUSINESS WIRE) #lidar ― Quanergy , a leading manufacturer of LiDAR...

View Article


The best password advice right now

Ever since NIST submitted SP 800-63 Digital Identity Guidelines for review a few years ago, the computer security world has been debating the agency's newest recommended password policies, which run...

View Article

Image may be NSFW.
Clik here to view.

品质×成就×创新丨WitAwards 2018年度品牌影响力评选「报名进行中」

近年来,全球的信息安全行业迎来高速发展期,市场规模不断扩大,各色企业犹如雨后春笋一般,安全行业也进入了百家争鸣的状态。在各个厂商提升产品、技术的同时,如何围绕安全产品与服务,让品牌价值深入用户观念,才是赢得挑战的关键因素。 WitAwards 2018...

View Article

Europol cyber crime report highlights emerging threats to enterprise security

Ransomware attacks are becoming more targeted and less opportunistic, Europol has found, while warning enterprises of the threat posed by new and emerging forms of cyber attack. Ransomware is now a...

View Article


State of the Internet Security Credential Stuffing

Credential stuffing, and the botnets behind this activity, is the primary focus of the State of the Internet Security Report, Issue 4, 2018. Credential stuffing, the use of botnets to try to login to...

View Article


Image may be NSFW.
Clik here to view.

中国信通院发布《区块链安全白皮书-技术应用篇》(附白皮书)

要点: 1.对于区块链技术的发展和应用态势,白皮书指出,目前全球区块链技术的应用已初步形成了包含硬件和基础设施、底层技术、上层应用和安全服务在内的技术生态格局。面对频频发生的安全事件,各国对区块链的态度也逐渐趋于理性,开始在政策、标准、技术等不同层面寻求应对之策。...

View Article

Image may be NSFW.
Clik here to view.

LifeShield Home Security Advantage review: The whole is considerably less...

LifeShield, which was part of DirecTV from 2013 to 2017, is now an independent operation. As such, it has gone all-in on home security as a service. You’re not buying a home security system here,...

View Article

BrandPost: Security and the Cloud Go Hand-in-Hand: Are You Prepared?

Just because you’ve tapped into the vast resources of a cloud service provider to replace previously on-premises IT assets doesn’t lessen your management or cybersecurity burden. In fact, cloud...

View Article

Image may be NSFW.
Clik here to view.

Bolstering Digital Workspace Security with Workspace ONE Trust Network

Sep 19, 2018 Author: Sachin Sharma Sachin Sharma is a senior product line marketing manager for VMware’s End-User Computing business unit, specializing in security. Share This Post On Four new...

View Article


How do you explain the unreasonable effectiveness of cloud security?

With the enormous attack surface of cloud providers like AWS, Azure, and GCP, why aren't there moresecurity problems? Data breaches and cyber attacks occur daily . How do you explain the unreasonable...

View Article

How AI Transforms Traditional Industries and Builds New Ones

When a championship player of Go, considered by many to be the world’s most complex board game, was defeated on his home turf by an AI-powered machine last year, many feared for what the defeat might...

View Article


Image may be NSFW.
Clik here to view.

Options for Analyzing Cyber Threats

Gene Spafford , a leading security industry expert and a professor at Purdue University, is someone we should all be thankful for cyber information-wise, at least. He birthed the idea of cyber...

View Article

ICANN sets plan to reinforce Internet DNS security

In a few months, the Internet will be a more secure place. That’s because the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the...

View Article


Image may be NSFW.
Clik here to view.

WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication

New standards offer protection against hacking, credential theft, phishing attacks, and hope for the end of an era of passwords as a security construct. The Internet began without an identity layer and...

View Article

Image may be NSFW.
Clik here to view.

Centrify Brings Zero Trust Security to Apple Devices with Day-One Support for...

Centrify continues long-standing tradition of delivering day-one support for macOS and iOS releases SANTA CLARA, Calif. (BUSINESS WIRE) Centrify , a leading provider of Zero Trust Security through the...

View Article

NewEgg cracked in breach, hosted card-stealing code within its own checkout

The popular computer and electronics Web retailer NewEgg has apparently been hit by the same payment-data-stealing attackers who targeted TicketMaster UK andBritish Airways. The attackers, referred to...

View Article
Browsing all 12749 articles
Browse latest View live