Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

My Experience with the DoD Version of the RMF

Anyone out there dealing with the DoD implementation of the NIST 800-37 RMF? Just in case, it’s the “Guide for Applying the Risk Management Framework to Federal Information Systems” developed by the...

View Article


Image may be NSFW.
Clik here to view.

启迪网安:创新生态亮相国家网络安全宣传周

摘要: 9月21日,武汉市2018年国家网络安全宣传周活动正式启幕,启迪网安公司重磅亮相活动现场,秉持大会“网络安全为人民,网络安全靠人民”的主题,展现启迪网安在网络安全领域的努力与成绩。 图注:展会首日,湖北省委常委、宣传部部长王艳玲等领导一行参观启迪网安展位 ......

View Article


Protecting Against 'Natural' Cybersecurity Erosion

Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a...

View Article

Image may be NSFW.
Clik here to view.

IBM Files Blockchain Patent to Tackle Privacy and Security Concerns for Drones

IBM has applied to patent a system that would use blockchain tech to tackle privacy and security concerns for drones. IBM has applied to patent a system that would use blockchain tech to tackle privacy...

View Article

Data Manipulation: How Security Pros Can Respond to an Emerging Threat

Industry leaders are scrambling to address the issue, which will take new thinking to overcome. This year, the US government paid out its largest bug bounty yet ― during the government run "Hack the...

View Article


Security advisory for the standard library

The Rust team was recently notified of a security vulnerability affecting the standard library’s str::repeat function. When passed a large number this function has an integer overflow which can lead...

View Article

Image may be NSFW.
Clik here to view.

Why You Should Pay Attention to Tokenized Assets and Security Token Offerings

An Easy Pill toSwallow I came here for the technology, I stayed for the community and ideology. Thus , it’s been difficult to pinpoint how I really feel about the current direction of the blockchain...

View Article

Rise of Credential Stuffing in Asia Pacific and Japan.

The rise of credential stuffing attacks globally is made possible by the tendency of customers’ re-using the same credentials across different websites and attackers’ easy access to stolen credential...

View Article


Image may be NSFW.
Clik here to view.

Remove Cooliofungames.com Ads

This article will help you remove Cooliofungames.com absolutely. Follow the removal instructions for the adware at the end. Cooliofungames.comis an online gaming platform. Flash games are its primary...

View Article


Preparing a Security Token Offering? Here's Your Marketing Playbook.

Opinions expressed by Entrepreneur contributors are their own. As the SEC comes closer and closer to a crackdown on the “utility” tokens that function as unregistered securities, a new breed of token...

View Article

Never use the word “User” in your code

You’re six months into a project when you realize a tiny, simple assumption you made at the start was completely wrong. And now you need to fix the problem while keeping the existing system...

View Article

Remove Safesearchmac.com Browser Hijacker from Mac

Ad See if your system has been affected Note! Your computer might been affected by Safesearchmac.com and other threats. SCAN YOUR PC with SpyHunter SpyHunter is a powerful malware removal tool designed...

View Article

AdGuard Resets All Passwords Following Credential Stuffing Attack

AdGuard's CEO'sAndrey Meshkov has announced on the company blog through a security notice that the company has reset the passwords for all registered accounts following a credential stuffing attack....

View Article


Image may be NSFW.
Clik here to view.

Hackers Steal $60M from the Tech Bureau Cryptocurrency Exchange

Tech Bureau which is a well-known Japanese cryptocurrency exchange has been hacked by criminals. The results of infiltration is a theft of $60M worth of digital assets. This is a e yet another report...

View Article

Bitcoin Core CVE-2018-17144 disclosure

Full disclosure CVE-2018-17144, a fix for which was released on September 18th in Bitcoin Core versions 0.16.3 and 0.17.0rc4, includes both a Denial of Service component and a critical inflation...

View Article


Image may be NSFW.
Clik here to view.

MY TAKE: Here’s why we need ‘SecOps’ to help secure ‘Cloud Native’ companie ...

For many start-ups, DevOps has proven to be a magical formula for increasing business velocity. Speed and agility is the name of the game ― especially for Software as a Service (SaaS) companies....

View Article

Amazon's Echo devices are getting a slick new feature to help protect your...

Amazon is taking steps to ensure Alexa can keep a watchful eye over your home while you're away. The online shopping giant just announced its Alexa Guard service, which is intended to enhance home...

View Article


Image may be NSFW.
Clik here to view.

Improving the security of your containers in OCIR with Twistlock

Introduction to OCIR Last May, Oracle introduced a new cloud service on Oracle Cloud Infrastructure, for container native developers to store their Docker images. Simply, Oracle Cloud Infrastructure...

View Article

Image may be NSFW.
Clik here to view.

A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable

Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell, there are five...

View Article

Image may be NSFW.
Clik here to view.

3 Steps Nonprofits Can Take to Bolster Cybersecurity

Nonprofit organizations should be just as concerned about cybersecurity as small businesses are , in part because they face many of the same challenges. Like small businesses, nonprofits often have...

View Article
Browsing all 12749 articles
Browse latest View live