Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Endpoint Security: 3 Big Obstacles to Overcome

In a report released earlier this year on the topic of next-generation endpoint security, Enterprise Security Group (ESG) analyst Jon Oltsik observed that enterprises and antivirus vendors alike find...

View Article


Securing Communications on Android

With all the recent data breaches, privacy has become an important topic. Almost every app communicates over the network, so it's important to consider the security of user information. In this post,...

View Article


Image may be NSFW.
Clik here to view.

Understanding PGP by Simulating it

As the name suggests, PGP, the acronym for Pretty Good Privacy is an encryption program that actually provides good privacy. The “pretty good” bit is meant to be a bit of an ironic understatement. It...

View Article

EOS 智能合约最佳安全开发指南

原文: https://github.com/slowmist/eos-smart-contract-security-best-practices 这篇文档旨在为 EOS 智能合约开发人员提供一些智能合约的 安全准则 及 已知漏洞分析 。我们邀请社区对该文档提出修改或完善建议,欢迎各种合并请求(Pull Request)。若有相关的文章或博客的发表,也请将其加入到中。 目录 安全准则 EOS...

View Article

Image may be NSFW.
Clik here to view.

广东摧毁多个黑客团伙:盗论文查重账号 售查重结论

记者21日从广东省公安厅获悉,近日,在公安部的指挥协调下,广东省公安厅展开“净网安网”15号打击黑客网络攻击破坏违法犯罪专项行动,侦破黑客类案件100余宗,成功打掉黑客团伙30余个,刑事拘留160余人。此次行动核实被攻击入侵网站7240余个,涉案金额共计2500余万元,扣押电脑主机、攻击木马、黑客工具等涉案物品一批,实现了对多个黑客攻击破坏黑灰产业链的全链条打击。...

View Article


Cobaltstrike、armitage联动

在使用Cobaltstrike的时候发现他在大型或者比较复杂的内网环境中,作为内网拓展以及红队工具使用时拓展能力有些不足,恰恰armitage可以补充这点,利用metasploit的拓展性能、高性能的内网扫描能力,来进一步的拓展内网,达到最大化的成果输出。 0x001、环境说明: A Os:Ubuntu18.04 ip:192.168.1.163...

View Article

Image may be NSFW.
Clik here to view.

曲速未来 :航空公司惨遭黑客攻击泄露38万客户信息详细分析

2018-09-22 07:31 区块链 技术 184 收藏 区块链安全咨询公司曲速未来消息:在深入研究英国航空公司网站内网络犯罪分子注入的代码之后,研究人员发现仅有22行javascript代码是英国航空公司受该黑客攻击,导致38万名客户数据被盗的罪魁祸首。 回顾:...

View Article

Image may be NSFW.
Clik here to view.

What is Public Key Cryptography?

From TLS to authentication, “crypto” is used for a lot more than just currencies. In 2018, security should be part of every developer's toolkit and cryptography a fundamental building block for the...

View Article


Image may be NSFW.
Clik here to view.

Lockly's smart locks promise better security through algorithms

Apparently you won't need to, though. Lockly says the aluminum smart lock can generate multiple access codes without the need for an internet connection. The biggest difference between the Secure and...

View Article


Image may be NSFW.
Clik here to view.

小小文档居然有这么多安全漏洞可以钻!

安全可靠技术和应用研讨会本周二在山东省济南市召开,会议由山东省经济和信息化委员会、安全可靠技术和产业联盟共同主办。这也意味着信息化安全问题已经上升到了国家、政府高度重视的层面。 而在众多的议题中,除了芯片、系统安全层面的安全问题外,出乎我们意料的是,离我们平时日常工作最接近的文档文件管理系统也同样存在大量的安全问题,这些问题直接关系到企业甚至政府部门的信息安全。...

View Article

Image may be NSFW.
Clik here to view.

来看看,你的电脑替黑客挖了多少比特币

来源 |Cyber Threat Association 编译 | 张 问 编辑|杨舒芳 2017年四季度,越来越多利用程序非法挖矿的事件被曝出来。一个叫“网络危机联盟(CTA)”的组织集合了一些网络安全专家去监控这些违法行为,其中包括著名网络安全软件公司McAfee的专家。...

View Article

Image may be NSFW.
Clik here to view.

这个数学界的“大新闻”,会引起加密界“地震”吗?

又一数学家宣布证明黎曼猜想,多位科学博主转发相关消息。有人说,互联网加密将受到巨大威胁…… “世纪难题黎曼猜想或已被证明”,这不仅是数学界的重磅新闻,也给加密界带来了不小的震动。 9月20日晚,南大教授周志华、物理学家赖光泽先后在微博称,数学家迈克尔阿提亚(Michael...

View Article

Thoughts on California’s Proposed Connected Device Privacy Bill (SB-327)

This post was authored by Noah Apthorpe . On September 6, 2018, the California Legislature presented draft legislation to Governor Brown regarding security and authentication of Internet-connected...

View Article


What Is Protected Health Information (PHI)?

Healthcare is a data-rich industry. These data are created across the entire healthcare ecosystem; they represent a wealth of information that can be used to ultimately lead to better patient outcomes....

View Article

Image may be NSFW.
Clik here to view.

【安全帮】菜鸟驿站1000万条数据被非法窃取:均为大学生快递信息

摘要: 菜鸟驿站1000万条快递数据被非法窃取 已封堵漏洞日前,杭州市萧山区公安分局在打击整治网络违法犯罪“净网2018”专项行动中,破获1个非法获取公民信息团伙,抓获犯罪嫌疑人21名。警方通报,该案中,犯罪团伙并非采取以往的直接网络攻击盗取模式,而是对安装在物流网点... 菜鸟驿站 1000 万条快递数据被非法窃取 已封堵漏洞...

View Article


Image may be NSFW.
Clik here to view.

“黎曼猜想”推翻区块链加密算法?

菲尔兹和阿贝尔奖双料得主迈克尔阿蒂亚爵士宣称自己证明了黎曼猜想,要在9月24日海德堡获奖者论坛上宣讲。最近有些人啊,见得风,就是雨。Atiyah 已经证明了Riemann猜想,一场风暴已经在酝酿之中,所有加密算法已经危如累卵,区块链行业迟早要完,赶快收拾细软准备跑路吧,注意,一定要是细软哦。Riemann 猜想声称zeta函数的非平凡零点的实部都是1/2。可是这和区块链又有什么关系呢?...

View Article

Building a Security Awareness Program on an Organizational Level

Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and that...

View Article


Threat Hunting: What’s on Your Network?

VerSprite’s Upcoming Presentation Threat Hunting: What’s on Your Network? Ray Strubinger, VerSprite’s Managing Consultant for Digital Forensics & Incident Response , has lead threat hunting efforts...

View Article

Image may be NSFW.
Clik here to view.

红队与渗透测试tips

我收集了一些渗透测试 tips ,同时欢迎大家补充。 1. 使用高知名度的网站(如: Google , aws )做 C&C 控制服务器,这样 可以绕过白名单限制 ; 2. 使用cleanwipe删除文件 ,因为它不需要管理员权限; (工具见: https://support.symantec.com/en_US/article.HOWTO124983.html ) 3....

View Article

Rockwell Automation栈溢出高危漏洞 (CVE-2018-14829)

Rockwell Automation栈溢出高危漏洞 (CVE-2018-14829) 发布日期:2018-09-19 更新日期:2018-09-22 受影响系统: Rockwell Automation RSLinx Classic <= 4.00.01 描述: CVE(CAN) ID: CVE-2018-14829 RSLinx...

View Article
Browsing all 12749 articles
Browse latest View live