Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kernel Mode Threats & Practical Defenses: Part 2

In our lastpost, we described the evolution of kernel mode threats. These remain a prominent mode of compromise for nation-state attackers, as they are difficult to detect and enable robust...

View Article


Image may be NSFW.
Clik here to view.

HYAS Adds Infosec Visionary Ariel Silverstone as Data Protection Officer,...

VICTORIA, British Columbia (BUSINESS WIRE) #cybersecurity ― HYAS , a leading provider of attribution intelligence solutions for infosec and cybersecurity professionals, today announced that long-time...

View Article


RCN Stores Customer Passwords in Plain Text

An RCN representative, an American telephone, cable television, and internet service provider based in Princeton, New Jersey, just revealed on Twitter that the company stores their customers' passwords...

View Article

Image may be NSFW.
Clik here to view.

Motorola Solutions Adds New Features to Ally Cloud-Based Security Software

Ally enables better communication and real-time information sharing between security organizations CHICAGO (BUSINESS WIRE) Motorola Solutions (NYSE:MSI) today announced new features for Ally , its...

View Article

Image may be NSFW.
Clik here to view.

Assessing the Human Element in Cyber Risk Analysis

The human factor doesn’t have to be an intangible when assessing cyber risks within a company. Seventeen percent of data breaches started as social engineering attacks, mostly from email, according to...

View Article


Baddies just need one email account with clout to unleash phishing hell

A single account compromise at an unnamed "major university" in the UK led to a large-scale phishing attack against third parties, according to data protection outfit Barracuda Networks. With one...

View Article

Image may be NSFW.
Clik here to view.

$4.8 Billion Warehouse Management System Market Global Forecast to 2024 Re ...

DUBLIN (BUSINESS WIRE) The “Warehouse Management System Market by Offering (Software, Services), Deployment (On-Premise, On-Cloud), Tier Type (Advanced, Intermediate, Basic), Industry (3PL, Automotive,...

View Article

Image may be NSFW.
Clik here to view.

Coinnest Executives Indicted for Accepting Bribe for Coin Listing

Exchanges 1 min ago| By Kevin Helms - | Coinnest Executives Indicted for Accepting Bribe for Coin Listing The Seoul Southern District Public Prosecutors’ Office has reportedly indicted two executives...

View Article


Typical Workarounds For Compliant Logs

You may think you have logs. Chances are, you can rely on them only for tracing exceptions and debugging. But you can’t rely on them for compliance, forensics, or any legal matter. And that may be...

View Article


Security researcher claims macOS Mojave privacy bug on launch day

A security researcher has claimed a new vulnerability in the latest version of macOS ― just hours before the software is due to be released. Patrick Wardle, chief researcher officer at Digita Security,...

View Article

Image may be NSFW.
Clik here to view.

Security at Speed: A New Paradigm for a Secure DevOps Process

Since its first conference in Belgium in 2009, DevOps has gained mainstream acceptance. Organizations have caught on to its ability to create optimization on a whole new scale. This approach to...

View Article

Image may be NSFW.
Clik here to view.

Barracuda Networks Sees More ATO Attacks Ahead

A new report published by Barracuda Networks warns the number of account takeover (ATO) incidents involving compromised email credentials is starting to rise. A study of 50 randomly selected...

View Article

Don’t Look Away, Peekaboo Vulnerability May Allow Hackers to Play the Long Game

The newly named Peekaboo vulnerability is a zero-day flaw in China-based Nuuo’s video recorder technology.The flaw in NVRMini2, a network-attached storage device, has remained unfixed in the three...

View Article


Image may be NSFW.
Clik here to view.

How to Market Blockchain With Consensys and Lisk ― DZone Security

The dark days of the second half of 2017 are becoming a distant memory. The times of insane ICO valuations and token speculation excess were great for some but were a distraction from what makes...

View Article

Image may be NSFW.
Clik here to view.

Education sector data breaches skyrocket

You only have to look at the headlines to see that the education sector is under attack. One in five schools and colleges have fallen victim tocyber-crime, according toresearch from specialist insurer...

View Article


Image may be NSFW.
Clik here to view.

Bug? Feature? Power users baffled as BitLocker update switch-off continues

Three months on, users continue to report that Microsoft's BitLocker disk encryption technology turns itself off during security updates. The problem, which has prompted much head-scratching in...

View Article

Yubico Launches New Lineup of Multifactor FIDO2 Security Keys

It’s an open secret that passwords aren’t the most effective way to protect online accounts. Alarmingly, three out of four people use duplicate passwords, and 21 percent of people use codes that are...

View Article


Image may be NSFW.
Clik here to view.

Alert Logic Report Reveals New Killchain Efficiencies and Cyber-Attack...

New Tactics Subvert Traditional Security Measures and Indiscriminately Strike Organizations of All Sizes HOUSTON (BUSINESS WIRE) Alert the leading provider of Security-as-a-Service solutions, today...

View Article

Image may be NSFW.
Clik here to view.

Dangerously Connected: The complexities of personal devices in the workplace

Ready to learn Cybersecurity?Browse courseslike Cyber Security for the IoT developed by industry thought leaders and Experfy in Harvard Innovation Lab. “Everyone wants to be connected,” Eric Montague...

View Article

Image may be NSFW.
Clik here to view.

The Sony hacker indictment: 5 lessons for IT security

In August 2018, the US Department of Justice (DoJ) unsealed the indictment of a North Korean spy, Park Jin Hyok, whom they claim was behind the hack against Sony and the creation and distribution of...

View Article
Browsing all 12749 articles
Browse latest View live