Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

The Crypto-Criminal Bar Brawl

As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of...

View Article


Image may be NSFW.
Clik here to view.

Vulnerable open source component adoption skyrockets in the enterprise

Open-source software and components are critical to many of the online services we use today. Companies, ranging from the most well-known technology giants to SMBs, will often use open-source...

View Article


Deep North’s school security system uses AI and cameras to detect threats

Deep North (formerly VMAXX), a Silicon Valley startup with offices in China and Sweden, hopes to leverage artificial intelligence (AI) to prevent violence and “other safety issues” facing schools. It...

View Article

Securing web vulnerabilities with WAF

With an increasing number of organizations going online along with the millions of their clients/ users/ customers, cybersecurity has become critical and indispensable for organizations to proactively...

View Article

Image may be NSFW.
Clik here to view.

Mojave’s security “hardening” | User protections could be bypassed

Any local or remote user can bypass Apple’s new Full Disk Access requirement using ssh. Find out how to stay safe. One of the signature features of Apple’s macOS Mojave is user safety. As we noted here...

View Article


Image may be NSFW.
Clik here to view.

Verint FaceDetect Honored with 2018 Innovative Product Award

Advanced Facial Recognition Platform is Selected for Its Ability to Excel in Real-World Environments and Help Mission-Critical Organizations Boost Intelligence Global Security Exchange Las Verint Booth...

View Article

Image may be NSFW.
Clik here to view.

Delivering Security and Speed: The 3 Core Principles of DevSecOps

Companies that are not baking in security throughout the software delivery pipeline are seeing delivery delays or risk releasing vulnerable applications. DevSecOps, the practice of shifting security...

View Article

Image may be NSFW.
Clik here to view.

PolySwarm Appoints Patricia Hatter to Advisers Council

SAN JUAN, Puerto Rico (BUSINESS WIRE) PolySwarm , the first decentralized threat intelligence marketplace, announced today that Patricia A. Hatter will join the PolySwarm Council. Hatter will help...

View Article


Image may be NSFW.
Clik here to view.

Security researcher fined for hacking hotel WiFi and putting passwords on the...

Singapore authorities have fined a Chinese security researcher with SGD$5,000 (USD$3,600) for hacking into a local hotel's WiFi system without authorization and then publishing a blog post about it,...

View Article


September 2018 Update for Netsparker

We’re delighted to announce a Netsparker Desktop 5.1 update. The highlights of this update are a new Bulk Export to Cloud feature, Send To integration support for ServiceNow and custom field support...

View Article

Image may be NSFW.
Clik here to view.

安盟信息法院信息系统勒索病毒防护方案

勒索病毒(WannaCry)背景 距2017年5月12日WannaCry的大爆发已过去一年多了,但勒索病毒的威胁却从来不曾远离,反而呈现愈演愈烈之势,传播方式更多元,病毒更新迭代加快,勒索病毒俨然成为近两年来最严峻的网络安全威胁之一。安盟信息通过对WannaCry变种跟踪及在信息安全行业的技术积累,针对WannaCry病毒攻击制作了安全防护指南。 勒索病毒特点及攻击目标演变...

View Article

Image may be NSFW.
Clik here to view.

一个人的安全部之大话企业数据安全保护

*本文原创作者:liong03,本文属CodeSec原创奖励计划,未经许可禁止转载 先简单自我介绍一下,其实,我是一个信息安全工程师,也是一个人的“安全部”…… 近期看到一些朋友问数据安全保护怎么弄,刚好为某企业简单规划过,很多前辈大佬都有介绍过数据安全,突然想用一种不一样的姿势来分享,通过一些文字条框再结合一些故事案例来思考。 目录架构 一、设计思路...

View Article

全国政协委员谈剑锋:推动网络安全产业创新发展

原标题:推动网络安全产业创新发展(建言) 人民日报 全国政协委员 谈剑锋 从战略层面进行网络安全的体系化和层次化设计 制定积极的网络安全产业发展政策,实行主动纵向的产业政策 在政府及国有企业的信息化采购中,增加网络安全产品和服务采购比例...

View Article


Image may be NSFW.
Clik here to view.

Off-by-none: Issue #4

All I see is choreography and I’ll never be a dancer Welcome to Issue #4 of Off-by-none . Thanks for being here! :raised_hands: Last week we started a conversation about serverless microservices. It...

View Article

Vault ties up with archTIS to bid for govt business

archTIS is based in Canberra and gained a listing on the ASX (ASX: AR9) on 21 September, a statement said, adding that the partnership would use archTIS Kojensi Gov cloud services to be used in Vault's...

View Article


Image may be NSFW.
Clik here to view.

医疗行业安全指数报告(2018年8月)

前言 医疗服务信息化是国际发展的趋势,也是我国医疗改革的的重要内容和必由之路。随着信息技术的快速发展,越来越多的企业和医疗机构加入到医疗信息化的建设浪潮中。互联网医疗火热背后,医疗信息安全问题如影随形。近年来,针对医院的勒索、挖矿、医疗信息泄露等医疗行业的信息安全事件层出不穷,医院信息系统已经成为了不法黑客的重点攻击对象之一。 一、概述...

View Article

Image may be NSFW.
Clik here to view.

广电总局科技委组织“网络安全技术及应用”交流活动

2018年9月25日,国家广电总局科技委员会秘书处会同中国电子学会有线电视综合信息技术分会、中国新闻技术工作者联合会多媒体专业委员会,共同组织了“网络安全技术及应用”交流活动,实地参观考察360企业安全集团。...

View Article


Why SQL Injections Are The Cockroaches of the AppSec World (and how CISOs can...

There’s a well-known theory that cockroaches can survive basically anything even a nuclear explosion. While that theory only rings true to a point , their simple body composition makes them extremely...

View Article

Calculating a Security Principal’s Effective Rights

Security. Oh that most painful of topics. I discussed it a few months earlier when I discussed the need to give rights only through roles to users, so everything is the same in dev and prod except the...

View Article

Image may be NSFW.
Clik here to view.

Metacoda Auth Domain Reviewer

One of the new Metacoda Security Plug-ins features arriving in version 6.1 is the Auth Domain Reviewer . Like the other reviewers, this plug-in is used for investigating, documenting and testing how a...

View Article
Browsing all 12749 articles
Browse latest View live