Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Interview: ManageEngine’s Raj Sabhlok on Browser Security

Raj Sabhlok is the president of IT management software provider, ManageEngine. The vendor has recently released Browser Security Plus in response to an increasing number of cyber attacks targeting...

View Article


Image may be NSFW.
Clik here to view.

Protecting Sensitive Data: The Death of an SMB

True or False? 90% of small businesses lack any type of data protection for their company and customer information. The answer? Unfortunately true . Due to this lack of care, 61% of data breach victims...

View Article


Image may be NSFW.
Clik here to view.

Why MFA on PEXA (Property Exchange Australia) leaves security concerns?

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform . As a response to...

View Article

Privacy and Security: How Apple thrived in a season of tech scandals

“The business world has long been plagued by Apple catastrophists ― investors, analysts, rival executives and journalists who look at the world’s most valuable company and proclaim it to be imminently...

View Article

Image may be NSFW.
Clik here to view.

Meet Barcelona’s 1st neobank, bnc10

bnc10 is the first neobank created in Barcelona, becomingthe first digital alternative to traditional banking created in the Catalan capital. The first neobank born in Barcelona is founded by Jordi...

View Article


Tighten.co Blog: APP_KEY And You

On the Tighten.co blog there's a tutorial posted from Jake Bathman for the Laravel users out there covering the APP_KEY value - what it is and how its used in your application. A recent Laravel...

View Article

Image may be NSFW.
Clik here to view.

ShiftLeft for .Net

Today we’re announcing the general availability of our continuous application security service for the.Net Framework (.Net)..Net developers can now leverage the highest ever benchmarked source code...

View Article

Investigative Process Through the Use of Statistical Sampling

VerSprite’s Upcoming Presentation DFIR Prague Summit & Training 2018 The volume of content available in some investigations can be overwhelming to the point that investigations are slowed and the...

View Article


Image may be NSFW.
Clik here to view.

Coming Soon to Minnesota...Lincoln...and Seattle!!!

It's that time of year when SQLSaturdays start to slow down (in the U.S. anyway) as we march towards Summit and the holiday season. Having said that, I have three speaking engagements in the near...

View Article


Image may be NSFW.
Clik here to view.

Does Microservices Architecture Influence Security Testing?

Does Microservices Architecture Influence Security Testing? Posted by Lambda Test | September 26, 2018 DevOps Manual Testing 11 Views | 6 Min Read The answer is yes. Some may think, “well, it’s all...

View Article

Java SQL 注入学习笔记

Wednesday. September 26, 2018 - 8 mins Java SQL Injection 0x01 简介 文章主要内容包括: Java 持久层技术/框架简单介绍 不同场景/框架下易导致 SQL 注入的写法 如何避免和修复 SQL 注入 0x02 JDBC 介绍 JDBC: 全称 Java Database Connectivity 是 Java 访问数据库的...

View Article

Image may be NSFW.
Clik here to view.

如何解密keystore文件

如果你用 geth 创建过账号「geth datadir /path/to/data account new」,那么多半知道 keystore 文件,它通过一个 password 加密保存着账号的私钥: keystore 如果我想拿到加密前的私钥怎么办?最容易想到的办法是在 MetaMask 中导入账号的时候选择通过 JSON...

View Article

Image may be NSFW.
Clik here to view.

Announcing Hyperswarm

TL;DR:The Beaker browser team is releasing a new DHT-based toolset for connecting peers called Hyperswarm . You may or may not be surprised to hear that connecting two computers over the Internet is...

View Article


Image may be NSFW.
Clik here to view.

Synology launches security camera app that turns a phone into an IP camera

Taiwanese technology company Synology on 26 September launched " Surveillance Station 8.2 " ― a new security camera app ― that turns a phone into an IP camera. The revamped disk station (DS) offers...

View Article

DoorDash Accounts Hacked in Credential Stuffing Attack

An increasing number of DoorDash customers reported on Twitter and Reddit that their accounts had been hacked into, passwords have been changed, and crooks placed fraudulent orders on their behalf....

View Article


Image may be NSFW.
Clik here to view.

Serverless Security Suggestions: Tips for Securing Functions

The Pros and Cons of Serverless Security John Morello Morello is the Chief Technology Officer at Twistlock, leading the company’s work with strategic customers and partners, and driving its product...

View Article

Image may be NSFW.
Clik here to view.

Aqua Security Provides Core Security Component for Hitachi Enterprise Cloud...

Aqua Security expands its Aqua Link Partner Program to include Managed Service Providers delivering protection for cloud-native workloads BOSTON, MA September 26, 2018 Aqua Security , a leading...

View Article


Image may be NSFW.
Clik here to view.

A 'Cyber Resilience' Report Card for the Public Sector

Government agencies are making great strides in defending themselves against cyberattacks, according to new research from Accenture. But technology alone won't solve the problem. Cyberattacks against...

View Article

Image may be NSFW.
Clik here to view.

How Azure Sphere ensures IoT security within a 4MB Linux stack

At the linux Security Summit, Microsoft’s Ryan Fairfax revealed the inner workings of Azure Sphere OS and its security model, including modifications to the Linux kernel that let it run in 4MB. It’s...

View Article

Image may be NSFW.
Clik here to view.

SEC Slams Firm with $1M Fine for Weak Security Policies

This is the first SEC enforcement cracking down on violation of the Identity Theft Red Flags Rule, intended to protect confidential data. The Securities and Exchange Commission (SEC) has issued a $1...

View Article
Browsing all 12749 articles
Browse latest View live