Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

ITOps In The Modern Ops World

As modern operations gain momentum, it is quickly becoming the new norm for business. Infrastructure has become malleable and self-service is in demand. As a result, traditional IT operations need to...

View Article


Big Data Security: Vulnerability Management

Mitesh Shah, Senior Product Manager for Security and Data Governance at MapR, describes an important concept in big data security: vulnerability management, which is a key layer in the trust model. He...

View Article


Enabling Secure Web Payments with GNU Taler

GNU Taler is a new electronic online payment system which provides privacy for customers and accountability for merchants. It uses an exchange service to issue digital coins using blind signatures, and...

View Article

IDG Contributor Network: Dropbox breach shows how impactful poor security can be

Way back in the dark ages (well, four years ago, anyway), something happened within file sharing vendor Dropbox that, all these years later, has come back to haunt the powerhouse and its customers....

View Article

CSP Is Dead, Long Live CSP - on the Insecurity of Whitelists

Abstract Content Security Policy is a web platform mechanism designed to mitigate cross-site scripting (XSS), the top security vulnerability in modern web applications. In this paper, we take a closer...

View Article


Security Week: Betabot Starts Delivering Cerber Ransomware

Betabot, a piece of malware that has been around for years, recently started to deliver ransomware to compromised computers, Invincea reveals. Previously, Betabot was primarily a banking information...

View Article

如果,你的DNS提供商遭遇DDoS攻击该怎么办?

很多企业都曾思考或者经历过:当其系统遭受针对性分布式拒绝服务攻击会发生什么。多年来,我们看到很多看似灵活的企业由于分布式拒绝服务攻击失去其核心网络业务。 特定系统网络中断是一回事;但是,你有没有想过,如果你企业整个域名系统功能都失效会发生什么?域名系统(DNS)基本是互联网(以及你的企业)的循环系统,我们很难想象企业没有它可以存活。...

View Article

Shavlik Protect Wins the Gold Award in the Security Category for “Best of...

Award celebrates Shavlik’s pioneering patch solution and its strength in helping to protect virtual environments LONDON ― September 2, 2016― Shavlik, a global leader in IT management and innovative...

View Article


WoSign's secret purchase of StartCom; WoSign threatened legal actions

I called forWoSign's revocationearlier thisweek for its utter ignorance over security. However, WoSign is cross signed by StartCom. Meaning that as long as StartCom is trusted, even if WoSign is...

View Article


Image may be NSFW.
Clik here to view.

End users struggle to identify security threats and put enterprises at risk

There's a reason why cyber attacks use social engineering techniques, it's because the person sitting in front of the screen is usually the weakest link in the security chain. This is confirmed by the...

View Article

Image may be NSFW.
Clik here to view.

Apple issues urgent security update after hack turns Mac computers into...

Apple issues urgent security update after hack turns Mac computers into spying devices Apple has issued a software update to patch the flaw Credit: David Rose A pple has released an urgent update to...

View Article

Image may be NSFW.
Clik here to view.

How to boost sales by improving your trust signals

It’s obvious that the internet has a conversion problem, and many businesses are constantly evolving ways to better convert traffic they get. In this quest, they consider things like A/B testing,...

View Article

Image may be NSFW.
Clik here to view.

Update your Mac OS X ― Apple has released Important Security Updates

If you own a Mac laptop or desktop, you need to update your system right now. It turns out that the critical zero-day security vulnerabilities disclosed last week, which targeted iPhone and iPad users,...

View Article


August with Cossack Labs

Summer comes to an end, but finalizing development of few new products you’re about to hear in upcoming weeks, polishing Themis and presenting talks based on our developments is in full swing. Our...

View Article

Image may be NSFW.
Clik here to view.

Multi-site with Cross-VC NSX: Consistent Security and Micro-segmentation...

Several posts have been written prior on multi-site with Cross-VC NSX describing the fundamentals, use cases, deployment models, and flexibility Cross-VC NSX provides. In this post, we focus on the...

View Article


TippingPoint Threat Intelligence and Zero-Day Coverage Week of August 29, 201...

Earlier this week, the entertainment world lost Gene Wilder, one of the most talented comedians and screenwriters in the business. While many will remember him for his work in the movies Willy Wonka...

View Article

Image may be NSFW.
Clik here to view.

Security Think Tank: Addressing the malware arms race

Malware propagation is a bit like sales. Success can come either from playing the numbers game or by taking a more strategic and focused approach. There are pros and cons for each approach and they...

View Article


Auditors vs. Admins

As security becomes more and more important each day, there is a need for the IT community to understand the differences between auditors and administrators. The reason we need to keep these different...

View Article

Image may be NSFW.
Clik here to view.

Kaspersky 'terminates' deal with security reseller Quadsys

Kaspersky Lab is the first big vendor to publicly rip up its contract with disgraced security reseller Quadsys in the wake of the hacking scandal that the company’s bosses recently admitted to. On 22...

View Article

VMware NSX Security: Features And Use Cases

Data centers are undergoing big changes in order to accommodate huge chunks of data in industries. As this data is very important, it is vital to provide good solutions to store it. Physical data...

View Article
Browsing all 12749 articles
Browse latest View live