Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

黑客能通过洗衣机窃取电脑文件

黑客能通过洗衣机窃取电脑文件 一点号黑客联盟12小时前 php?url=0EMLSkihXD" alt="黑客能通过洗衣机窃取电脑文件" />【黑客联盟2016年09月05日讯】研究人员日前发现了一种新技术,可以通过病毒感染打印机或洗衣机等常用设备,把这些设备变成无线电台,然后将计算机的机密信息以无线电信号的方式发送出去。...

View Article


Image may be NSFW.
Clik here to view.

黑客在互联网上两步杀一人

黑客在互联网上两步杀一人 一点号黑客联盟12小时前 php?url=0EMLUBTVNe" alt="黑客在互联网上两步杀一人" />【黑客联盟2016年09月05日讯】不管什么时候,死亡都不是一个美好的词语,因为它意味着失去生命。如果我说,在虚拟的互联网世界里,黑客能够通过一系列入侵来让一个人或者一群人“死亡”,你会怎么想?...

View Article


Image may be NSFW.
Clik here to view.

黑客攻击黑客 意欲何在?

黑客攻击黑客 意欲何在? 7小时前来源:E安全 E安全9月5日讯,名为“Pahan”的黑客异常偏好通过各种恶意软件感染同行黑客,想必是为了自身利益。 互联网充斥着“黑客论坛”,黑客们在这里了解黑客知识,甚至下载或购买黑客工具。 这里不是找寻高级持续威胁APT(网络间谍组织)恶意软件或漏洞利用的地方,即使最先进的杀毒引擎也难以检测APT恶意软件或漏洞利用。...

View Article

Image may be NSFW.
Clik here to view.

黑客最爱:Kali Linux发布2016.2正式版

黑客最爱:Kali linux发布2016.2正式版 21小时前来源:泡泡网 黑客和电脑大神们都用什么系统?可能没有准确的答案。但有一个参考答案可能会获得较多的分数,那就是Kali Linux。这个版本的系统常被“大神”们(例如黑客和专业人员)用于渗透测试和网络监视。现在该系统的最新发行版2016.2已经发布。 php?url=0EMW3L8CbP" alt="黑客最爱:Kali...

View Article

Image may be NSFW.
Clik here to view.

2016/09/05(513)在创造便捷、幸福的网络时代,网络安全你知多少呢?

2016/09/05(513)在创造便捷、幸福的网络时代,网络安全你知多少呢? 一点号长阳县人民检察院3小时前 当今时代,网民的网络安全意识和防护技能,关乎广大人民群众的切身利益,关乎国家网络安全。为认真做好国家网络安全宣传周活动各项工作,长阳检察院根据县委宣传部统一部署,“长阳检察”官方微信有着义不容辞的宣传责任哟。 php?url=0EMWHdah4B"...

View Article


Image may be NSFW.
Clik here to view.

云途腾高级云解决方案架构师张钦:企业私有云环境下的网络架构与安全实践

云途腾高级云解决方案架构师张钦:企业私有云环境下的网络架构与安全实践 6小时前来源:中国IDC圈 核心提示: 9月1日由工业和信息化部指导,中国信息通信研究院、中国通信标准化协会主办,数据中心联盟承办的“2016可信云大会”在京隆重召开。在私有云可信云开源解决方案分论坛上,云途腾高级云解决方案架构师张钦发表了题为“企业私有云环境下的网络架构与安全实践”的演讲。...

View Article

Image may be NSFW.
Clik here to view.

Another big British bank thinks selfies make better biometrics

HSBC is now letting business customers open and verify a bank account by using a photo and facial recognition. The idea is that you'll be able to take a simple selfie on your phone, and that can be...

View Article

Image may be NSFW.
Clik here to view.

【原创技术分享】Exponent-cms任意文件上传漏洞分析 (cve-2016-7095)

【原创技术分享】Exponent-cms任意文件上传漏洞分析 (cve-2016-7095) 2016-09-06 17:25:34 来源:安全客 作者:安全客 阅读:443次 点赞(0) 收藏 作者:Balisong 稿费:500RMB Exponent...

View Article


Image may be NSFW.
Clik here to view.

【技术分享】京东代码安全审计平台第一期建设思路

【技术分享】京东代码安全审计平台第一期建设思路 2016-09-06 13:25:17 来源:京东应急响应中心 作者:安全客 阅读:1060次 点赞(0) 收藏 一:白盒代码审计初期遇到的问题...

View Article


Hackers ejaculate 800,000 Brazzers accounts onto the dark web

Another week, another massive data leak. This time around, it’s 800,000 accounts from iconic porn site Brazzers. Although the data originated from their forum, users who have never signed up may be...

View Article

Apache web server SSL authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in...

View Article

"Catastrophic" DDoS Attack Pummels Linode Servers Over the Weekend

Linode, one of the world's top providers of virtual private servers (VPS), battled with a DDoS attack over the weekend that targeted its Atlanta data center and which the company has described as...

View Article

Image may be NSFW.
Clik here to view.

Hackers Steal Nearly 100 Million User Records from Rambler.ru

Rambler.ru, a website nicknamed Russia's Yahoo, suffered a data breach in 2012 at the hands of unknown hackers, who managed to steal nearly 100 million user records, data breach index service...

View Article


Image may be NSFW.
Clik here to view.

每日安全资讯:路由器现新漏洞:黑客远程劫持网络连接

摘要: 近日,安全专家发现Inteno家用路由器中,可能存在一个安全漏洞。该漏洞会导致黑客可以远程对家中的路由器远程劫持和监控,并且将路由器的固件改造成黑客自制的版本,从而完全接管家中联网的设备。一旦这个漏洞被利用,用户通过自己家中的设备上网,将会跳转到黑客设置好的钓......

View Article

Week 36 In Review 2016

Tools WiFi-Pumpkin github.com Framework for Rogue Wi-Fi Access Point Attack python tools for penetration testers github.com Python tools for penetration testers Nmap 7.25BETA2 Birthday Release nmap.org...

View Article


The New Security Mindset: Embrace Analytics To Mitigate Risk

Sure, conducting a penetration test can find a weakness. But to truly identify key areas of risk, organizations must start to think more creatively, just like today's hackers. You’d be hard-pressed to...

View Article

软件资产管理(SAM)助力企业网络安全

一提到“软件”,人们通常会立即想到自己电脑桌面上的那些常用软件图标。虽然软件早已经成为释放人类和社会的重要生产力、推动社会飞速前进的历史助推器,但人们对软件之重要意义的认识与理解却仍是不足――很显然,软件的范畴远远超出了电脑桌面上那些用于网页浏览、办公操作与社会交往的应用软件的范围。 软件:被低估的效用...

View Article


Image may be NSFW.
Clik here to view.

For IoT medical device firms, security issues are no longer just bad PR

More and more of the world is connected thanks to the rise of theinternet of things. The healthcare industry, like so many others, is one of those being greatly affected by this trend, as everything...

View Article

Image may be NSFW.
Clik here to view.

Black Hat USA 2016 / DEF CON 24

At the beginning of August, as every year, two of our security analysts attended the most renowned IT security conferences Black Hat USA and DEF CON to learn about the latest trends and research. This...

View Article

Image may be NSFW.
Clik here to view.

HSBC: How will we verify business banking customers? Selfies!

UK bank HSBC will allow business customers to open new bank accounts using selfies as part of plans to simplify its application process. The bank will use facial recognition software to verify...

View Article
Browsing all 12749 articles
Browse latest View live