Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

卓越的安全专家临时邮件管家U-Mail邮件网关

现代企业已经进入到无纸化办公阶段,绝少有企业不和互联网发生联系的,但是互联网环境本来就是一个鱼龙混杂泥沙俱下的环境,企业在获得极大便利的同时,也会遭遇到一些风险和陷阱。就拿给企业提供通讯服务的邮件系统来说,它就长期遭遇到垃圾邮件、病毒、钓鱼软件、不良信息的干扰和攻击,给企业的信息安全带来很大的隐患。 这些垃圾邮件和病毒具有几个特点: 1、批量制造,规模庞大,只要有一个得逞就会让收件人蒙受损失;...

View Article



Microsoft Patch Tuesday ― November 2018: Vulnerability disclosures and Snort...

Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 53 vulnerabilities, 11 of which are rated...

View Article

EOS DApp的“多事之秋”:黑客提款机 羊毛党的温床

九个亿财经消息――电影《七宗罪》用七桩匪夷所思的案件揭示了天主教教义所指的人性七宗罪,若罪行按照严重程度分别是:傲慢、嫉妒、愤怒、懒惰、贪婪、淫欲和暴食。与此同时,Linkedin创始人,硅谷殿堂级人物Reid Hoffman 也告诉我们,“一款好的社交产品,一定是能迎合人性七宗罪的其中之一。” 实际上,社交产品如是,所有的互联网产品如是,区块链产品亦如是。...

View Article

Image may be NSFW.
Clik here to view.

Easy time-series prediction with R: a tutorial with air traffic data from Lux...

(This article was first published on Econometrics and Free Software , and kindly contributed toR-bloggers) In this blog post, I will show you how you can quickly and easily forecast a univariate time...

View Article

Image may be NSFW.
Clik here to view.

腾讯安全守门人 Coolc:黑客站在旷野,他们有时孤独

如果杨勇当年没做“黑客”,现在的他八成是北京某银行的行长,就像他的同学们一样,手握几十亿批贷额度,人生有如加州海岸停靠的游艇一样简洁灿烂。 但命运抓着他的手给自己写了一个赛博世界的 ID――Coolc。当杨勇成为 Coolc 的那一刻,他的生活就变成千寻的火车,呼啸着冲进了另一个世界。 他成为了最早加入腾讯的几位黑客之一。...

View Article


Image may be NSFW.
Clik here to view.

【安全帮】多家单位官网受到攻击,请提高警惕并做好安全措施

摘要: 10 万家用路由器僵尸网络发送垃圾邮件 360 旗下的安全实验室报告了一个控制了大约 10 万家用和小型办公室路由器的僵尸网络,该僵尸网络被命名为 BCMUPnP_Hunter,利用了博通芯片组中 Universal Plug and Play 协议实现的漏洞... 10 万家用路由器僵尸网络发送垃圾邮件 360 旗下的安全实验室 报告了 一个控制了大约 10 万家用和小型办公室路由器的...

View Article

Image may be NSFW.
Clik here to view.

DoS和DDoS的区别

DDOS是DOS攻击中的一种方法。 DoS:是Denial of Service的简称,即拒绝服务,不是DOS操作系统,造成DoS的攻击行为被称为DoS攻击,其目的是使计算机或网络无法提供正常的服务。最常见的DoS攻击有计算机网络带宽攻击和连通性攻击。 DDoS:分布式拒绝服务(DDoS:Distributed Denial of...

View Article

Image may be NSFW.
Clik here to view.

PAYFORT Multiple Security Issues and Concerns in a PCI/DSS compliant payment ...

TL;DR A year ago we have been contacted by one of our clients from Middle east regarding looking for/implementing a payment processing solution for their own eCommerce solution and asked us to assist...

View Article


Image may be NSFW.
Clik here to view.

Meet the Magecart hackers, a persistent credit card skimmer group of groups...

There have been few hacker groups that have been responsible for as many headlines this year as Magecart. You might not know the name, but you probably haven’tmissed their work ― highly targeted credit...

View Article


Cybersecurity at AWS reInvent

Is your business at risk of a cyber attack? Let’s start with an honest, “Yes.” We all experience a constant supply of cyber crime news stories and most of the time it’s the large organizations or...

View Article

Consolidation is coming for the cybersecurity industry

Written by Nov 13, 2018 | CYBERSCOOP It’s starting to happen. Amid a flurry of mergers and acquisitions, the cybersecurity industry is embarking on a path of consolidation that analysts predict will...

View Article

China attackers target UK firm using Russian methods: claim

Chinese attackers have been targeting an engineering company based in Britain re-using tactics, techniques and procedures from the Russian threat groups Dragonfly and APT28, the threat intelligence...

View Article

.NET Framework November 2018 Security and Quality Rollup

Today, we are releasing the November 2018 Security and Quality Rollup. Security No new security fixes. See .NET Framework September 2018 Security and Quality Rollup for the latest security updates....

View Article


Image may be NSFW.
Clik here to view.

INTRODUCCION A LA COMPUTACION PETER NORTON PDF

Title, Introducción a la computación para bachillerato. Author, Peter Norton. Translated by, Jorge Artuto Pineda Sánchez. Publisher, McGraw-Hill, Introducción a la Computación Peter Norton Free ebook...

View Article

Image may be NSFW.
Clik here to view.

双11网购安全报告:仿冒购物App激增 类似钓鱼网站

[ 摘要 ]《网购安全生态报告》显示:假冒购物软件和专业电商购物平台成为网络黑客的新目标。 针对刚刚过去的“双十一”购物节,北京市公安局网络安全保卫总队猎网平台发布《网购安全生态报告》。报告显示:假冒购物软件和专业电商购物平台成为网络黑客的新目标。...

View Article


Image may be NSFW.
Clik here to view.

Lightning Network Passes 4000 Nodes, Reaches All-Time Capacity High

Bitcoin’s nascent mainnet implementation of the Lightning Network (LN) has reached a new milestone, passing 4,000 nodes for the first time. Lightning Handles $750K Data from monitoring resource 1ML...

View Article

Image may be NSFW.
Clik here to view.

Optus boosts investment in SA network by another $23.6 million

Australia’s second largest telco Optus is investing a further $23.6 million into its South Australian network, building more than 40 new sites by the end of March next year in a move aimed at improving...

View Article


Image may be NSFW.
Clik here to view.

网络安全、区块链和工业物联网

9月28日,加州州长签署了加州SB327法令,这是美国第一部授权物联网(IoT)设备制造安全条款的法律(有一部类似的、但范围更广的联邦法案叫做《物联网2017年网络安全改进法案》),由国土安全和政府事务委员会负责,我没有看到该委员会最近有什么动向。...

View Article

Image may be NSFW.
Clik here to view.

Secure Chorus hosts its 2nd 'Thought Leadership Platform' focused on data...

14th November 2018: Not-for-profit membership organisation, Secure Chorus yesterday hosted the second in its Thought Leadership Platform series, with the event held at London’s Level39 in Canary...

View Article

CableLabs unveils Micronets, which use AI to manage network devices

CableLabshas unveiled Micronets , which use enterprise technology and artificial intelligence to deliver better device and network management for homes. By tapping enterprise-style network...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images