Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Did you by chance hack OPM back in 2015? Good news, your password probably...

More than three years after suffering one of the largest cyber-attacks in US government history, the Office of Personnel Management has yet to adopt dozens of the security measures investigators...

View Article


Image may be NSFW.
Clik here to view.

Satellite start-up Myriota teams up with AIMS in oceans study

South Australian satellite start-up Myriota has teamed up with the Australian Institute of Marine Science to deploy marine drifters with satellite-connected sensors that can track currents, sear...

View Article

Automatically crack WiFi password with besside-ng

besside-ng is a tool like Wesside-ng but it support also WPA encryption. It will automatically crack all the WEP networks in range and log the WPA handshakes. WPA handshakes captured can be uploaded to...

View Article

单表代换加密

通用特点 在单表替换加密中,所有的加密方式几乎都有一个共性,那就是明密文一一对应。所以说,一般有以下两种方式来进行破解 在密钥空间较小的情况下,采用暴力破解方式 在密文长度足够长的时候,使用词频分析, http://quipqiup.com/ 当密钥空间足够大,而密文长度足够短的情况下,破解较为困难。 凯撒密码 原理 凯撒密码(Caesar)加密时会将明文中的 每个字母...

View Article

背包加密

背包问题 首先,我们先来介绍一下背包问题,假定一个背包可以称重 W,现在有 n 个物品,其重量分别为 $a_1, a_2,...,a_n$ 我们想问一下装哪些物品可以恰好使得背包装满,并且每个物品只能被装一次。这其实就是在解这样的一个问题 $$ x_1a_1+x_2a_2+,...,+x_na_n=W $$ 其中所有的 $x_i$ 只能为 0 和 1。显然我们必须枚举所有的 n...

View Article


More Spectre/Meltdown-Like Attacks

Back in January,we learned about a class of vulnerabilities against microprocessors that leverages various performance and efficiency shortcuts for attack. Iwrote that the first two attacks would be...

View Article

Sonar Java 5.9 发布,新增 29 条规则

Sonar Java 5.9 发布了,Sonar (SonarQube)是一个开源平台,用于管理源代码的质量。Sonar 不只是一个质量数据报告工具,更是代码质量管理平台。支持的语言包括:Java、php、C#、C、Cobol、PL/SQL、Flex 等。SonarQube Java 是 Sonar 的一个插件,用来分析 Java 代码。 此版本新增了 29 条无则,包括 12...

View Article

Image may be NSFW.
Clik here to view.

Small-Time Cybercriminals Landing Steady Low Blows

High-end crime groups are acquiring the sorts of sophisticated capabilities only nation-states once had, while low-tier criminals maintain a steady stream of malicious activity, from cryptomining to...

View Article


Security researchers discover flaw allowing access to deleted photos on...

An exploit discovered by a pair of security researchers allowed them to hack aniPhone X and access a photo that was supposedly deleted from the device. Apple was informed of the security hole and a...

View Article


Security expert says My Health Record a disaster waiting to happen

A provider of cyber security services to the government has spoken out about the weaknesses that dog the Federal Government's My Health Record system, claiming it cannot guarantee the privacy of...

View Article

Image may be NSFW.
Clik here to view.

Are Browser Extensions Safe? | Avast

While it makes a great title, not ALL browser extensions are evil. In fact, most can be helpful. The problem is that each and every browser extension, no matter its intended function, has the...

View Article

威胁用户信息安全 90个恶意App被曝光并下架

APP索取用户信息 法律和监管滞后 新华社天津11月15日电(记者周润健)记者14日从国家互联网应急中心天津分中心获悉,通过自主监测、商店送检、主动爬取、投诉举报等四大方式,国家互联网应急中心近日共检测为恶意的App90个,分别通知12个分中心协调27个应用商店、15个广告平台、4个个人网站、3个云平台等49个传播渠道下架这些恶意App。...

View Article

Competition watchdog greenlights Punters’ acquisition of Racenet

Australia’s competition watchdog, the ACCC, is not opposing the proposed acquisition of Racing Internet Services (Racenet) by Punters Paradise, a subsidiary of News Corp Australia Investments. The...

View Article


Image may be NSFW.
Clik here to view.

Child-tracking watches are 'easy to hack'

Media playback is unsupported on your device Media caption WATCH: How MiSafes watch can be hacked A location-tracking smartwatch worn by thousands of children has proven relatively easy to hack. A...

View Article

新一代抗量子计算密码芯片解决“密码危机”

广州日报讯 (全媒体记者周伟良 通讯员李世卓)第二十届中国国际高新技术成果交易会昨天开幕。今年深职院精心遴选组织了13个教师项目、6个学生创客项目参展,涉及医疗器械、智能制造、机电一体化、云计算、信息安全等领域。同时,该校3个新成立的“重量级”科研创新平台也首次亮相。...

View Article


Image may be NSFW.
Clik here to view.

Is that fancy smart gadget a privacy nightmare? A new guide has answers.

These days, even yourteddy bear might be out to get you. As the inevitable creep of "smart" features and products continues to turn everything from yourrefrigerator to yourthermostat into a connected...

View Article

Image may be NSFW.
Clik here to view.

British Airways, Newegg customer data up for sale on dark web

Financial data stolen from British Airways in a recent attack by a group known as Magecart is being hawked on the dark web, the researchers who attributed the attack claim. Security company RiskIQ,...

View Article


Government looks to further boost telco consumer protections

The Australian Government has made recommendations for further protections for telco consumers, including a strengthening of role of the Telecommunications Ombudsman. The Government’s move on...

View Article

StackPath partners with global security solutions innovator to provide free...

StackPath , a leading platform of secure edge services, recently announced it has partnered with Sectigo, formerly Comodo CA, the global innovator of security solutions, to include private SSL...

View Article

Image may be NSFW.
Clik here to view.

Comcast home security cameras target holiday package thieves

Grinchy thieves have been stealing online shopping deliveries. So Comcast is announcing new home security camera features aimed at stopping the theft of packages from our front doors. The new features...

View Article
Browsing all 12749 articles
Browse latest View live