Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Claimed 'world-first' fibre transmission over 1 Pbps, 12 million times faster...

A "world-first optical fibre as fine as a human hair" has been developed by sciences from the Macquarie University Photonics Research Centre, promising transmission of over 1 petabit of data per...

View Article


Image may be NSFW.
Clik here to view.

卡巴斯基实验室:WannaCry仍在亚洲活跃

曾经席卷全球的WannaCry病毒,并不是一个被人遗忘的老故事,针对勒索病毒的攻防战还在持续进行中。...

View Article

Image may be NSFW.
Clik here to view.

Robert Half’s Journey to Implementing High Availability, Performance, & S...

This blog post summarizes a Dreamforce 2018 session delivered on September 25. To watch the session, check out this recording . Shane Sigler and James Johnson answering questions after their...

View Article

Image may be NSFW.
Clik here to view.

New software capability helps manage third-party cyber risks

With digital transformation enabling supply chains to become ever more integrated, businesses no longer have to worry just about the risks posed by their own systems, they must consider those they are...

View Article

Image may be NSFW.
Clik here to view.

针对巴西的Metamorfo银行木马的攻击活动分析

前言 早在今年的4月,FireEye实验室就公布了几起针对巴西公司的垃圾邮件攻击,旨在传播银行木马。由于在实施攻击的各个阶段,攻击者使用多种技术规避检测并传播恶意payload,使得研究人员难以完整的分析这类型攻击。例如,火眼实验室检测发现,某次攻击首先发送含有HTML附件的邮件,其中的附件重定向至一个谷歌短URL,而后者又将受害者重定向至云存储站点如GitHub、Dropbox或Google...

View Article


Image may be NSFW.
Clik here to view.

新型密码窃取木马:AcridRain

本文将介绍一种名为AcridRain的新型密码窃取软件,它在过去的2个月内更新频繁。 一、简介 AcridRain是一款用C/C++编写的新型密码窃取软件,最早于2018年7月11日在黑客论坛出现。它可以从多种浏览器窃取凭证,cookies及信用卡信息。除此之外,还有转储Telegram和Steam会话、抢占Filezilla连接等功能。详细介绍见下文:...

View Article

Image may be NSFW.
Clik here to view.

Get this CompTIA Cyber Security Expert Bundle for only $59

Today's highlighted deal comes via ourOnline Courses section of theNeowin Deals store where for only a limited time , you can save 80% off* this CompTIA Cyber Security Expert Bundle . Get the training...

View Article

Image may be NSFW.
Clik here to view.

Docker Security Best Practices: 2018 Wrap-Up

Docker is designed to be secure by default. But like most such things, Docker can be made even more secure. This article helps you do that by discussing the key concepts that you should embrace for...

View Article


Image may be NSFW.
Clik here to view.

Five Tips to Secure DevOps

Five Tips for DevOps Application Security In a recent blog, we took a closer look at DevOps and how this agile process has led to modern software “factories” to develop customer applications in a...

View Article


Image may be NSFW.
Clik here to view.

Hacking Connected Home Alarm Systems The Expensive [part 2]

TL;DR: We were wondering whether price affects the security of IoT appliances.So we verified the security of two differently priced connected home alarm systems. Both IoT alarms are marketed as an easy...

View Article

Image may be NSFW.
Clik here to view.

New DigiCert poll shows companies taking monetary hits due to IoT-related...

Even as enterprises across the globe hustle to get their Internet of Things business models up and running, there is a sense of foreboding about a rising wave of IoT-related security exposures. And, in...

View Article

Image may be NSFW.
Clik here to view.

【手把手撸一个脚手架】第三步, 获取 github 项目信息

脚手架, 作为一个工具, 主要是用来搬运我们已经准备好的项目模板(webpack 配置, koa 项目雏形等等), 这一步我们就来创建用于搬运的项目模板. 并通过接口获取相关信息 github Api 文档 ps: 这一步基于 github 若有没使用过的小伙伴, 请加油 创建一个专门用于维护项目模板的项目组 为了不和自己平时写的各种辣鸡代码混杂在一起, 这里我专门创建了一个...

View Article

Image may be NSFW.
Clik here to view.

Crypto Security Firm Highlights Three Possible Outcomes for the BCH Hard Fork

As the day of the Hardforkof the Bitcoin Cash network arrives, the Crypto security firm PeckShield releases three possible outcomes of the BCH hard fork. Current State of the fork Bitcoin cash is...

View Article


Detectify security updates for 15 November

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and...

View Article

Download Malwarebytes Today and Protect Your Data for Free

Everyone lives on the internet, period. Whether you’re streaming a standup special on Netflix, answering emails from your boss, chatting on Tinder, or completing everyday errands like paying bills...

View Article


Image may be NSFW.
Clik here to view.

AWS Security Profiles: Brigid Johnson, Senior Manager of Product Management

In the weeks leading up to re:Invent , we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro and Moxa Team Up to Create “TXOne Networks” IT/OT Security Conv ...

Add to favorites “Many plants are not only riddled with vulnerabilities, but operators lack visibility of what those vulnerabilities are” Japanese cybersecurity multinational Trend Micro has agreed to...

View Article


Image may be NSFW.
Clik here to view.

BitGo First to Deliver Multi-Signature Security for Over 100 Coins and Tokens

PALO ALTO, Calif. (BUSINESS WIRE) BitGo, the market leader in institutional cryptocurrency financial services, announced today that it has exceeded its milestone to reach 100 coins and tokens by the...

View Article

Image may be NSFW.
Clik here to view.

Connected Wristwatch Allows Hackers to Stalk, Spy On Children

“Our advice is to stop using this watch” as mitigations are not available, researchers told Threatpost. Wristwatches with tracking capabilities have gained popularity over the years as an easy way for...

View Article

Image may be NSFW.
Clik here to view.

From GitOps to Adaptable CI/CD Patterns for Kubernetes At Scale

Sponsored by Google, this article is the third ina three-part series on CI/CD with Kubernetes. Twain Taylor Twain began his career at Google, where, among other things, he was involved in technical...

View Article
Browsing all 12749 articles
Browse latest View live