Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

“天府杯”漏洞挖掘论坛开讲!满足你对漏洞挖掘的全部求知欲

2018年11月16日至17日,由360公司、百度、腾讯、阿里巴巴、清华大学与中科院等多家企业和研究机构在成都联合主办了首届“天府杯”国际网络安全大赛暨2018天府国际网络安全高峰论坛。大赛期间,除开展了“天府杯”国际破解大赛外,还举办了多个大咖云集的网络安全论坛。...

View Article



Image may be NSFW.
Clik here to view.

The rare form of machine learning that can spot hackers who have already...

In 2013, a group of British intelligence agents noticed something odd. While mostefforts to secure digital infrastructure were fixated on blocking bad guys from getting in, few focused on the...

View Article

Image may be NSFW.
Clik here to view.

95% of Organizations Have Cultural Issues Around Cybersecurity

Very few organizations have yet baked cybersecurity into their corporate DNA, research finds. These days, a sinister phenomenon called cybercrime-as-a-service is steadily growing, enabling malcontents...

View Article

以太坊合约审计 CheckList 之变量覆盖问题

作者:LoRexxar'@知道创宇404区块链安全研究团队 时间:2018年11月16日 系列文章: 《以太坊智能合约审计 CheckList》 《以太坊合约审计 CheckList 之“以太坊智能合约规范问题”影响分析报告》 《以太坊合约审计 CheckList 之“以太坊智能合约设计缺陷问题”影响分析报告》 《以太坊合约审计 CheckList 之“以太坊智能合约编码安全问题”影响分析报告》...

View Article

Image may be NSFW.
Clik here to view.

社团链应用场景深度解析之----零知识身份认证

在计算机网络世界中,一切信息包括用户的身份信息都是用一组特定的数据来表示,计算机只能识别用户的数字身份来识别操作是否是用户本人来进行,所有对用户的授权也是针对用户数字身份的授权。认证信息的泄露可能导致用户全部数据被窃取,造成无法估计的损失。因此,如何确认持有数字身份的操作者是真正的合法拥有者,保持物理身份与数字身份对应统一是用户网络资产与数据安全的第一道关口,身份认证技术在计算机互联网世界的地位尤为...

View Article


Image may be NSFW.
Clik here to view.

AWS Security Profiles: Myles Hosford, Compliance Specialist

In the weeks leading up to re:Invent , we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News: Holiday Cybercriminals & Cryptomining Malware...

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn the common threats and the best...

View Article

Image may be NSFW.
Clik here to view.

BlackBerry 宣布以 14 亿美元收购网络安全公司 Cylance

BlackBerry今日宣布已签订最终协议,将斥资 14 亿美元现金以及承担未兑现的员工激励,全面收购人工智能和网络安全企业 Cylance 。该交易还需获得监管部门批准并满足其他惯例成交条件,预计将于 BlackBerry 当前财年(2019 年 2 月)结束前完成。 BlackBerry 执行董事长兼首席执行官程守宗表示:“Cylance 在人工智能和网络安全方面的领导地位与...

View Article


Best-of-breed security products still dominate -- kind of

The history of security purchasing centers around best-of-breed products. With each requirement, security professionals would research products, review third-party tests, bring in products for internal...

View Article


Douglas Hunley: pgBackRest 2.07 and macOS Mojave

pgBackRest 2.07 was announced today. As usual, I immediately downloaded it and tried to get it up and running on my MacBook (currently running Mojave). It wasn’t as straightforward as one might hope,...

View Article

Image may be NSFW.
Clik here to view.

Book review: You’ll see this message when it is too late

A new book from Professor Josephine Wolff at Rochester Inst. of Technology called You’ll see this message when it is too late is worth reading .While there are plenty of other infosec books on the...

View Article

Image may be NSFW.
Clik here to view.

PCI for SMB: Requirement 9 Implement Strong Access Control Measures

Welcome to the sixth post of a series on understanding the Payment Card Industry Data Security Standard PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using...

View Article

Image may be NSFW.
Clik here to view.

前方黑客出没比特大陆617个btc已被卷走

世间只有一种罪行, 那就是盗窃。 卡勒德胡赛尼《追风筝的人》 | 盗窃细节是 ? | | 黑客为何盯上交易所 ? | | 如何抵御黑客 ? | “黑客”这个词其实早在莎士比亚时代就已存在了,但是大众真正认识和理解它却是在计算机问世之后。 这类擅长IT技术的“特殊人群”藏在密密麻麻的光纤网线中,通过攻击全球范围内的计算机来牟取巨额利益。 而最近又爆出这群神秘人又将黑手伸向了矿机巨头比特大陆。...

View Article


Image may be NSFW.
Clik here to view.

Delphix Bolsters Executive Team to Support Surging Global Demand for DataOps

New Chief Marketing Officer and First-Ever Global Practice Director for Data Transformation join Delphix to help enterprises around the world accelerate digital innovation REDWOOD CITY, Calif.,...

View Article

Image may be NSFW.
Clik here to view.

9to5Toys Lunch Break: iTunes TV Show Sale from $5, Ring Alarm Security System...

9to5Toys Lunch Break delivers the best deals every day of the week at 12:30PM EST. This includes price drops on all sorts of Apple products from iPad to MacBook and everything in between, as well as...

View Article


Css media queries why do the contents show the div?

this is my first attempt at doing media queries for responsive design so I am just a beginner at this. I have a wrapper called "skills-wrapper" that has 4 divs called "skills" lined up in a row so...

View Article

Image may be NSFW.
Clik here to view.

TechCrunch 深圳黑客马拉松明日鸣枪,你准备好了吗

各位准备好了吗?明天 TechCrunch 深圳黑客马拉松就将开跑:免费的食品饮料、好玩的挑战、贵重的或有趣的奖品……当然最重要的,就是结识新的朋友,享受一个极客的周末。 如果你还没有报名,请 点击这里 。 我们的活动地址是 深圳市南山区深圳湾创新广场,深圳湾科技生态园 7 栋 B 座 3 层 (您可点此地址直接定位) 下面是我们活动的 时间安排 : 周六 上午 9:00 签到开始 10:00...

View Article


Scanning Akamai's Edge Servers for Vulnerabilities, Correctly

By,Kaan Onarlioglu Continuous monitoring of the Akamai Edge Platform for security vulnerabilities is an integral part of all engineering efforts at Akamai. In addition to our internal vulnerability...

View Article

Image may be NSFW.
Clik here to view.

绿盟科技互联网安全威胁周报NSFOCUS-18-45

阅读: 104 绿盟科技发布了本周安全通告,周报编号NSFOCUS-18-45,绿盟科技漏洞库本周新增53条,其中高危7条。本次周报建议大家关注QEMU NVM Express Controller 缓冲区溢出漏洞等,此漏洞位于nvme设备的nvme_cmb_ops例程中。攻击者可利用该漏洞造成拒绝服务,也可能运行任意代码。目前厂商已经发布了升级补丁,请用户及时到厂商主页下载补丁修复这个安全问题。...

View Article

Image may be NSFW.
Clik here to view.

Debunking the Fallacy that Paid Certificates Are Better than Free...

Debunking the Fallacy that Paid Certificates Are Better than Free Certificates, and Other Related Nonsense kdobieski Fri, 11/16/2018 08:04 The rise of encryption Right now we’re seeing encryption...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images