Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Common Continuous Monitoring (CM) Challenges

Continuous monitoring (CM) is a crucial step for organizations to detect and mitigate the security events that may result in breaches. It offers detailed, up-to-date compliance and network status...

View Article



Two get jail terms for hacking British telco TalkTalk

Two Britons have been jailed for their role in breaching the network of the telecommunications company TalkTalk in 2015, according to the London Metropolitan Police. In a statement on Monday, the Met...

View Article

What Is an Information Security Business Manager?

An Information Security Business Manager is expected to function as a security leader within their designated role and partner with higher-ups to address security-related challenges. The tasks they...

View Article

Rowhammer Data Hacks Are More Dangerous Than Anyone Feared

The data theft technique called "Rowhammer" has fascinated and worried the cybersecurity communityfor years now, because it combines digital and physical hacking in ways that are both fascinating and...

View Article

Lazarus APT Uses Modular Backdoor to Target Financial Institutions

The advanced persistent threat group Lazarus with North Korean links has been observed using a modular backdoor during last week to compromise a series of Latin American financial institutions by Trend...

View Article


Image may be NSFW.
Clik here to view.

赌博无法提款 男子自学成黑客攻击境外博彩网站日进万元

[ 摘要 ]原本徐某是一名驾驶员,每天要开8小时的车,没想到黑赌博网站后,一次就可以获得几千元甚至上万元的收入。于是,他干脆停下驾驶员工作,还邀约了4名黑客伙伴,一起组建了黑客团伙“发财”。 犯罪嫌疑人已被警方抓获。...

View Article

Emotet Banking Trojan Uses Stolen Templates to Boost Phishing Campaign Numbers

Cofense Intelligenceobserved multiple campaigns distributing the modular and extremely dangerous Emotet banking Trojan with the added capability of using stolen email templates to impersonate "major...

View Article

Image may be NSFW.
Clik here to view.

BUF早餐铺 | 俄罗斯黑客工具“Cannon”隐蔽攻击欧美国家;工信部开展网络安全技术应用 ...

各位 Buffer 早上好,今天是 2018 年 11 月 22 日星期四,农历十月十五。今天的早餐铺内容有:俄罗斯黑客工具“Cannon”正在美欧计算机上进行更隐蔽的攻击;Adobe Flash 漏洞影响windows,macOS,linux和Chrome OS; 英国机构建议政府:强制谷歌、苹果等分享地图数据; 工信部开展网络安全技术应用试点示范项目推荐工作;...

View Article


敲诈手段升级换代 网络勒索成“黑产”新掘金术

原标题:网络勒索成“黑产”新掘金术 随着互联网技术的发展,网络黑色产业链的“玩法”推陈出新。曾经,盗取个人信息再将其出售是“黑产”流行的操作模式。如今,网络勒索成为新兴的“黑产”掘金之路,其特点是变现快、追查难。记者了解到,近年来,网络勒索的手段主要表现为三大套路,分别为用流量击溃网站、利用病毒软件大面积传播和传统勒索手段的再升级。 套路一:用流量击溃网站 勒索方式隐蔽...

View Article


Image may be NSFW.
Clik here to view.

2018上半年日韩支付类病毒变化趋势研究报告

前言 近期,腾讯安全反欺诈实验室发现一批伪装日韩快递窃取一些韩国金融机构客户使用的身份验证信息银行拦截木马,病毒木马伪装成韩国CJ “DJ“快递,日本佐川急便“急便”快递等方式诱导受害者进行安装,通过隐藏图标潜伏在用户手机,对受害人的手机远程控制,盗取受害人手机的敏感信息,激活设备管理器导致无法卸载,最后通过监控手机的银行短信验证码,实现窃取用户银行卡里的金钱。...

View Article

Image may be NSFW.
Clik here to view.

Optimising treehash calculations

I’ve been using my Glacier Push utility for a while now and it has been working well. But recently I noticed that on really large files the initial memory usage spiked, and then fell off. I suspected...

View Article

PageUp blames poor post-breach media management on PR outfit

Human resources firm PageUp People has blamed its PR agency for its failure in media management following a massive data breach that it reported in June, but has not revealed any technical details of...

View Article

Image may be NSFW.
Clik here to view.

Zero-Confirmation Forfeits: Adding Security to Unconfirmed BCH Transactions

Technology & Security 1 min ago| By Jamie Redman - | Zero-Confirmation Forfeits: Adding Security to Unconfirmed BCH Transactions On Nov. 20, the Bitcoin Cash developer Awemany announced the first...

View Article


Image may be NSFW.
Clik here to view.

Kevin Ekbatani on Malware, Solving Puzzles and Artificial Intelligence in...

Problem solving used to keep Kevin Ekbatani awake at night. These days, he works with small and medium businesses to keep them protected from malware and coordinated attacks. Wrapped in Cylance green,...

View Article

Image may be NSFW.
Clik here to view.

AWS Security Profiles: Phil Rodrigues, Principal Security Solutions Architect

In the weeks leading up to re:Invent , we’ll share conversations we’ve had with people at AWS who will be presenting at the event so you can learn more about them and some of the interesting work that...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos EP42: To the Moon, Everyone!

Beers with Talos (BWT) Podcast Ep. #42 is now available. Download this episode and subscribe to Beers with Talos: If iTunes and Google Play aren't your thing, clickhere. Ep. #42 show notes: Recorded...

View Article

Sensor network data integrity gets help from a new blockchain solution

Sixgill, LLC unveiled its new breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the...

View Article


Image may be NSFW.
Clik here to view.

美国家安全电信咨询委员会呼吁政府推进四项技术

在特朗普政府准备推出旨在加强美国网络安全的Moonshot提案之际,美国家安全电信咨询委员会本月发布一份报告草案,呼吁政府加大对四个技术领域的研究力度与资金投入,以打造“安全可靠的互联网”。...

View Article

Image may be NSFW.
Clik here to view.

Wormhole Brings Smart Contacts and Token Issuance to Bitcoin Cash

It is always difficult for cryptocurrency projects to find their niche market. In the case of Ethereum, NEO, EOS, and TRX, the addition of letting users create and issue their own tokens has done...

View Article

ipfs-wormhole: Get things from one computer to another, safely. Over IPFS...

ipfs-wormhole Get things from one computer to another, safely. Over IPFS (which is not even required to receive files thanks to the Cloudflare IPFS gateway ). Inspired by magic-wormhole and dat-cp ....

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images