Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

IDG Contributor Network: Why hacking leads to less security respect

Hacking One of the biggest trends, emphasized especially by motivational videos and social media, has been hacking, which is where you use tips or techniques because popular viral personalities use...

View Article



Image may be NSFW.
Clik here to view.

7 Real-Life Dangers That Threaten Cybersecurity

Cybersecurity means more than bits and bytes; threats are out there IRL, and IT pros need to be prepared. 1 of 8 Cybersecurity tends to focus on dangers that appear on networks or in messages. The...

View Article

Threat predictions for industrial security in 2019

The past few years have been very intense and eventful when it comes to incidents affecting the information security of industrial systems. That includes new vulnerabilities, new threat vectors,...

View Article

Image may be NSFW.
Clik here to view.

Gurucul Wins Platinum 2018 ASTORS Homeland Security Award

Company Recognized for Best User & Entity Behavior Analytics (UEBA) Solution, a Cyber Security Category It Pioneered and Continues to Lead LOS ANGELES (BUSINESS WIRE) #EY ― Gurucul , a leader in...

View Article

Image may be NSFW.
Clik here to view.

Astute Reinforces Commitment to Data Security with High Volume of 2018...

GDPR updates, new certifications among this year’s security enhancements to Astute’s customer engagement product suite COLUMBUS, Ohio (BUSINESS WIRE) #custserv Astute today announced the results of...

View Article


Image may be NSFW.
Clik here to view.

黑客宣布完成任天堂Switch 6.2系统破解:本周放出

由于NVIDIA Tegra X1芯片的RCM(恢复模式)漏洞,任天堂Switch早早就实现了破解。然而,在上周任天堂推送6.2.0固件后,通过重构安全引导流程,封杀了破解。 与此同时,今后想要接入eShop商店,也必须确保系统升级到6.2.0系统(超Ban机器也强制推送),等于在封堵漏洞的同时还做了加强。 不过,在这场任天堂于黑客的“猫鼠”游戏中,黑客短暂落后后再次反超。 黑客motezazer...

View Article

Image may be NSFW.
Clik here to view.

What should I put in Hostname when purchasing a DNSimple SSL certificate for...

I'm confused with this line in the Heroku docs ( https://devcenter.heroku.com/articles/ssl-certificate ) You must enter a subdomain in the “Host Name” field. Leaving it blank will generate a...

View Article

Image may be NSFW.
Clik here to view.

访谈|想把众测服务产品化的众安天下

国内的众测市场近两年不愠不火,人称“301”的杨蔚属于很早开展众测服务的一批人,所以在白帽子圈里名气很大。实际上早在2014年,安全牛就与301经常有接触。如今,他自己出来创业成立了一家名为“众安天下”的公司,主要业务还是众测服务。但与以往的众测相比,已经有了一些不同和变化。近日,安全牛记者采访了杨蔚,从这个早期众测服务的“老人”口中,了解他对众测的创新思路。 个人简历: 杨蔚:花名301...

View Article


Image may be NSFW.
Clik here to view.

大网安全建设:缓解基于物联网设备的分布式拒绝服务 (DDoS)

译者: 李飞 本文翻译自美国国家标准与技术研究所(NIST)下属的国家网络安全卓越中心(NCCoE,National Cybersecurity Center of Excellence)在2017年11月发布的《MITIGATING IOT-BASED DISTRIBUTED DENIAL OF SERVICE (DDOS)》,有兴趣的同学可以直接看原文。 摘要...

View Article


Image may be NSFW.
Clik here to view.

WEB安全入门系列之文件上传漏洞详解

内容大纲: 一、文件解析漏洞 二、上传本地验证绕过 三、上传服务器端验证绕过 四、漏洞高级玩法 五、上传漏洞修复 一、文件解析漏洞 概念: 黑客将恶意文件上传到服务器中解析漏洞主要说的是一些特殊文件被iis、apache、nginx在某种情况下解释成脚本文件格式的漏洞 1.1、IIS6.0解析漏洞 1.目录解析...

View Article

Image may be NSFW.
Clik here to view.

MetInfo最新版本(6.1.3)爆出SSRF漏洞

2018年11月中旬,白帽汇安全研究院监测发现了最新MetInfo的SSRF注入漏洞。该漏洞是由于MetInfo中关于图片上传的代码出现缺陷,没有对指定图片路径中的“#”等敏感字符进行过滤,使得攻击者可以借助图片上传功能的图片的相关参数来达到对内部网络的探测的目的,严重威胁内网安全。 各行业的网站都有使用MetInfo的痕迹...

View Article

Image may be NSFW.
Clik here to view.

黑客入侵电脑常用的5种手段,如果你电脑里有秘密,做好3件事

在互联网异常发达的现在,大数据和个人信息的绑定,让每个人的隐私都像是在倮奔,各种软件的使用、实名认证,我们每天在网络上发的消息、行走的轨迹、吃过的外卖、看过的电影、住过的酒店、浏览的网页,都在另一端呈现出了一个冷冰冰数据的镜像。甚至大数据比你自己都了解自己。...

View Article

Coinbase Backs Security Token Startup’s $12.7 Million Funding Round

Security token startup Securitize announced it has raised nearly $13 million in a Series A funding round Monday as part of its mission to digitize traditional securities products on a blockchain. Led...

View Article


Image may be NSFW.
Clik here to view.

Securitize Raises $12.75 Million to Tokenise the $7 Trillion Securities...

Securitize, a compliance platform for digitising securities on the blockchain, has raised $12.75 million to tokenise the $7 trillion securities industry. The Series A fundraising round was led by...

View Article

Operational Technology in Industrial IoT Can’t Tolerate IT-Style Patching....

Speaking about the Industrial Internet of Things (IIoT).Operational technology in industrial internet of things (IoT) can’t tolerate IT style patching. Using “Threat Analysis” is a Safe and Powerful...

View Article


Image may be NSFW.
Clik here to view.

基于威胁建模的业务安全保障方法

什么是威胁建模 所谓威胁,通常是指系统的安全漏洞,可能存在于系统的具体实现上,也可能存在于系统的安全策略配置上。安全漏洞往往给攻击者提供了非授权的访问和攻击系统的入口点,达成控制或者破坏系统的目的。 业务风险是一种典型的威胁, 如航旅业务往往面临机票爬取、恶意占座等业务风险 ,如不能对业务风险进行有效控制,会影响业务正常开展,增加经营成本。...

View Article

Sequoia: The Seeding Sees The Light Of Day

The Sequoia team proudly presents the first release of a new, cool OpenPGP implementation. On October 16, 2017, we made the first commit to the Sequoia repository. Just over a year and a thousand...

View Article


Image may be NSFW.
Clik here to view.

Cyberthreats to financial institutions 2019: overview and predictions

Introduction key events in 2018 The past year has been extremely eventful in terms of the digital threats faced by financial institutions: cybercrime groups have used new infiltration techniques, and...

View Article

Image may be NSFW.
Clik here to view.

Review: ImmuniWeb offers true automated penetration testing

One of the best ways for organizations to get an idea of their network vulnerabilities is to hire penetration testers to come in and perform real attacks against their network, only without the added...

View Article

Image may be NSFW.
Clik here to view.

A Look into the Connection Between XLoader and FakeSpy, and Their Possible...

By Lorin Wu and Ecular Xu XLoader and FakeSpy are two of the most prevalent malware families that emerged from the mobile threat landscape recently. We firstreported about XLoader in April 2018 when it...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images