Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Phishing Campaign targeting French Industry

We have recently observed an ongoing phishing campaign targeting the French industry. Among these targets are organizations involved in chemical manufacturing, aviation, automotive, banking, industry...

View Article



Coinbase leads $12.75M investment in project to create ‘digital security...

the $8 billion crypto exchange giant , is one of a bevy of big namecrypto investors backing a project aimed to revolutionize the U.S. securities industry using blockchain technology. Coinbase CEO,...

View Article

USPS Security Flaw Exposes Personal Data of 60 Million People

A security hole in a mail preview program from the U.S. Postal Service could have exposed the data of more than 60 million customers , giving third parties access to information including when...

View Article

Image may be NSFW.
Clik here to view.

User Confidence in Smartphone Security Abysmal

Sixty-six of percent of phone users said they had suffered data-related harm: 11 percent suffered identity theft, 22 percent account hacking, 14 percent credit cards hacking and 12 percent financial...

View Article

Make-A-Wish Website Victim of Cryptojacking Attack

In a new low, cybercriminals recently compromised the website of the Make-A-Wish Foundation and embedded a script into it that used the computing power of visitors to the site to mine cryptocurrency, a...

View Article


Image may be NSFW.
Clik here to view.

Half of all Phishing Sites Now Have the Padlock

Maybe you were once advised to “look for the padlock” as a means of telling legitimate e-commerce sites from phishing or malware traps. Unfortunately, this has never been more useless advice. New...

View Article

“I don't know what to say” Backdoor in popular event-stream NPM repo

@dominictarr Why was @right9ctrl given access to this repo? He added flatmap-stream which is entirely (1 commit to the repo but has 3 versions, the latest one removes the injection, unmaintained,...

View Article

Public key authenticated encryption and why you want it (Part II)

InPart I, I made the argument that even when using public key cryptography you almost always want authenticated encryption. In this second part, we’ll look at how you can actually achieve public key...

View Article


Image may be NSFW.
Clik here to view.

Mobile Rotexy Malware Touts Ransomware, Banking Trojan Functions

A mobile malware has accelerated its activity in 2018, launching more than 70k attacks in August through October. Mobile malware, dubbed Rotexy, has evolved from being spyware to now a dangerous...

View Article


IAST supports AppSec efficiencies while cutting costs and headaches

Interactive Application Security Testing is helping DevOps teams implement security more efficiently and with less of the headache of older methodologies. It’s easy to feel passionate about interactive...

View Article

Image may be NSFW.
Clik here to view.

Cylance Introduces AI-Powered Cloud Security Solution for AWS

Cylance Secures Cloud Workloads in Public, Private, and HybridCloud Computing Environments IRVINE, Calif. (BUSINESS WIRE) #artificialintelligence ― Cylance , the leading provider of AI-driven,...

View Article

npm package discovered to have bitcoin-stealing backdoor

@dominictarr Why was @right 9ctrl given access to this repo? He added flatmap-stream which is entirely (1 commit to the repo but has 3 versions, the latest one removes the injection, unmaintained,...

View Article

Image may be NSFW.
Clik here to view.

What is Data Classification? Guidelines and Process

In order to protect your sensitive data, you have to know what it is and where it lives. Data Classification Defined Data classification is the process of analyzing structured or unstructured data and...

View Article


Image may be NSFW.
Clik here to view.

使用docker快速搭建Permeate渗透测试系统实践

一、背景 笔者最近在做一场web安全培训,其中需要搭建一套安全测试环境;在挑选渗透测试系统的时候发现permeate渗透测试系统比较满足需求,便选择了此系统;为了简化这个步骤,笔者将系统直接封装到了docker当中,同时编写了一套启动文档,希望到时候给学员和读者参考。 二、操作实践 数据库搭建 permeate搭建 安装配置 三、数据库搭建...

View Article

Image may be NSFW.
Clik here to view.

Yubico Introduces Open Source YubiHSM SDK for Securing Infrastructures and...

PALO ALTO, Calif. & STOCKHOLM (BUSINESS WIRE) #HSM Yubico, the leading provider of hardware authentication security keys, today announced a new open source YubiHSM 2 (hardware security module)...

View Article


Sydney contactless payment trial extended to metro trains

Commuters in Sydney will now be able to use their credit cards or mobile phones to tap on and off on metro train services, instead of using their Opal cards, after the contactless payments trial run by...

View Article

Image may be NSFW.
Clik here to view.

TDE and DDM

Someone asked a question about TDE (Transparent Data Encryption) and DDM (Dynamic Data Masking), which are two different technologies that are in the security area. As I’ve mentioned in the Stairway...

View Article


Cyber Monday Special: You Can Get This $130 Wifi HD Panoramic Security Camera...

There are many wireless IP security cameras on the market. A lot of them, however, can be easily hacked which quickly renders them useless. This isn’t the case with the iPM World Camera. It, instead,...

View Article

Cyber Monday: Do You Know the Cost of Your System’s Downtime?

As Black Friday and Cyber Monday loom over eCommerce, threatening to take down your website with legions of bargain shoppers, chaos engineering firm Gremlin has calculated the exact cost of not...

View Article

Image may be NSFW.
Clik here to view.

USPS Web Vuln Exposes Data of 60 Million

The US Postal Service recently fixed a security bug that allowed any USPS.com account holder to view or change other users' data. The United States Postal Service (USPS) last week patched a...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images