Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Sennheiser Debacle: The Consequences of Poorly Secured Certificates

Sennheiser Debacle: The Consequences of Poorly Secured Certificates kdobieski Thu, 11/29/2018 10:22 The Sennheiser software in question was used to set up and manage softphones that allow users to make...

View Article


Comcast is proxying all unencrypted content

I originally posted this on the originally unsecure platform, facebook . I should edit this for grammar, but I just wanted to bang it out, because you know... job/work. I cannot stand #comcast, no one...

View Article

Increase the number of open files for jobs managed by supervisord

In linux, a non-privileged user by default can only open 1024 files on a machine. This includes handles to log files, but also local sockets, TCP ports, ... everything's a file and the usage is...

View Article

Image may be NSFW.
Clik here to view.

Users Failing Phishing Simulations? That’s ok

Phishing simulations come with a range of emotions for the users who interact with them. Some will simply ignore them, others may fail by clicking on a link or attachment, and for the well-trained,...

View Article

Image may be NSFW.
Clik here to view.

Is your AI software vendor taking security shortcuts?

Artificial intelligence software that can learn and improve human decision-making is transforming business. All sorts of companies are looking to AI to gain an edge over competitors. Unfortunately,...

View Article


Image may be NSFW.
Clik here to view.

Establishing True Trust in a Zero-Trust World

Our goal should not be to merely accept zero trust but gain the visibility required to establish real trust. The term "zero trust" was coined by Forrester in 2010. The concept was also central to the...

View Article

Top 30 Penetration Tester (Pentester) Interview Questions and Answers for 2019

Introduction It seems like hardly has one cyber-threat appeared before many variants of it soon follow, affecting both individuals and corporations alike. But this is no coincidence: One of the key...

View Article

Image may be NSFW.
Clik here to view.

Anti-Botnet Guide Aims to Tackle Automated Threats

The international guide is intended to help organizations defend their networks and systems from automated and distributed attacks. The Council to Secure the Digital Economy (CSDE) and Consumer...

View Article


Information Security in Conflict Zones

Introduction In today’s post GDPR-era, the citizens of most developed countries are regularly reminded by governments, media companies and non-governmental organizations of the importance of complying...

View Article


Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi...

In an episode of “The Twilight Zone” called “Living Doll,” a lifelike doll named Talky Tina turned rogue and terrorized a family. This nightmare scenario of out-of-control toys is sometimes portrayed...

View Article

Bug Bounty Programs: The Low-Down

The global software industry is massive. Enterprise software alone is predicted to be worth $500 billion a year by 2022. Unless we live entirely off-grid, every part of our lives and work is touched by...

View Article

德国网络安全战略发展及实施情况

【编者按】德国一直很重视网络空间的安全与发展,尤其注重国家网络安全行动的顶层设计。德国网络安全战略侧重于自身网络安全防护能力的提升,同时注重通过有效的国际协调行动促进网络空间的安全。本文围绕德国网络安全战略,从主要内容、行动方案、实现措施、主要特点等方面,重点分析了德国网络安全战略发展及实施情况。 德国网络安全战略发展及实施情况 华屹智库...

View Article

NZ regulator looks to industry to improve telecommunications retail service...

New Zealand’s competition enforcement agency the Commerce Commission has released a framwork paper outlining its approach to implementing new provisions under the Telecommunications Act to improve...

View Article


MITRE Changes the Game in Security Product Testing

Nonprofit has published its first-ever evaluation of popular endpoint security tools - measured against its ATT&CK model. There were no grades, scores, nor rankings, but the official release today...

View Article

Image may be NSFW.
Clik here to view.

了解目标攻击:目标攻击的六个组成部分

有针对性的攻击是(或应该)是任何地方大型组织的重要关注点。精心设计的攻击分六个阶段进行,显示攻击者如何在目标内进展。 自从有针对性的攻击首次出现在威胁环境中已有好几年了,各种威胁和我们对他们的理解都已经发生了演变和成熟。从那时起我们学到了什么以及发生了什么变化?...

View Article


Image may be NSFW.
Clik here to view.

Introducing the $12.5 Million Machine Identity Protection Development Fund

Introducing the $12.5 Million Machine Identity Protection Development Fund Scott Carter Thu, 11/29/2018 18:11 Venafi created the Fund to accelerate the integration of machine identity intelligence into...

View Article

Image may be NSFW.
Clik here to view.

TCV Invests in Machine Identity Protection Provider Venafi A Pioneer of a Vit...

TCV Invests in Machine Identity Protection Provider Venafi A Pioneer of a Vital New Category in Cybersecurity Scott Carter Thu, 11/29/2018 18:25 At TCV, we’ve been watching the number of machines grow...

View Article


Google Shut Out Privacy, Security Teams From Secret China Project

An anonymous reader quotes a report from The Intercept about Google's secretive plans to build a censor version of its search engine for China: The objective, code-namedDragonfly, was to build a search...

View Article

Image may be NSFW.
Clik here to view.

Fragmented SQL Injection Attacks The Solution

Ask someone how they’d detect whether a SQL Injection vulnerability exists in a web application and they’re likely to suggest putting a single quote into a parameter in the application. Then, if they...

View Article

Node v10.14.1 (LTS)

[ 5d17bf1e13 ] - win : add prompt to tools installation script (Joo Reis) #23987 [ 589f0d2192 ] - win : clarify Boxstarter behavior on install tools (Rob Reynolds) #23987 [ 9e293c1328 ] - Revert "...

View Article
Browsing all 12749 articles
Browse latest View live