Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Ben’s Book of the Month: Review of “Click Here to Kill Everybody: Security...

Perhaps the most meaningless term in information security is though leader . I know what it is supposed to mean, but many people who consider themselves information security thought leaders are...

View Article



Image may be NSFW.
Clik here to view.

The Arlo security camera goes 4K

The Arlo line was something of a surprise hit for Netgear, causing the networking company to spin it off into its own business earlier this year. The Arlo ecosystem is one of the most robust in the...

View Article

Starwood Hotels and Bitpay Breaches, njRAT Worm, and More | Avast

Marriott-owned Starwood Hotels data breach Another day, another data breach. Marriott-owned Starwood, the largest hotel chain in the world, confirmed that its Starwood Hotels database, which includes...

View Article

Image may be NSFW.
Clik here to view.

Free download: Closing the Cybersecurity Gap: 3 Keys to an Analytics-Driven...

According to the 2018 Security Priorities study from IDG, 28% of IT professionals and leaders say that external cyber threats force them to redirect time and focus away from more strategic tasks....

View Article

Image may be NSFW.
Clik here to view.

How cybersecurity systemization is changing financial institutions today

Cyberattacks are a global epidemic today. They target organizations, critical infrastructure, and governments around the world with timely, sophisticated attacks. Examples of this include ransomware...

View Article


Image may be NSFW.
Clik here to view.

80 hackers vie for cumulative prize of RM30,000 in PLUS Hackathon 2018

The country’s largest highway concessionaire PLUS organised a Hackathon aimed at producing innovative and creative applications. ― Bernama pic KUALA LUMPUR, Nov 30 ― A total of 80 hackers from 20...

View Article

AWS re:Invent 2018 Recap: Security, DevOps, ML, & Hybrid Cloud Take...

Another year at AWS re:Invent has come and gone. As usual it was a jam packed show full of exciting announcements, great keynotes, sessions, and interesting conversations. In case you couldn’t make it...

View Article

Image may be NSFW.
Clik here to view.

Greg Fitzgerald Reducing Operational Risk with JASK

JASK is modernizing security operations with products and services to reduce organizational risk and improve human efficiency. They are empowering the SOC analyst to focus on investigative and...

View Article


Image may be NSFW.
Clik here to view.

NYC buses: Cubist regression with more predictors

(This article was first published on R Programming DataScience+ , and kindly contributed toR-bloggers) Categories Advanced Modeling Tags Data Management Linear Regression R Programming We have...

View Article


Hackers Exploit UPnP in Routers to Expose Private Networks to Attacks

Hackers are exploiting insecure UPnP implementations in routers to expose millions of computers from inside private networks to SMB attacks. Universal Plug and Play (UPnP) is a service that allows...

View Article

Join the fight ― become an ethical hacker with this $39 master class

If you’re looking to roll down a new career path, you should stick tight to this little mantra: go where the jobs are. And if you want a job that’s all but guaranteed to present loads of opportunities...

View Article

DeepSec 2018 Wrap-Up

I’m writing this quick wrap-up in Vienna, Austria where I attended my first DeepSec conference. This event was already on my schedule for a while but I never had a chance to come. This year, I...

View Article

Marriott Hotels 4 Year Hack Impacts Half a Billion Guests!

The Marriott statement said for around 326 million of its guests, the personal information compromised included “some combination” of, name, address, phone number, email address, passport number, date...

View Article


Image may be NSFW.
Clik here to view.

Retailers Make Big Strides In Offering Clear Unsubscribe Links

They're also honoring unsubscribe requests as soon as they're made, according to the Online Trust Alliance. A survey of North America's top 200 retailers released this week by the Internet Society's...

View Article

Image may be NSFW.
Clik here to view.

万豪被泄数据或能破解用户信用卡密码 消费者怎么做?

相关新闻: 万豪旗下喜达屋酒店数据库遭入侵 5亿顾客信息或泄露 新浪 美股 北京时间12月1日讯, 万豪国际 (Marriott International)昨日证实,喜达屋(Starwood)客房预订数据库遭到破坏,可能危及5亿名酒店客人的敏感个人数据。...

View Article


Image may be NSFW.
Clik here to view.

OSSEC For Website Security: PART II Distributed Architectures Using Agents an...

This article assumes you already have OSSEC deployed. If you need a refresher, refer to the Part I of OSSEC for website security , written March 2013. OSSEC is popular open-source Host Intrusion...

View Article

Special Guest Tanya Janca, DevOps and AppSec, Women in Cybersecurity #82

In this episode Tom and Scott are joined by special guest Tanya Janca who is a Senior Cloud Developer Advocate for Microsoft . We speak with Tanya about her journey into the world of AppSec, women and...

View Article


Setup AWS MySQL 5.6 Aurora as a Slave for an external Master with SSL

Setting up Aurora as a slave for an external mysql server that acts as the master is a bit tricky. Of course we want a secured connection. For this reason we need to create client certificates to be...

View Article

Marriott group hit by massive breach, details of 500m stolen

Hotel group Marriott International has reported a data breach in its Starwood line of hotels and resorts, with the details of up to 500 million guests likely to have been stolen by malicious attackers....

View Article

Image may be NSFW.
Clik here to view.

Analyzing infected documents

Occasionally, users ask me to take a look at a document (usually .docx or .pdf) that they are unsure of. It might be that the sender is someone known to them but they weren't expecting a report or an...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images