Windows PCs Infected with Backdoor Trojan via Microsoft Publisher Files
Bitdefender security researchers say they've uncovered a spam flood spreading booby-trapped Microsoft Publisher (PUB) files laced with a new trojan that opens a backdoor on infected computers. The...
View Article让计算机崩溃的简短代码
经典的fork炸弹攻击 利用非常少的代码 让计算机反复直至最后耗尽资源。计算机专家Ben Liblit说,原因是计算机只会逐句的执行指令,它们不具有常识。首例造成问题的fork炸弹发生于1978年。而造成计算机故障的最短小代码应该是“0”。任何数除以零都无法得到确定的数字,这是计算机无法处理的。网络安全专家Steve Lord说,这一情况出现在 1997年9月的约克城号航母上...
View ArticleHow Raygun’s security measures keep your customer’s data safe
At Raygun, we are serious about your privacy and sensitive information. Our software gives you the unique ability to drill down into individual user sessions so you can provide exceptional customer...
View Article“四个首次”创新网络安全宣传周
原标题:“四个首次”创新网络安全宣传周 本月19日,2016年国家网络安全宣传周将在武汉拉开序幕。昨日,长江日报记者从在京召开的新闻发布会上获悉,和前两届相比,本届活动进行了不少形式和活动的创新。 本届宣传周的开幕式、网络安全博览会、网络安全技术高峰论坛、网络安全电视知识竞赛等重要活动在武汉市举行。这是首次在全国范围内统一举办网络安全宣传周,也是首次在地方城市举行国家网络安全宣传周开幕式等重要活动。...
View Article聚焦2016年国家网络安全宣传周“五大亮点”
原标题:聚焦2016年国家网络安全宣传周“五大亮点” 2016年国家网络安全宣传周新闻发布会举行(中国网信网 郭研/摄) 今年网络安全宣传周将在9月19日至25日于武汉市举行。9月7日下午,记者在中央网信办、武汉市人民政府举办的2016年国家网络安全宣传周新闻发布会上了解到,这场即将到来的网络安全领域大型活动精彩纷呈,涉及以下“五大亮点”值得期待。 首次全国范围内统一举办、首次在地方城市举行...
View Article「首次限免」防毒护盾 - Mac 杀毒软件
记得小时候家里刚买电脑的时候,什么配件都还没有装,首先就被卖电脑的人安利了杀毒软件,直至今天,只要田间有人轻轻地打呼噜,就觉得是瑞星小狮子在桌面上睡觉。在转向 Mac 的这些年,基本上和杀毒软件 say goodbye 了,不过随着攻击 Mac 的人越来越多,Mac 也不再是一片净土了,不妨试试今天限免的「Antivirus Spartan Pro」吧!...
View ArticleBecoming a Penetration Tester: Successes in The Field
The job of an ethical hacker is to uncover weaknesses or vulnerabilities in a computer network to help that company to protect itself from less ethical hackers. The so-called black hat hackers may be...
View ArticleSIEM as a Service
Not all SaaS solutions are equal Traditionally an organization needing a SIEM deployment has had two options. Either build, maintain and use the SIEM on-premises or pay an external service provider for...
View Article网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失
网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失 一点号湖北发布1小时前 php?url=0EROuM608K" alt="网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失"...
View ArticleResearcher reports XSS hole in Google France
Security researchers have disclosed an cross-site scripting vulnerability in Google France. The flaw is the third most common web application security hole on the internet, and is commonly exploited in...
View Article谷歌、苹果或被要求采用印安全技术 不会乖乖就范
印度国旗 凤凰科技讯 北京时间9月14日消息,据外媒报道,印度与全球科技产业的关系越来越让人忧虑,仅今年以来,印度政府已经叫停Facebook的免费互联网服务,拒绝免除苹果在本国采购商品的义务。现在,它要强制科技公司采用政府资助实验室开发的安全技术。...
View ArticleWatchdog Slams UK Government Cybersecurity
Government spending watchdog the National Audit Office (NAO) has slammed the government’s approach to cybersecurity, branding it confused and chaotic. In a new report out today, the NAO claimed that...
View ArticleSecurity Threats Are Like a Box of Chocolates
Posted byFrank Yue on Sep 14, 2016 inApplication Delivery |0 comments You never know what you are going to get when you take something from a box of chocolates. I can guarantee you that sometimes you...
View ArticleEssential Online Security Tips for Product Owners
There are many reasons to outsource your software development project. For one, there’s usually a cost saving. In addition to this, contracting out development helps avoid the management hassle of...
View Article树立正确的网络安全观,切实维护国家网络安全
树立正确的网络安全观,切实维护国家网络安全 一点号中国互联网举报中心1小时前 观念决定方向,思路决定出路 ――树立正确的网络安全观,切实维护国家网络安全。php?url=0ERTMYwL93" alt="树立正确的网络安全观,切实维护国家网络安全" />...
View Article超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元
超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元 15小时前来源:车云网 那位声名狼藉的天才黑客,终于拿出了自己的产品。 php?url=0ERONtHZHl" alt="超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元" />今年 TechCrunch Disrupt SF 大会上,著名的 iPhone 及...
View Article警方破获涉案3000余万元的网络诈骗团伙 抓获团伙成员20余人
警方破获涉案3000余万元的网络诈骗团伙 抓获团伙成员20余人 2小时前来源:凤凰网 人民网鄂州9月15日电 诈骗团伙假冒淘宝客服,以收取“保证金”、开通“假一赔三”、“七天包退换”服务为由,诈骗2000余名淘宝新店主,涉案价值3000余万元。近日,警方通过对冒充淘宝客服网络诈骗系列案件线索进行缜密侦查,先后将假冒淘宝客服诈骗团伙20余名成员抓获。...
View ArticleEurekAlert Shuts Down Website Following "Serious Security Breach"
EurekAlert took down its website last night following an incident which the service has labeled as "a serious security breach." All links pointing to the site now redirect to a page that informs users...
View ArticleReport: IT is Worried About Security and Cost of Cloud Automation
Enterprises want to automate cloud infrastructure in order to reduce the complexity of cloud maintenance but are worried about the security and cost of automating, a new survey finds. According to...
View ArticleDevOps and the Art of Secure Application Deployment
Secure application deployment principles must extend from the infrastructure layer all the way through the application and include how the application is actually deployed, according to Tim Mackey,...
View Article