Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Windows PCs Infected with Backdoor Trojan via Microsoft Publisher Files

Bitdefender security researchers say they've uncovered a spam flood spreading booby-trapped Microsoft Publisher (PUB) files laced with a new trojan that opens a backdoor on infected computers. The...

View Article



让计算机崩溃的简短代码

经典的fork炸弹攻击 利用非常少的代码 让计算机反复直至最后耗尽资源。计算机专家Ben Liblit说,原因是计算机只会逐句的执行指令,它们不具有常识。首例造成问题的fork炸弹发生于1978年。而造成计算机故障的最短小代码应该是“0”。任何数除以零都无法得到确定的数字,这是计算机无法处理的。网络安全专家Steve Lord说,这一情况出现在 1997年9月的约克城号航母上...

View Article

How Raygun’s security measures keep your customer’s data safe

At Raygun, we are serious about your privacy and sensitive information. Our software gives you the unique ability to drill down into individual user sessions so you can provide exceptional customer...

View Article

“四个首次”创新网络安全宣传周

原标题:“四个首次”创新网络安全宣传周 本月19日,2016年国家网络安全宣传周将在武汉拉开序幕。昨日,长江日报记者从在京召开的新闻发布会上获悉,和前两届相比,本届活动进行了不少形式和活动的创新。 本届宣传周的开幕式、网络安全博览会、网络安全技术高峰论坛、网络安全电视知识竞赛等重要活动在武汉市举行。这是首次在全国范围内统一举办网络安全宣传周,也是首次在地方城市举行国家网络安全宣传周开幕式等重要活动。...

View Article

Image may be NSFW.
Clik here to view.

聚焦2016年国家网络安全宣传周“五大亮点”

原标题:聚焦2016年国家网络安全宣传周“五大亮点” 2016年国家网络安全宣传周新闻发布会举行(中国网信网 郭研/摄) 今年网络安全宣传周将在9月19日至25日于武汉市举行。9月7日下午,记者在中央网信办、武汉市人民政府举办的2016年国家网络安全宣传周新闻发布会上了解到,这场即将到来的网络安全领域大型活动精彩纷呈,涉及以下“五大亮点”值得期待。 首次全国范围内统一举办、首次在地方城市举行...

View Article


Image may be NSFW.
Clik here to view.

「首次限免」防毒护盾 - Mac 杀毒软件

记得小时候家里刚买电脑的时候,什么配件都还没有装,首先就被卖电脑的人安利了杀毒软件,直至今天,只要田间有人轻轻地打呼噜,就觉得是瑞星小狮子在桌面上睡觉。在转向 Mac 的这些年,基本上和杀毒软件 say goodbye 了,不过随着攻击 Mac 的人越来越多,Mac 也不再是一片净土了,不妨试试今天限免的「Antivirus Spartan Pro」吧!...

View Article

Becoming a Penetration Tester: Successes in The Field

The job of an ethical hacker is to uncover weaknesses or vulnerabilities in a computer network to help that company to protect itself from less ethical hackers. The so-called black hat hackers may be...

View Article

SIEM as a Service

Not all SaaS solutions are equal Traditionally an organization needing a SIEM deployment has had two options. Either build, maintain and use the SIEM on-premises or pay an external service provider for...

View Article


Image may be NSFW.
Clik here to view.

网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失

网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失 一点号湖北发布1小时前 php?url=0EROuM608K" alt="网络安全宣传周|遭遇电信诈骗 “黄金半小时”内报警可减少损失"...

View Article


Image may be NSFW.
Clik here to view.

Researcher reports XSS hole in Google France

Security researchers have disclosed an cross-site scripting vulnerability in Google France. The flaw is the third most common web application security hole on the internet, and is commonly exploited in...

View Article

Image may be NSFW.
Clik here to view.

谷歌、苹果或被要求采用印安全技术 不会乖乖就范

印度国旗 凤凰科技讯 北京时间9月14日消息,据外媒报道,印度与全球科技产业的关系越来越让人忧虑,仅今年以来,印度政府已经叫停Facebook的免费互联网服务,拒绝免除苹果在本国采购商品的义务。现在,它要强制科技公司采用政府资助实验室开发的安全技术。...

View Article

Watchdog Slams UK Government Cybersecurity

Government spending watchdog the National Audit Office (NAO) has slammed the government’s approach to cybersecurity, branding it confused and chaotic. In a new report out today, the NAO claimed that...

View Article

Image may be NSFW.
Clik here to view.

Security Threats Are Like a Box of Chocolates

Posted byFrank Yue on Sep 14, 2016 inApplication Delivery |0 comments You never know what you are going to get when you take something from a box of chocolates. I can guarantee you that sometimes you...

View Article


Image may be NSFW.
Clik here to view.

Essential Online Security Tips for Product Owners

There are many reasons to outsource your software development project. For one, there’s usually a cost saving. In addition to this, contracting out development helps avoid the management hassle of...

View Article

Image may be NSFW.
Clik here to view.

树立正确的网络安全观,切实维护国家网络安全

树立正确的网络安全观,切实维护国家网络安全 一点号中国互联网举报中心1小时前 观念决定方向,思路决定出路 ――树立正确的网络安全观,切实维护国家网络安全。php?url=0ERTMYwL93" alt="树立正确的网络安全观,切实维护国家网络安全" />...

View Article


Image may be NSFW.
Clik here to view.

超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元

超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元 15小时前来源:车云网 那位声名狼藉的天才黑客,终于拿出了自己的产品。 php?url=0ERONtHZHl" alt="超级黑客George Hotz推出了媲美特斯拉的自动辅助驾驶仪,只售 999 美元" />今年 TechCrunch Disrupt SF 大会上,著名的 iPhone 及...

View Article

警方破获涉案3000余万元的网络诈骗团伙 抓获团伙成员20余人

警方破获涉案3000余万元的网络诈骗团伙 抓获团伙成员20余人 2小时前来源:凤凰网 人民网鄂州9月15日电 诈骗团伙假冒淘宝客服,以收取“保证金”、开通“假一赔三”、“七天包退换”服务为由,诈骗2000余名淘宝新店主,涉案价值3000余万元。近日,警方通过对冒充淘宝客服网络诈骗系列案件线索进行缜密侦查,先后将假冒淘宝客服诈骗团伙20余名成员抓获。...

View Article


Image may be NSFW.
Clik here to view.

EurekAlert Shuts Down Website Following "Serious Security Breach"

EurekAlert took down its website last night following an incident which the service has labeled as "a serious security breach." All links pointing to the site now redirect to a page that informs users...

View Article

Image may be NSFW.
Clik here to view.

Report: IT is Worried About Security and Cost of Cloud Automation

Enterprises want to automate cloud infrastructure in order to reduce the complexity of cloud maintenance but are worried about the security and cost of automating, a new survey finds. According to...

View Article

Image may be NSFW.
Clik here to view.

DevOps and the Art of Secure Application Deployment

Secure application deployment principles must extend from the infrastructure layer all the way through the application and include how the application is actually deployed, according to Tim Mackey,...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images