Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

热烈祝贺闪捷信息正式成为中国信息协会量子信息分会会员单位

摘要: 继加入浙江省网络空间安全协会之后,闪捷信息再次得到行业高度认可,于近日喜获中国信息协会量子信息分会颁发的会员单位证书,正式成为协会的成员之一。 量子信息技术已经被国家列入十三五优先发展的国家级重大科技项目之中,作为战略性新兴产业的重要组成部分,其在提升我国信......

View Article


Your Personal Data is Already Stolen

Post Syndicated fromBruce Schneier original https://www.schneier.com/blog/archives/2018/12/your_personal_d.html In an excellent blog post , Brian Krebs makes clear something I have been saying for a...

View Article

Image may be NSFW.
Clik here to view.

Sitecore Security: Roles in Roles What it is and how it works

The Sitecore Roles-In-Roles is an extension to the basic authorization that have been around ever since Sitecore 5. WHAT IS ROLES-IN-ROLES? Roles-In-Roles allows you to have nested roles, so when you...

View Article

Image may be NSFW.
Clik here to view.

How I Became A Believer In Consuming IT Security As A Service

This article was originally published in Forbes For years, deploying an IT solution meant first buying computers and storage devices, then connecting them inside a corporate data center and then...

View Article

Cyber risk management continues to grow more difficult

Cyber risk management is significantly more difficult today than it was two years ago. That's according to new ESG research involving 340 enterprise cybersecurity, GRC, and IT professionals who were...

View Article


Image may be NSFW.
Clik here to view.

What is Ethical Hacking? An Introduction to Ethical Hacking

The term hacking has been around for a long time now. The first recorded instance of hacking dates back to the early 1960s in MIT where both the terms, ‘Hacking’ and ‘Hacker’ were coined. Since then,...

View Article

Image may be NSFW.
Clik here to view.

PHPMyFAQ-SQL-Injection-With-FILTER_VALIDATE_EMAIL

去年遇到一套这个程序而挖的, 主要也就是因为开发者过于的相信php自带的FILTER_VALIDATE_EMAIL邮箱验证。 在使用了filter_var($email,FILTER_VALIDATE_EMAIL); 验证邮箱后, 没有进一步做处理 直接格式化字符串进了sql语句导致了注入。 FILTER_VALIDATE_EMAIL 本地调试版本: PHP5.4.5...

View Article

Image may be NSFW.
Clik here to view.

金帽子提名 | 如果用一个词来形容404安全实验室,那就是务实

在安全圈,404安全实验室是个非常火的团队。它活跃在安全圈,也活跃在社交媒体上。 它为什么这么火,有人总结道,这是因为知道创宇内部的成员自发的进行分享,成为了一种文化。 它就是是个怎样的团队?知道创宇404安全实验室的副总监隋刚为我们展现了团队真实的一面:如果用一个词来形容404安全实验室,那就是务实。...

View Article


Solving The Cybersecurity Skills Gap Through Employee “Crosswalking”

It is no shock to those in the cyber community that cybersecurity has become a board-level issue for many enterprises. A PwC survey showed a 20% increase in CEO’s concern over cyber threats. With more...

View Article


Image may be NSFW.
Clik here to view.

Growing Your Business: Millennials and M-Commerce

Millennials are the largest generation in the U.S. labor force―a position they’ve held since 2016―and they’re involved in the majority (73%) of B2B purchasing decisions. Raised in the age of the...

View Article

Image may be NSFW.
Clik here to view.

Secure Code Warrior Launches Series of 30 Educational Blogs Coders Conquer Se...

Free Security Education and Hands-On Training for Junior Developers on Top Thirty Security Vulnerabilities BOSTON & SYDNEY (BUSINESS WIRE) #AppDevSec Secure application development platform...

View Article

ACS launches AI guide for businesses

The Australian Computer society has released a guide for businesses to start using artificial intelligence in their organisations, outlining what AI is and what it can do. The guide ― Artificial...

View Article

Why I’m ecstatic about the MITRE ATT&CK results

SPONSORED NEWS. By Scott Lundgren, Chief Technology Officer, Carbon Black Recently MITRE , a not-for-profit organisation that solves problems for a safer world, published the results of its first...

View Article


华为:网络安全问题不应“泛政治化”

【财新网】(记者 侯奇江) 针对英国电信集团(BT Group)将把华为设备从现有3G、4G网络核心网中移出等消息,华为方面12月6日对财新回应,网络安全问题不应该被“泛政治化”,更不该由于厂商所在国而被区别对待。在现今ICT供应链高度全球化的时代,禁止某一个厂家,并不能有效识别和解决网络安全问题。...

View Article

Red Team Assessment Phases: Overview

Computer systems and networks contain valuable information, and hackers are out there trying to steal that data. This has led to the development of the red team assessment, a test to help an...

View Article


Image may be NSFW.
Clik here to view.

Security: What is Server Side Request Forgery?

CSRF is, while still prevalent, no longer an unknown type of security vulnerability. It’s brother, SSRF, however, is. Most developers, or even DevOps engineers don’t know about it. So how does it work?...

View Article

Image may be NSFW.
Clik here to view.

当“网络安全”遇上“智能制造”――华为亮相2018智能制造网络安全大会

2018年11月28日,由中央网信办、工业和信息化部指导,湖南省人民政府、中国工程院、中国科学技术协会、国防科技大学和中国电子信息产业集团有限公司共同主办的2018中国(长沙)网络安全智能制造大会在长沙国际会展中心隆重召开。 华为应邀展出了全栈全场景AI、智能制造、智能计算以及华为安全能力四大部分内容。...

View Article


Adding Windows machines to Samba domains and security

If adding a windows machine to a Samba domain fails and the below “solves” your issue, then you need to tighten the security on the Samba side: [ WayBack ] Old Nabble Samba General Windows 7 RC [...

View Article

Image may be NSFW.
Clik here to view.

Implementation of the OWASP Mobile TOP 10 methodology for testing Android apps

According to BetaNews, among the 30 best applications with more than 500,000 downloads, 94% contain at least 3 average risk vulnerabilities, while 77% contain at minimum two high-level vulnerabilities...

View Article

How to use GPG with YubiKey (bonus: WSL)

This post assumes that you already know what GPG is, and why you want to use it, but you don't have your own set of keys yet. If you are further along (e.g. you already have your own set of keys), you...

View Article
Browsing all 12749 articles
Browse latest View live