Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Elasticsearch Security: Configure TLS/SSL & PKI Authentication

When Elasticsearch security is enabled for a cluster that is running with a production license, the use of TLS/SSL for transport communications is obligatory and must be correctly setup. Additionally,...

View Article



Image may be NSFW.
Clik here to view.

Real-Time Incident Response and Forensics Capabilities Debut in Twistlock 2.5

The big names in the container world such as Docker, Google, and Red Hat have all been ratcheting up the security of their container offerings over the last year or two. And that means there's less and...

View Article

Image may be NSFW.
Clik here to view.

Blockchain Identity Management | Data Security 2.0?

Blockchain identity management may be the next step in the evolution of data security. Despite their promises, big name brands may not be as safe as we thought they were.Equifax, Yahoo, or Uber? Take...

View Article

Are there any known standards or security flaws in password-protected ZIP...

Just like the title says. I was hoping someone could direct me to documents/resources that show how to encrypt a zip file such that most (if not all) 3rd-party apps can open it. I'm more interested in...

View Article

Escrow launches in Australia

Global secure payments system Escrow.com has launched in Australia with the introduction of Australian Dollar capability for online escrow payments. Escrow.com says its platform can be used for secure...

View Article


Google+ to shut down early after second major security incident

After another data leak, its second such leak in a year, Google today announced it was shutting down its beleaguered social media platform, Google+. API access will shut down even sooner, within the...

View Article

Image may be NSFW.
Clik here to view.

快讯 | “黑客教父”原是无业男,涉嫌非法利用信息网络罪被刑拘

“马云一个亿聘请被拒绝”“中国最年轻黑客教父”,这一个个响亮的称号被放在了一名无业的青年男子郭某身上。他通过网上虚拟自己的身份信息,录制黑客视频,吸引粉丝充值牟利。昨天,北京晨报记者独家从北京市公安局网络安全保卫总队(以下简称网安总队)通报,在公安部“净网2018”专项行动中,成功打掉“东方联盟”黑客网站,并将在网上自吹自擂的“黑客教父”郭某抓获。目前,郭某因涉嫌非法利用信息网络罪被海淀分局刑事拘留...

View Article

Google Cloud Platform now IRAP-certified by Australian Cyber Security Center

As more organizations in Australia seek to take advantage of cloud computing, Google Cloud has continued to expand our capabilities in the region. We opened our Sydney region in July 2017, and...

View Article


Image may be NSFW.
Clik here to view.

湖南第二届大学生网络安全技能竞赛web解题记录

0x1前言 有幸去苟了一次湖南的第二届大学生网络安全技能竞赛,除了坐大巴去湘潭大学比较累,比赛环节的待遇还是很好哒(ps.比赛现场有好多湘大漂亮的小姐姐,辛苦哒),感谢主办方精心准备的一次比赛。 回到比赛上来,这次我这个web dog真的太失败了,两道web最终没人A掉,这里我分享下当时自己的做题思路,加上赛后的复现记录。 0x2web 200 (一)解题记录 做题首先走一遍题目的流程: 上传...

View Article


Most UK retailers plan to up cyber security

Retailers plan to increase cyber security measures during the holiday season, according to a poll of IT professionals in the sector in the UK, Germany, Belgium, the Netherlands, Luxembourg and the US....

View Article

Image may be NSFW.
Clik here to view.

Expermenting with AWS's new a1 instances with awless

There is a time and place for repeatable infrastructure builds. I wouldn’t want anything to get to production without being terraformed/cloudformationed/etc. However, there’s also a time and place for...

View Article

Image may be NSFW.
Clik here to view.

Operation Sharpshooter Takes Aim at Global Critical Assets

Operation Sharpshooter uses a new implant to target mainly English-speaking nuclear, defense, energy and financial companies. Researchers have detected a widespread reconnaissance campaign using a...

View Article

Image may be NSFW.
Clik here to view.

Global Software-defined Perimeter Market 2019-2023 | 34% CAGR Projection Over...

LONDON (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/ITSecurity?src=hash” target=”_blank”gt;#ITSecuritylt;/agt; The global software-defined perimeter market is expected to post a CAGR of over...

View Article


FreeBSD 12.0-RELEASE Announcement

The FreeBSD Release Engineering Team is pleased to announce the availability of FreeBSD12.0-RELEASE. This is the first release of the stable/12 branch. Some of the highlights: OpenSSL has been updated...

View Article

Image may be NSFW.
Clik here to view.

Scanning for Flaws, Scoring for Security

Is it fair to judge an organization’s information security posture simply by looking at its Internet-facing assets for weaknesses commonly sought after and exploited by attackers, such as outdated...

View Article


Deception: Honey vs. Real Environments

A primer on choosing deception technology that will provide maximum efficacy without over-committing money, time and resources. Deception technology is offering defenders the ability to finally gain a...

View Article

Trustworthy Network Segmentation for an Untrustworthy World

Denial is not a strategy. The reality is that networks,PCsand XenApp clientsare susceptible to attacks, if they haven’t been breached already. Network segmentation is an imperative. Organizations need...

View Article


Image may be NSFW.
Clik here to view.

What is RCS and why you might want it

A lot of people have become bored with SMS messaging, and the tech industry is very aware of it. While services such as Apple’s iMessage, Facebook Messenger, and WhatsApp allow you to add photos, GIFs...

View Article

Image may be NSFW.
Clik here to view.

Read: New Attack Analytics Dashboard Streamlines Security Investigations

Attack Analytics , launched this May, aimed to crush the maddening pace of alerts that security teams were receiving. For security analysts unable to triage this avalanche of alerts, Attack Analytics...

View Article

勒索病毒敲响网络安全警钟 黑灰产黑手伸向个人信息

电脑文档数据突然被加密了,桌面上则多了一个解密图标,点开就弹出微信支付收款码,要求转账110元才能解密……这就是近期“沸沸扬扬”的“微信支付”勒索病毒,不过多位安全专家表示,这仅是一款电脑病毒,与手机安全无关,也同微信支付本身的安全无关。...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images