Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

以赛促教,打造网络安全人才培育生态链

“千军易得,一将难求,要培养造就世界水平的科学家、网络科技领军人才、卓越工程师、高水平创新团队”“没有网络安全,就没有国家安全”――习近平总书记从国家网络空间安全战略层面提出了对网络安全人才的需求。 近几年市场的飞速发展,让“网络安全“人才成为稀缺资源。培养高水平的网络安全人才,需要从国家政策、科研教学、企业技术三个链路层面的全面配合和支撑。 政策建立积极引导的上层机制...

View Article



Day 13: Taking on Roles

In my previous Advent article, I created higher-order promises and showed you how to use them. I didn't show you the magic of how they work. Now I'll develop another example but from the other...

View Article

Image may be NSFW.
Clik here to view.

RingCentral Deploys Data Theorem to Automate Security Inspection of Modern...

Global Communications Company Identifies Pre-Production Critical Security Flaws and Closes Vulnerability Cases Faster with Automated API Discovery and Security Inspection PALO ALTO, Calif. (BUSINESS...

View Article

Foxtel hit with $25K fine for telemarketing breaches

Broadcast giant Foxtel has been caught in a crackdown on compliance to telemarketing laws and fined $25,200 for breaching requirements for telemarketers to end a call immediately when asked. The...

View Article

Image may be NSFW.
Clik here to view.

帮助特斯拉找漏洞 自由黑客年赚50万美元

腾讯科技讯 据外媒报道,道德黑客平台Bugcrowd发布的新数据显示,自由职业精英黑客帮助特斯拉等大公司和国防部等政府机构寻找和报告安全漏洞,每年可以赚逾50万美元。 Bugcrowd公司成立于2012年,是少数几家所谓的“捉虫赏金”公司之一。这些公司为黑客们提供了一个施展才华的平台,让他们为需要测试安全的公司寻找安全漏洞。...

View Article


Image may be NSFW.
Clik here to view.

Ethereum Miners May Be Exposed to a Hacker Mass-Scan Campaign

Think you’re working hard at making an extra income even while prices are down? If you’re not careful and don’t heed the warnings about port 8545, you may just see all your ETH disappear overnight....

View Article

Image may be NSFW.
Clik here to view.

针对WhatsApp、Telegram及Signal应用的侧信道攻击技术研究

一、前言 从互联网诞生以来,消息应用就一直伴随我们左右。然而最近一段时间,由于一些国家开始实施大规模监控策略,有更多的用户选择安装名为“安全即时通信应用”的端到端加密应用。这些应用声称可以加密用户的邮件、保护用户数据免受第三方危害。 然而,深入分析三款安全消息应用(即Telegram、WhastApp以及Signal)后,我们发现服务商可能无法信守各自的承诺,用户的机密信息可能存在安全风险。...

View Article

Image may be NSFW.
Clik here to view.

Virtru Strengthens Leadership Team with Nationally Recognized Data Privacy...

Former DOD, Endgame Social Scientist Andrea Little Limbago Joins Leadership Team at D.C.-based Enterprise Data Privacy Innovator WASHINGTON (BUSINESS WIRE) lt;a...

View Article


The Economics Fueling IoT (In)security

Attackers understand the profits that lie in the current lack of security. That must change. 2018 might be remembered as the year security truly made its entry into the minds of enterprise Internet of...

View Article


Image may be NSFW.
Clik here to view.

Fortinet《2019威胁态势预测》:网络犯罪五大趋势

为管理分布式复杂网络,公司企业采用人工智能(AI)和机器学习来自动化通常需要高度人工监督与干预的繁琐耗时任务。这一安全生态系统的转型促使网络罪犯也转向了相同的方向。 Fortinet《2019威胁态势预测》揭示了5种新兴恶意趋势: 1. AI模糊测试...

View Article

Image may be NSFW.
Clik here to view.

分布式机器学习与同态加密-part2

所有的据科学家都会告诉你,数据集是人工智能(AI)的命脉。在之前的文章中,我们演示了使用python-paillier 库来实现联合学习的简单安全协议。在这篇文章中,我们将探讨如何使用加密模型对远程数据进行评分。 使用加密模型进行预测 在之前的文章中,我们演示了使用python-paillier...

View Article

Image may be NSFW.
Clik here to view.

Hacking-Lab top 10系列教程

以下报告按照官网的要求写的,每一份报告需要三个部分,解释安全问题、解释你的攻击、解释缓解 6111 OWASP 2010 A1 SQL注入 提示:SQL注入是一种利用应用程序数据库层中发生的安全漏洞的技术。当用户输入被错误地过滤为嵌入在SQL语句中的字符串文字转义字符或用户输入没有强类型并因此意外执行时,存在漏洞。事实上,只要有一种编程或脚本语言嵌入到另一种语言中,就会出现更常见的漏洞类。 目标:...

View Article

Image may be NSFW.
Clik here to view.

成为“黑客”前,必须学习的“操作系统架构体系”

我们先做个比喻,计算机就好比一栋具备"智能功能的大楼",操作系统就是负责这栋"智能大楼"协调、管理和控制的"总控中心",计算机硬件就是组成这栋大楼的"钢筋、水泥",应用软件就是大楼里一个个具体的"环境、消防、人员监控系统"。这时候如果要入侵这栋智能大楼,我们最重要夺取哪一个关键点?我相信大家一定会选择"总控中心"。因此对于黑客学习内容里关键的一部分就是对于操作系统整体架构的掌握。...

View Article


Top financial services CIOs in Southeast Asia

The role of the Chief Information Officer is continuing to gain relevance across Southeast Asia. Last month, Indonesia's president, Joko Widodo, issued a decree instructing all government agencies in...

View Article

Marriott Breach Points To Issue In Security Reporting In M&A Deals

On Friday, November 30th, Marriott International announced what could be one of the largest data breaches in history . Over 500 million guests’ personal data, ranging from names to passport numbers to...

View Article


Image may be NSFW.
Clik here to view.

Scale Global Deployments Exponentially with XebiaLabs Satellite

The XebiaLabs DevOps Platform’s Satellite feature packs a one-two punch. It helps organizations scale complex, long-running application deployments exponentially―without negatively affecting...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity as a Selling Point: Retailers Take Note

UK-based retailers were no strangers to data breaches in 2018. In June, Dixons Carphone announced a breach of 5.9 million customer bank card details and 1.2 million personal data records, and the...

View Article


Image may be NSFW.
Clik here to view.

RiskSense Platform Addresses Security and IT Operations Gaps

Deep Integration with ServiceNow Service Desk Incident and Service Catalogs Automates Information Sharing and Collaboration for Faster Remediation of Vulnerabilities SUNNYVALE, Calif. (BUSINESS WIRE)...

View Article

Alexa’s Security Panel Controller API lets users control their home security...

Alexa’s now the master of your home security system ― but only if you want it to be, of course. Amazon today announced a new API for its handy voice assistant ― aptlynamed the Security Panel Controller...

View Article

Obtain permission for the user name in the header for spring security

I need to implement spring security for my api-controller. -> Each page should contain a header with username (like in Siteminder?). -> Every user has been already registered in...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images