Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

微软开源SEAL简单加密算法函数库

微软的简单加密算法函数库(Microsoft Simple Encrypted Arithmetic Library,Microsoft SEAL),已在GitHub上根据MIT许可证免费使用。容易使用的同态加密(Homomorphic Encryption)函数库,该库是由Microsoft的Cryptography Research小组的研究人员开发的。...

View Article



Image may be NSFW.
Clik here to view.

【应用安全】S-SDLC安全开发生命周期

0x01 S-SDLC简介 OWASP Secure Software Development Lifecycle Project(S-SDLC)是OWASP组织首个由OWASP中国团队独立发布并主导的研究项目,并在全球范围内正式发布。S-SDLC被越来越多的企业所重视,纷纷开始实施。...

View Article

Does your organisation need a CISO?

It seems like every time we turn on the news we’re confronted with a story about a high-profile company suffering a major data breach that has affected thousands, if not millions of their customers....

View Article

Retailers: Avoid the Hackable Holidaze

The most wonderful time of the year? Sure, but not if your business and customers are getting robbed. Andy Williams had it right when he sang about the holidays being the most wonderful time of the...

View Article

Image may be NSFW.
Clik here to view.

Fancy Bear exploits Brexit to target government groups with Zebrocy Trojan

Researchers tracking the Fancy Bear threat group have revealed the persistent targeting of NATO-aligned nation-states through a new campaign. According to researchers from Palo Alto Networks, the...

View Article


SIMalliance: A new 5G SIM card is necessary to beef up network security

As the first standards-compliant 5G cellular devices are on the edge of release, it might be too late to change the key technologies inside them. But an association representing 90 percent of the...

View Article

Real-Time Attacks Against Two-Factor Authentication

Attackers working on behalf of the Iranian government collected detailed information on targets and used that knowledge to write spear-phishing emails that were tailored to the targets' level of...

View Article

App Transport Security on macOS

With Xojo 2018 Release 4, we updated the macOS SDK to 10.14. This means that App Transport Security is now something you need to be aware of for your Mac apps. From Apple’s docs : Starting in iOS 9.0...

View Article


Image may be NSFW.
Clik here to view.

Cisco Coverage for Shamoon 2 & 3

Update Dec. 14, 2018 10:30 CST: Added new Shamoon 3 IOCs Shamoon is a type of destructive malware that has been previously associated with attacks against various organizations in the oil and gas...

View Article


Image may be NSFW.
Clik here to view.

ThreatX Recognized as a Finalist for Best Web Application Solution

We are thrilled to have been selected as a finalist in the SC Media Awards for Best Web Application Solution in the Trust Awards Category. As many of you are aware, the SC Awards are viewed by the...

View Article

Image may be NSFW.
Clik here to view.

Enhance Security on Horizon Cloud on Microsoft Azure with NSX Cloud

Dec 14, 2018 Author: Nina Seth Nina Seth is a senior product marketing manager for VMware EUC. Nina holds a Master of Business Administration from San Jose State University and a Bachelor of Arts in...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News: Security Predictions and Malware Attacks

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the span of categories for...

View Article

Signal says it can't allow government access to users' chats

"By design, Signal does not have a record of your contacts, social graph, conversation list, location, user avatar, user profile name, group memberships, group titles or group avatars," Signal's...

View Article


Image may be NSFW.
Clik here to view.

经历了20多天的闭站备案,终于完成了网站备案。

经历了20多天的闭站备案,终于完成了网站备案,博客总算有了个合法的身份,这里简单分离下备案经历。 备案分两部分: 域名备案 公安备案 域名备案 原则上部署到国内服务器的网站都需要进行域名备案(部署到外海服务器不需要进行域名备案),到空间提供商备案即可,例如,我的博客部署在腾讯云主机,到腾讯云提交备案申请即可。 备案主要分为以下四个步骤: 填写备案类型 填写备案信息 办理幕布拍照 提交管局审核...

View Article

The Worst Passwords of 2018, Revealed

We now know the worst passwords of 2018. These are the passwords you should never use, and that you shouldn’t let any friends or family members use either. Because not only are they very common,...

View Article


Image may be NSFW.
Clik here to view.

Bitcoin Orphan Transactions and CVE-2012-3789

Cryptocurrency clients ingest and process unauthenticated content, perform cryptographic validations and store large amounts of data. In around 2012, a couple of interesting DoS attack vectors in...

View Article

Image may be NSFW.
Clik here to view.

VMware Cloud on AWS with NSX-T SDDC Connectivity, Security, and Port Mirrorin...

VMware Cloud on AWS with NSX-T SDDC Connectivity, Security, and Port Mirroring Demo VMware Cloud on AWS with NSX-T SDDC Networking and Security Watch the embedded demo below or view on the NSX YouTube...

View Article


Naughty or Nice Websites

Santa Claus is coming! Was your website naughty or nice this year? Here is a quick checklist of the top 10 bad things that can harm your website security and the top 10 good things that can improve...

View Article

Achieving a Security-Conscious Work Culture

Security-consciousness is more natural for some organizations than others. For certain industries, like finance or data management, it is almost ‘built-in’… but, all companies are a target for data...

View Article

How many PINs your payment card has?

First we have to talk about how payment card PIN (Personal Identification Number) is verified. PIN can verified “offline” by the software running on the chip if you have a chip card and are paying...

View Article
Browsing all 12749 articles
Browse latest View live


Latest Images