2019 Predictions: Information security will be given a seat at the table...
Many years ago, a board member said to me, “We’ve employed you to do information security, so why do we have to do anything?” This was fairly typical. My experience in the past has been that...
View ArticleThe National Vulnerability Database Explained
The National Vulnerability Database (NVD) is one of the most valuable resources available in the fight to keep our software products safe, providing developers and security professionals with the info...
View ArticleThe Difference Between a Penetration Test and a Red Team Engagement
One of the most frustrating things to me as a security person is having sales and marketing types confuse the different types of security assessment . Similarities First, let’s start with...
View ArticleDNS-Based Security Who Are You Kidding?
The proliferation of unsecured devices in the home presents a lucrative target for cybercrime with ransomware and cryptojacking just two common monetization methods out of many. Consumer security is a...
View Article市场情报 知道创宇404实验室宣布破解lucky勒索病毒解密原理
勒索病毒,今年无疑将再次登上年度网络安全热词Top10榜单,细数近两年来勒索病毒的罪状,堪称罄竹难书。就连国内顶级互联网公司,提起花样繁多的勒索病毒来也十分头疼。12月初,“微信勒索病毒”、“支付宝勒索病毒”甫一开始传播,就吓得微信和支付宝立马跑出来发声明撇清关系。在年末各国发布的网络安全白皮书中也都提到,2019年勒索病毒仍然是重灾区。面对如蝗虫一般不断来袭的勒索病毒,难道真的只能退避三舍?...
View ArticleAlexa can now control your home security system
Amazon has been pushingAlexa skills to more developers lately. The companyopened up the Alexa Mobile Accessory (AMA) Kit to all third-party device makers last month. Amazon has now opened up...
View ArticleTwitter warned of phone country code data leak two years ago but did nothing,...
A security researcher found a bug in Twitter’s support form two years ago that exposed the country codes of phone numbers attached to user’s accounts. At the time, his bug report was closed as it did...
View ArticleVirtustream Launches Industry-Leading Cloud Automation and Security...
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud LONDON, UK Tuesday 18th December 2018 Virtustream , an enterprise-class...
View Article2018!
2018 was a transformational year for serverless and cloud native applications. I do believe that this is the year that will be remembered as the one that marked the shift of “serverless” from a cool...
View ArticleEOS竞猜类游戏遭黑客攻击背后:Block.one官方悄然更新
12月05日,新上线的又一款EOS竞猜类游戏 Fastwin 遭到黑客攻击,区块链安全公司 PeckShield 态势感知平台捕捉到了该攻击行为并率先进行了安全播报披露。数据显示,当天凌晨03:18―04:15之间,黑客(ha4tsojigyge)向Fastwin游戏合约(fastwindice3)发起124次攻击,共计获利1,929.17个 EOS。PeckShield...
View ArticleIndegy Publishes Industrial Cyber Security Predictions for 2019
We Can Expect New Attack Sources, Techniques and Protection Responses from Operators NEW YORK (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/ICS?src=hash” target=”_blank”gt;#ICSlt;/agt; Indegy...
View ArticleBrandPost: Securing the Industrial Internet of Things in OT Networks
In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed and efficiency of today’s digital marketplace. Typical OT...
View ArticleRed Team Assessment Phases: Reporting
Reporting is the final and potentially most important phase of a red team assessment. The goal of a red team assessment is to provide the client with a comprehensive view of their security and the...
View ArticleBest practices for implementing a successful BYOD programme
Mobile phone usage is still on the rise, with the global number of users expected to surpass 5 billion in the coming year. Throughout Southeast Asia, mobile phone users make up 90% of all internet...
View ArticleSprint and T-Mobile merger approved by national security council
What just happened?A major milestone has been met in the process of Sprint and T-Mobile attempting to merge into a single entity. Approval from a handful of federal agencies in charge of national...
View ArticleAella Data Integrates with Demisto Enterprise for AI-Driven Breach Detection...
Integration Combines AI-driven SOC Platform with SOAR for SOC Teams to Stay Ahead of Increasingly Sophisticated Attacks. SANTA CLARA, Calif. & CUPERTINO, Calif. (BUSINESS WIRE) lt;a...
View ArticleTrezor One: Support for OMNI layer
Trezor One: Firmware Update1.7.2 Trezor One: Support for OMNIlayer SatoshiLabs Today, on December 18th, we have released a new firmware update for the Trezor One, this time with the number 1.7.2. This...
View ArticleVerizon LG V30, LG Zone 4 and LG Exalt Get November Security Patch Updates
Verizon has released a series of monthly updates and security patches for a few LG smartphones. The three phones now receiving the updates are theLG V30, LG Zone 4 and the LG Exalt. Each of these...
View ArticleIs Your Organization at Risk Because a Local Administrator Has a Weak Password?
In July, media reported that SingHealth, Singapore’s largest health organization, was breached with 1.5 million medical records stolen. The stolen records included those of Singapore’s prime minister...
View Article移动App模块化设计
三层架构 基础层:构建程序骨架,处理原始数据的IO 业务层:控制数据流并进行加工 UI层 层次不等于文件组织,也不等于模块划分。一般按照界面划分模块后,同属该模块的业务层和UI层都放在同一目录下(还可以有子目录)。一个模块不会被层次限死,最多三层都可以跨越。 这层的目录命名有叫 base 或 foundation...
View Article