Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

2019 Predictions: Information security will be given a seat at the table...

Many years ago, a board member said to me, “We’ve employed you to do information security, so why do we have to do anything?” This was fairly typical. My experience in the past has been that...

View Article



Image may be NSFW.
Clik here to view.

The National Vulnerability Database Explained

The National Vulnerability Database (NVD) is one of the most valuable resources available in the fight to keep our software products safe, providing developers and security professionals with the info...

View Article

Image may be NSFW.
Clik here to view.

The Difference Between a Penetration Test and a Red Team Engagement

One of the most frustrating things to me as a security person is having sales and marketing types confuse the different types of security assessment . Similarities First, let’s start with...

View Article

Image may be NSFW.
Clik here to view.

DNS-Based Security Who Are You Kidding?

The proliferation of unsecured devices in the home presents a lucrative target for cybercrime with ransomware and cryptojacking just two common monetization methods out of many. Consumer security is a...

View Article

Image may be NSFW.
Clik here to view.

市场情报 知道创宇404实验室宣布破解lucky勒索病毒解密原理

勒索病毒,今年无疑将再次登上年度网络安全热词Top10榜单,细数近两年来勒索病毒的罪状,堪称罄竹难书。就连国内顶级互联网公司,提起花样繁多的勒索病毒来也十分头疼。12月初,“微信勒索病毒”、“支付宝勒索病毒”甫一开始传播,就吓得微信和支付宝立马跑出来发声明撇清关系。在年末各国发布的网络安全白皮书中也都提到,2019年勒索病毒仍然是重灾区。面对如蝗虫一般不断来袭的勒索病毒,难道真的只能退避三舍?...

View Article


Image may be NSFW.
Clik here to view.

Alexa can now control your home security system

Amazon has been pushingAlexa skills to more developers lately. The companyopened up the Alexa Mobile Accessory (AMA) Kit to all third-party device makers last month. Amazon has now opened up...

View Article

Twitter warned of phone country code data leak two years ago but did nothing,...

A security researcher found a bug in Twitter’s support form two years ago that exposed the country codes of phone numbers attached to user’s accounts. At the time, his bug report was closed as it did...

View Article

Virtustream Launches Industry-Leading Cloud Automation and Security...

Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud LONDON, UK Tuesday 18th December 2018 Virtustream , an enterprise-class...

View Article


Image may be NSFW.
Clik here to view.

2018!

2018 was a transformational year for serverless and cloud native applications. I do believe that this is the year that will be remembered as the one that marked the shift of “serverless” from a cool...

View Article


Image may be NSFW.
Clik here to view.

EOS竞猜类游戏遭黑客攻击背后:Block.one官方悄然更新

12月05日,新上线的又一款EOS竞猜类游戏 Fastwin 遭到黑客攻击,区块链安全公司 PeckShield 态势感知平台捕捉到了该攻击行为并率先进行了安全播报披露。数据显示,当天凌晨03:18―04:15之间,黑客(ha4tsojigyge)向Fastwin游戏合约(fastwindice3)发起124次攻击,共计获利1,929.17个 EOS。PeckShield...

View Article

Image may be NSFW.
Clik here to view.

Indegy Publishes Industrial Cyber Security Predictions for 2019

We Can Expect New Attack Sources, Techniques and Protection Responses from Operators NEW YORK (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/ICS?src=hash” target=”_blank”gt;#ICSlt;/agt; Indegy...

View Article

BrandPost: Securing the Industrial Internet of Things in OT Networks

In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed and efficiency of today’s digital marketplace. Typical OT...

View Article

Red Team Assessment Phases: Reporting

Reporting is the final and potentially most important phase of a red team assessment. The goal of a red team assessment is to provide the client with a comprehensive view of their security and the...

View Article


Best practices for implementing a successful BYOD programme

Mobile phone usage is still on the rise, with the global number of users expected to surpass 5 billion in the coming year. Throughout Southeast Asia, mobile phone users make up 90% of all internet...

View Article

Image may be NSFW.
Clik here to view.

Sprint and T-Mobile merger approved by national security council

What just happened?A major milestone has been met in the process of Sprint and T-Mobile attempting to merge into a single entity. Approval from a handful of federal agencies in charge of national...

View Article


Image may be NSFW.
Clik here to view.

Aella Data Integrates with Demisto Enterprise for AI-Driven Breach Detection...

Integration Combines AI-driven SOC Platform with SOAR for SOC Teams to Stay Ahead of Increasingly Sophisticated Attacks. SANTA CLARA, Calif. & CUPERTINO, Calif. (BUSINESS WIRE) lt;a...

View Article

Image may be NSFW.
Clik here to view.

Trezor One: Support for OMNI layer

Trezor One: Firmware Update1.7.2 Trezor One: Support for OMNIlayer SatoshiLabs Today, on December 18th, we have released a new firmware update for the Trezor One, this time with the number 1.7.2. This...

View Article


Image may be NSFW.
Clik here to view.

Verizon LG V30, LG Zone 4 and LG Exalt Get November Security Patch Updates

Verizon has released a series of monthly updates and security patches for a few LG smartphones. The three phones now receiving the updates are theLG V30, LG Zone 4 and the LG Exalt. Each of these...

View Article

Image may be NSFW.
Clik here to view.

Is Your Organization at Risk Because a Local Administrator Has a Weak Password?

In July, media reported that SingHealth, Singapore’s largest health organization, was breached with 1.5 million medical records stolen. The stolen records included those of Singapore’s prime minister...

View Article

移动App模块化设计

三层架构 基础层:构建程序骨架,处理原始数据的IO 业务层:控制数据流并进行加工 UI层 层次不等于文件组织,也不等于模块划分。一般按照界面划分模块后,同属该模块的业务层和UI层都放在同一目录下(还可以有子目录)。一个模块不会被层次限死,最多三层都可以跨越。 这层的目录命名有叫 base 或 foundation...

View Article
Browsing all 12749 articles
Browse latest View live


Latest Images