德国监管机构将扩大对电信设备供应商审查
【TechWeb】12月20日消息,据国外媒体报道,德国监管机构表示,已敦促有意竞标当地基础设施项目的全球电信供应商将其技术提交给官方审查,并不仅限于华为。 德国网络安全监管机构联邦信息安全办公室(Federal Office for Information...
View Article2018年度弱密码出炉,看你用了哪个
日前,密码管理公司SplashData第8次发布了年度最弱密码列表。研究人员分析了互联网上泄露的超过500万个密码,发现计算机用户仍然在使用可预测的、很容易就可以猜到的密码。使用这些密码存在账户被黑和身份被窃取的潜在风险。 分析发现123456和password继续保持最常使用弱密码的第1和第2名,美国总统特朗普的名字相关的密码donald"第一次出现在弱口令列表中,位居第23位。...
View Article卡内基报告:保险服务在解决私营部门的网络安全问题中大有可为
美国卡内基国际和平基金会11月发布专题报告《解决私营部门网络安全困境:保险不可或缺的作用》(Addressing the Private Sector Cybersecurity Predicament: The Indispensable Role of...
View Article全球医疗保健行业IT安全市场:趋势与机会
医疗行业面对的所有攻击中,勒索软件最近上升为最令人恐惧的黑客技术。该技术能让黑客封锁数据访问,要挟医院支付赎金。最近一项研究的数据表明, 88% 的勒索软件攻击是朝着医院去的。这一行业的另一个数据泄露风险来自于安全防护不周的IoT设备和人为失误。这些因素再加上HIPPA和其他监管规定对医疗健康信息保护提出的要求,医疗健康机构要确保患者安全与隐私就有了很多必须及时解决的重大安全考虑。...
View ArticleUsing ATT&CK As a Teacher
Over the past few years , I’ve had the pleasure of welcoming interns on our security research team. One of my goals was to pass on knowledge of security to these folks and pique their interest in (a...
View ArticleWhat is Network Security: An introduction to Network Security
We live in an age of information. Businesses these days are more digitally advanced than ever, and as technology improves, organizations’ security postures must be enhanced as well. Now, with many...
View ArticleSouth Yorkshire TravelMaster Selects Rambus To Deliver Innovative E-Commerce...
New retail portal, on-vehicle and NFC-based digital ticket delivery part of improved service offering GLASGOW, Scotland & SHEFFIELD, England (BUSINESS WIRE) lt;a...
View ArticleZero-Touch Provisioning with Patrick Ogenstad (Part 2)
Last week we published thefirst half of interview withPatrick Ogenstad, guest speaker in Spring 2019 Building Network Automation Solutions online course (register here). Here’s the second half. ZTP is...
View ArticleThe Rise and Fall of Enterprise Security Technology
Over the past few years “security” has become a buzzword across many industries, and for good reason. With the threat of data breaches haunting industry stalwarts, household brands and countless...
View Article网络安全 | 方便的wifi,还方便了什么?
随着移动终端的兴起和互联网技术的不断进步,古老的盗窃、诈骗、骚扰手段也是旧貌换了新颜。我们身边有多少人知道,大家每天使用的WiFi,其实并不安全。 亲,你没看错,就是这个问题。使用WiFi上网时我们的个人信息安全时刻存在着巨大的风险和隐患。...
View Article周鸿yN:网络安全技术是万物互联时代的核心技术
中国互联网的下一个十年已经开启,之前互联网的焦点在大洋彼岸,下一轮的互联网将聚焦在东方。 PC互联网时代,我们尾随世界的浪潮。在移动互联网时代,我们借助人口红利的自身优势,实现了商业模式的创新。现在进入到万物互联和人工智能时代,互联网将会彻底改变人与人、人与物、物与物之间的连接方式。...
View Article黑客攻击、交易复杂,无利可图的EOS博彩
“筹资40亿美金、21个超级节点、百万TPS(每秒交易次数)”,聪明的BM一手打造了史上最大的ICO融资项目――EOS。曾经在主网上线前风光无限,如今却沦落为一条纯粹的博彩公链,漏洞频出的合约代码招致了黑客的频繁袭扰和攻击。...
View Articleswpu ctf 有趣的邮箱注册 详细题解
不得不说,swpu的师傅们出题还是很用心的,这道题目就很不错,既有前端xss,又有后端提权,可谓是非常全面了,下面我们就简单分析一下 题目地址为: http://118.89.56.208:6324 邮箱验证 首先打开题目,发现功能只有两个,一个是验证邮箱,另一个是管理后台,但是管理后台需要本地,那突破点就在邮箱验证了。 尝试提交邮箱,发现了代码泄露,给出了过滤方式:...
View ArticleFundamental Shifts In 2018
What surprised the industry in 2018? While business has been strong, markets are changing, product categories are shifting and clouds are forming on the horizon. As 2018 comes to a close, most...
View ArticleTypes of Data Breaches and How To Prevent Them
Data breaches happen practically every day. Personal, including financial and medical data leak to cyber criminals as well as intelligence agencies. Some notable breaches include the Equifax breach,...
View ArticleGUEST ESSAY: Top cybersecurity developments that can be expected to fully...
From a certain perspective, 2018 hasn’t been as dramatic a cybersecurity year as 2017, in that we haven’t seen as many global pandemics like WannaCry. Related: WannaCry signals worse things to come....
View ArticleThreat invasion: Secure your infrastructure
In this day and age of technology, we could all stand to secure our data more strongly. We’re in the age of one-click buying and complicated passwords. Our data should be more secure than ever, yet...
View ArticleAI-powered security camera company Lighthouse shuts down
A new company calledLighthouse introduced an advanced security camera that can tell the difference between a person and a petback in 2017. It was a promising, Andy Rubin-backed project that managed to...
View ArticleHow to prevent unauthorized computer access
Unauthorized computer access implies the act of invading into a private computer without the owner’s consent. On the other hand, unauthorized computer use means the use of a computer’s data with...
View ArticleMcAfee三季度网络安全报告:挖矿和物联网攻击抬头,移动恶意软件和勒索攻击下滑
网络安全公司McAfee最新发布的2018年三季度全球网络安全报告(获取报告原文请关注IT经理网微信号ctociocom 后台回复:mcafee2018)显示:第三季度物联网恶意软件增长了73%,出人意料的是虽然加密货币市场经历了雪崩般的暴跌,但加密货币挖矿恶意软件却保持着71%的强劲增速。...
View Article