Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Banks Attacked through Malicious Hardware Connected to the Local Network

Kaspersky is reporting on a series of bank hacks -- called DarkVishnya -- perpetrated through malicious hardware being surreptitiously installed into the target network: In 2017-2018, Kaspersky Lab...

View Article



Prime XBT Enabling Fast, Limitless and Profitable Cryptocurrency Trading Plat...

CoinSpeaker Prime XBT Enabling Fast, Limitless and Profitable Cryptocurrency Trading Platform In the past few years cryptocurrencies have exploded and reached incredible heights. Particularly during...

View Article

Image may be NSFW.
Clik here to view.

35C3 Day One: Security, Art and Hacking

Conference showcases cutting-edge cybersecurity research, hacking collectives and art. LEIPZIG, GERMANY Europe’s largest hacker conference kicked off Thursday marking the 35th Chaos Communication...

View Article

Image may be NSFW.
Clik here to view.

2018年五大错误安全实践,你“中招”了吗?

2018 余额已经不足,回望全年,大规模数据泄露事件一波未平一波又起,企业深陷网络安全风险,频频高呼“人间不值得”……新一年,每个安全管理者都想“平安锦鲤”护体,避免成为下个数据泄露事件的新闻头条。 那么,2018到底有哪些需要铭记的经验教训?2019,企业又该如何改善安全防护水平? 为此,我们向行业专家咨询了导致企业暴露在网络安全风险之下的五大错误安全实践,并为您提供了可行的改善建议,助您...

View Article

Image may be NSFW.
Clik here to view.

Dear Hacker: 2018's Top Tech Stories

Dear Hacker: 2018's Top TechStories David Smooke Source, Giphy.com/channel/HackerNoon 2018 ― WTF ! Our president thinks shutting down the government is cool, our tech leaders act like they own user...

View Article


Image may be NSFW.
Clik here to view.

20 Controversial Observations(Not Predictions) About Security Tokens in 2019:...

This is the second and final part of an article that outlines some perspectives about security tokens for 2019. As we discussed in the first part of this article , the points explored here are not...

View Article

Taming the Chaos: Can we build systems that actually work?

Playlists:// We rely on mainstream computer engineering every day, but it's insanely complex, poorly understood, unreliable, and, as CCC reminds us every year, chronically insecure. This talk will...

View Article

Image may be NSFW.
Clik here to view.

Security Researchers Break Ledger Wallets With Simple Antennae

Radio antennae are the original networking technology, and researchers presenting in Berlin Thursday showed how useful they are as hacking tools. The hardware researchers set out to find different...

View Article


Image may be NSFW.
Clik here to view.

7 Signs You Have a Weak Password

As we usher in the New Year, it’s as good a time as any to think about password security. Is it time to refresh those stale and potentially leaked passwords you’ve been hanging on to for so long?...

View Article


Image may be NSFW.
Clik here to view.

Optimizing a Lift-and-Shift for Security

This is the third and final blog within a three-part series that examines how to optimize lift-and-shift workloads. A lift-and-shift is a common approach for migrating to AWS, whereby you move a...

View Article

Start Preparing Now for the Post-Quantum Future

Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready. Search on the phrase "quantum computing," and you'll find a furious debate....

View Article

Louis Theroux among those hit by Twitter hack exposing security flaw

Louis Theroux and Eamonn Holmes are among celebrities whose Twitter accounts were compromised after a security company was able to post tweets on their behalf without entering a password. The...

View Article

Image may be NSFW.
Clik here to view.

Global Threat Intelligence Security Market 2018-2022 | 19% CAGR Projection...

LONDON (BUSINESS WIRE) lt;a href=”https://twitter.com/hashtag/ICT?src=hash” target=”_blank”gt;#ICTlt;/agt; The global threat intelligence security market is expected to post a CAGR of close to 19%...

View Article


IoT Report: Major Flaws in Guardzilla Cameras Allow Remote Hijack of the...

Vulnerabilities in indoor security camera allows remote compromise and device takeover The commodification of IoT devices has paved the way to the smart home. Interconnected appliances, intelligent...

View Article

Blockchain-Optimized Storage Addresses Performance, Security Concerns

According to IDC, global spending onblockchain―a decentralized technology that links blocks of data using cryptography― will grow to $11.7 billion by 2022. At the same time, developing applications...

View Article


Healthcare Cybersecurity in 2019: The Time is Now

As 2018 comes to an end, and we head into an era in which artificial intelligence, the Internet of Things and powerful data analytics are expected to fuel the quantity and value of data, there is one...

View Article

Docker Security Tools, Tips, & Best Practices

Docker is a software platform that makes it easier to create, deploy, and run applications. Recently there has been a major surge in the adoption of this technology ― and while it offers significant...

View Article


Keep all your devices virus-free with Norton Security Premium from $20

It's important to protect your devices against spyware, malware, and the like, which is why software like Norton Security Premium is so handy. It's capable of not only securing your PC or Mac...

View Article

It's Time to Take a Hard Look at Healthcare Cloud Security

This story was originally published on Aug. 21, 2018, and is brought to you today as part of our Best of ECT News series. The healthcare cloud has been growing incredibly, becoming an...

View Article

Image may be NSFW.
Clik here to view.

So, you got an IoT device for the holidays

Just last week, an Amazon customer's GDPR request to see his data resulted in him being sent 1,700 Alexa voice files belonging to someone else , which included conversations between two people. The...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images