Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How Major Companies Find Leaks

Serious data leaks are increasingly prevalent in the news. We mostly hear about the immediate impact of those leaks and the steps taken to fix them, but how much do we actually know about how companies...

View Article



Image may be NSFW.
Clik here to view.

The Best of Shape Security 2018

“Hold on there, critics!” Photo Credit: Warner Brothers Focus on the Good Things There are already too many blogs focusing on the bad things that happened this year. Focusing on the bad things in life...

View Article

Technology Trends for the New Year That Are NOT About Security

As we inch closer to 2020, inquiring minds want to know … what’s next? What new tech devices and features can we expect to cause “disruption” as we move into 2019? Do you remember that positive feeling...

View Article

Low-Code Development Is Awesome--Here’s When Not to Use It

Low-code development is one of the IT trends du jour, and for good reason. Low-code development platforms make it easier for anyone to write software quickly. They lower the barrier for programming...

View Article

Image may be NSFW.
Clik here to view.

网络安全预测:2019年五大网络安全趋势展望

随着时间的流逝,2018年已经接近尾声,2019年即将到来,每当临近年末,大家都会结合以往的事件和经验对第二年的发展趋势进行简单的预测。那今天我们就来针对网络安全领域的发展,进行几点简单的预测(本文仅代表个人观点): 趋势一:网络安全相关法律法规将逐步完善...

View Article


电信日:论道网络安全产业发展

互联网是一把双刃剑。人们在享受越来越智能化的物联网设备、移动设备等带来的便利的同时,也不得不面对“恶意黑客”的入侵破坏。 9月19日,由工业和信息化部指导、四川省通信管理局主办、中国信息通信研究院和中国通信企业协会联合承办的2018年国家网络安全宣传周“电信日”主题论坛在成都举办。各行业大咖齐聚一堂,就电信和互联网行业的网络安全等热点问题进行了交流。...

View Article

35c3 junior CTF writeup

I visited the 35c3 again this year and for the first time decided to participate in the c3 CTF with three friends. We decided that the junior version is better suited for our skill level and managed...

View Article

How-To Assess System Images: Overview (Part 1)

Hey folks, happy new year. Today I wanted to go over how I do assessments on system images. I've been interested in this topic for a little over a year, and most of that experience has been on windows...

View Article


Image may be NSFW.
Clik here to view.

Merlin: A cross-platform command and control server and agent written in Go

Merlin (BETA) Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. An introductory blog post can be found here:...

View Article


Trump invites congressional leaders to border security briefing

By Amanda Becker and David Morgan WASHINGTON (Reuters) - President Donald Trump on Tuesday invited Republican and Democratic congressional leaders to a border security briefing at the White House as...

View Article

用抢票软件背后的法律风险

原标题:用抢票软件背后的法律风险 距离2019年春节还有一个多月的时间,春运也进入了倒计时,能否顺利买到回家的火车票成了许多人最为关心的问题。为了省时省力,越来越多的乘客选择网上购票,各种抢票软件应运而生,人们为了顺利买到车票,往往不惜在抢票软件上多花钱,但是这些软件真的靠谱吗?法律对于抢票软件是如何界定的? 1 抢票软件是否合法...

View Article

2019 security forecast: Cloudy and unsettled, with a chance of gloom

Back in April we asked 22 security experts whether we’re winning or losing the war against cybercriminals, and the consensus was almost unanimously negative. Not much has changed since then, and even...

View Article

Image may be NSFW.
Clik here to view.

2018年网络安全大事记

一、信息泄露与网络攻击篇 1. 信息泄露连续五年创历史记录 自2013年斯诺登事件以来,全球信息泄露规模连年加剧。尽管目前还没有信息泄露统计的确切数字,但2018年的数据泄露规模又将创下新的历史记录已是大概率事件。根据Gemalto发布的《数据泄露水平指数(Breach Level...

View Article


Image may be NSFW.
Clik here to view.

Gamers Worry about the Future State of Gaming Security

McAfee Survey Finds Gamers Take Their Cybersecurity Seriously, However Actions Don’t Map Back to Concerns ADDITIONAL NEWS HIGHLIGHTS: Three-quarters of gamers worry about the security of gaming in the...

View Article

Image may be NSFW.
Clik here to view.

盘点:2018年最受专业人士关注的20款安全工具

最近,Kitploit网站基于在2018年3月到12月期间的下载数据, 为我们总结了在2018年最受欢迎的20款黑客工具 。 对于从事信息安全工作的专业人士来说,使用与攻击者武器库中相同的工具,能够先于攻击者发现系统中存在的漏洞,并在这些漏洞遭到利用之前完成补丁开发工作。...

View Article


Why Managed Security Is Better For Business?

There is a widely held misconception that automation and AI are better in every context and that they can replace human expertise with ease in the years to come. This is not true! Agreed that...

View Article

Image may be NSFW.
Clik here to view.

三重护航 徐州市第一人民医院构筑智慧医院建设高地

作为江苏省徐州市 “ 三重一大 ” 项目和 “ 民生幸福 ” 工程,总投资 20 多亿的徐州市第一人民医院新院区建设备受期待与关注。建成后的新院区不仅是徐州和整个淮海经济区占地面积最大、建筑面积最大的三级甲等综合医院,同时也将成为该地区 “ 智慧医院 ” 的最新样板与高地,为患者与民众提供从智慧医疗、全生命周期健康管理到养老的优质服务。...

View Article


Image may be NSFW.
Clik here to view.

Best Practice Response Can Mitigate Data Breaches Quickly

It takes about six months for a company to detect that a data breach occurred in its system. During that time, hackers can do a lot of damage. So obviously you want to be able to mitigate the incident...

View Article

Using Crypto Anchors to Thwart Container Security Breaches

With new cyberattacks occurring week by week , security is now an extremely critical focus for all engineering teams. It’s also influencing the creation of new ways to prevent attacks. Crypto anchors...

View Article

Image may be NSFW.
Clik here to view.

How the Heartbleed Vulnerability Shaped OpenSSL as We Know It

Few are the bugs that truly make it into mainstream notoriety. Whether having to do with its unabashedly dramatic name and logo or with little relation, the Heartbleed vulnerability is one flaw that...

View Article
Browsing all 12749 articles
Browse latest View live