Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Off-The-Shelf Hacker: From the Space Age to the Age of DIY

There has been scant little coverage of the Apollo 8 space mission that occurred just 50 years ago around this past Christmas season. In a small capsule, three American astronauts successfully circled...

View Article



Stored XSS; What Is It

In the cyber security world, there are a number of vulnerabilities to be aware of. Today we’re going to look at a specific one; Stored Cross-Site Scripting (XSS). Let’s start off by answering; what is...

View Article

Image may be NSFW.
Clik here to view.

Google sat on a Chromecast bug for years, now hackers could wreak havoc

was warned of a bug in its Chromecast media streaming stick years ago, but did not fix it. Now, hackers are exploiting the bug ― and security researchers say things could get even worse. A hacker,...

View Article

Image may be NSFW.
Clik here to view.

网络安全威胁月报NSFOCUS-2018-12

阅读: 7 绿盟科技发布了本月安全通告,月报编号NSFOCUS-2018-12,绿盟科技漏洞库本周新增289条,其中高危95条。 文章目录 2018年12月数据统计 高危漏洞发展趋势 2018年12月绿盟科技安全漏洞库共收录289漏洞, 其中高危漏洞95个,微软高危漏洞11个。微软高危漏洞数量与前期相比有明显下降,绿盟科技收录高危漏洞数量与前期基本持平。 注:a....

View Article

Image may be NSFW.
Clik here to view.

2019年网络安全投资人在想什么

新的一年,新的一波网络安全市场整合与创新,投资人将确定哪些初创公司能为公司企业提供最强防御。 Gartner预测,2018全球安全产品与服务开支将以超1140亿美元的数字收官,比2017年增长12.4%。明年,安全主管想要运用技术帮助公司更具竞争力,解决各类风险,满足各种不同企业需求,安全市场预计再增 8.7% ,达 1240亿美元 规模。...

View Article


Image may be NSFW.
Clik here to view.

毒数据:深度虚假Deepfake威胁网络安全

“假新闻”已成当今社会常态。人们从未如此关注过公开信息验真的问题。但假新闻还有个人们认知程度没那么高的“兄弟”―― 深度虚假(deepfake),这才是网络安全领域远比简单的黑客攻击或数据泄露危险得多的潜藏威胁 。...

View Article

5 Cybersecurity Steps You Should Already Be Taking

There’s nothing more impactful than a proactive cybersecurity strategy. What’s your preferred scenario: the one where you’re reeling from a lethal data breach with thousands of customer profiles...

View Article

Fortinet to lead cyber security discussion at WEF annual summit

Ken Xie, chairman of the board, CEO and founder of Fortinet, will be a discussion leader for the Centre for Cybersecurity ’s cyber workforce session at this month’s World Economic Forum (WEF) summit ....

View Article


Image may be NSFW.
Clik here to view.

Avast Highlights the Threat Landscape for 2019

Avast’s 2019 Threat Landscape Report Warns of Adversarial AI, More Sophisticated IoT Attacks and an Increase in Fake Apps REDWOOD CITY, Calif. (BUSINESS WIRE) Avast, the global leader in digital...

View Article


Image may be NSFW.
Clik here to view.

思路决定成败:F12给了我黑色的眼睛我却用它来挖洞

*文章原创作者:evil7,本文属于CodeSec原创奖励计划,未经许可禁止转载 大家好,我又来混稿费了。 为了在脱贫致富关键的2020年前,正确地贯彻落实互惠双赢政策和以先富带后富的重要指示精神。 坐山吃山指哪儿打哪儿,今天就来说说F12除了挂自慰黑页,如何帮助你完成手工审计吧。(小和尚Maniac&最近在问相关问题,所以文中一道写来提供基础学习,文章篇幅将着重解释)...

View Article

Confused Deputies Strike Back

A few weeks back Kubernetes had its first really severe security issue, CVE-2018-1002105 . For some background on this, and how it was discovered, I recommend Darren Shepherd’s blog post , he...

View Article

Image may be NSFW.
Clik here to view.

The Differences and Similarities Between IoT and ICS Security

I saw a tweet recently by Robert M. Lee ―a highly respected ICS Security professional in the industry. When folks put “ICS” in the category of “IOT” it conflates the systems, purpose, value, and risks...

View Article

Image may be NSFW.
Clik here to view.

Security and Reliability are the Hallmarks of a Robust Blockchain Storage...

Many agree that blockchain technology has the potential to cause paradigm-shifts in many aspects of the global business process. Decentralized technology is already making inroads into the cloud...

View Article


Image may be NSFW.
Clik here to view.

Ethereum Proof of Stake FAQs

Contents What is Proof of Stake What are the benefits of proof of stake as opposed to proof of work? How does proof of stake fit into traditional Byzantine fault tolerance research? What is the...

View Article

Image may be NSFW.
Clik here to view.

Ethical Hacking Tutorial A beginner’s Guide

Ethical Hacking is a discipline widely followed by major big-wigs of the tech industry to protect their organization against any forthcoming probes from black hat hackers. In this Ethical Hacking...

View Article


Image may be NSFW.
Clik here to view.

黑客能否花式“调戏”人造卫星?

图片来源:视觉中国 文|脑极体 “天凉了,该让王氏集团破产了。” 在YY小说中,让一整个企业甚至一整个国家弹指间灰飞烟灭一定是最能触动人们爽点的情节。但到了科幻作品中,这种爽点被无限扩大。与主角们殊死搏斗的反派,可能动动手指就能毁灭整个星球。 当然在现实世界中,超级大反派们暂时还做不到动动手指毁灭一颗行星。但动动手指毁灭一颗人造卫星,却正在逐渐实现。...

View Article

Image may be NSFW.
Clik here to view.

黑客如何进行区块链51%攻击(双重攻击)

51%的攻击或双重攻击是区块链中的矿工或矿工群体试图在该区块链上花费两次数字加密货币。他们试图“双重花费”,因此得名。这样做的目的并不总是加倍花费数字加密货币,但更常见的是通过影响其完整性来对某个加密数字货币或区块链进行攻击。...

View Article


Image may be NSFW.
Clik here to view.

Docker使用 linuxserver/letsencrypt 生成SSL证书最全解析及实践

本文使用 HTTP 和 DNS 两种校验方式对 Docker 下 linuxserver/letsencrypt 项目进行了实践。生成SpringBoot可用证书,使用 Nginx 的 htpasswd 来对网站进行密码保护,并测试使用 fail2ban 防止 htpasswd 被暴力破解。全文基于 linuxserver/letsencrypt 文档及其他官方资料,根据作者实践进行详细解析和记录。...

View Article

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a day...

View Article

Software Security Predictions: What to Watch for in 2019

Security breaches regularly made headlines this year, while advancements in DevOps, application security testing tools, artificial intelligence, machine learning, cloud adoption, and the Internet of...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images