Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kodachi Builds Privacy Tunnel for Linux

Online and Internet security are not topics that typical computer users easily comprehend. All too often, linux users put their blind trust in a particular distribution and assume that all Linux OSes...

View Article


Image may be NSFW.
Clik here to view.

How to develop a website with user and site security as a top priority

Security breaches are each web user’s nightmare. Whether it’s a hacker attacking your website or customer information being stolen, or even something as simple as spam flooding your inbox. No site...

View Article


Hackers Exploit Chromecast UPnP Router Vulnerability on Smart TVs

Funny story really,Swedish video-game vlogger PewDiePie got some unexpected help boosting subscription numbers when hackers took over Chromecast devices to promote his channel. So basically a router...

View Article

Docker Security Tips & Best Practices

Docker is a software platform that makes it easier to create, deploy, and run applications. Recently there has been a major surge in the adoption of this technology ― and while it offers significant...

View Article

Redefining Critical Infrastructure for the Age of Disinformation

In an era of tighter privacy laws, it's important to create an online environment that uses threat intelligence productively to defeat disinformation campaigns and bolster democracy. When we think of...

View Article


Hackers Hijack Chromecast Devices and Smart TVs via Exposed UPnP

A pair of hackers has launched a campaign that displays rogue messages on people’s smart TVs encouraging them to subscribe to a popular YouTube channel. The attack doesn’t seem to be malicious and is...

View Article

Image may be NSFW.
Clik here to view.

安天移动安全发布恶意广告软件RottenSys深度分析报告

一、事件背景 2018年3月14日,国外安全厂商Checkpoint发布报告,声称自2016年来近500万手机设备感染了名为RottenSys的恶意代码,并且指出包括华为、OPPO、vivo、魅族、金立等在内的国产手机设备被感染。随后国内科技媒体进行也了广泛的翻译和转载。鉴于此,安天移动安全进行了深入的分析。 二、样本基本信息 典型样本信息如下: 恶意行为描述:...

View Article

How Customer Engagement Centers Can Boost Security and Compliance

Customer engagement centers ― customer service hubs that have evolved from call centers into sets of technologies and services that aim to provide customer service and support on any channel at any...

View Article


APAC out front in smart meter deployments, revenues: report

Global smart meter revenues are predicted to reach US14 billion by 2026 as water and gas meter shipments enjoy double-digit revenue growth over the next five years including a growth explosion in the...

View Article


Necunos NC_1 and NE_1 open-source smart phone press release

Necunos NC_1 and NE_1 Press Release Necuno NC_1 available for purchase now online across the globe. Helsinki 03.01.2019 Necunos is proud to announce the release of Necunos Mobile Devices NC_1 and NE_1....

View Article

Warning, card fraud could cost retailers US130 billion over next 5 years

Retailers worldwide are set to lose some US$130 billion in digital CNP (Card-not-Present) fraud between 2018 and 2023, according to a new report highlighting the use of increasingly complex approaches...

View Article

Image may be NSFW.
Clik here to view.

Text Message Security It’s About Content Control

End-to-end encryption is often touted as the end-all be-all. When it comes to text message security, encryption is definitely important. End-to-end encryption essentially ensures that while a message...

View Article

Image may be NSFW.
Clik here to view.

Click2Gov breaches show the power of zero-days

Patching issues fast is a step toward software security. But as the Click2Gov breaches show, zero-day vulnerabilities resist even the most persistent patchers. The original version of this post was...

View Article


Fundamentals of Security: How Solid are Firewalls?

In our security series, we introduce common concepts in device security. The last item in our series was an introduction to SSH . In this segment, we discuss firewall security, setup, and maintenance....

View Article

Hacker posts ransom demand on Dublin's Luas tram system site

Visitors to the website for Dublin’s tram system Luas were met with a message that the site had been hacked. The hacker threatened to leak the company’s private data if the ransom demand of one...

View Article


Image may be NSFW.
Clik here to view.

企业安全体系建设之路之Web安全篇

目前的网络攻击主要还是以WEB攻击为主流,毕竟这是与外界沟通获取知识和了解世界的主要桥梁。...

View Article

本地建立CA签发数字证书

CA简介 CA(Certificate Authority或Certification Authority,数字证书认证机构),是负责发放和管理数字证书的权威机构,承担公钥体系中公钥的合法性检验的责任。 CA中心为每个使用公开密钥的用户发放一个数字证书,数字证书的作用是证明证书中列出的用户合法拥有证书中列出的公开密钥。 CA机构的数字签名使得攻击者不能伪造和篡改证书。...

View Article


Image may be NSFW.
Clik here to view.

Hackers Hijack Smart TVs to Promote PewDiePie

The same hacking duo behind the recent “PewDiePie” printer hacks are back this time with publicly exposed Chromecast, Google Home and smart TV systems as their targets. Hackers are taking advantage of...

View Article

Image may be NSFW.
Clik here to view.

‘data:’ Scraping & Chart Reproduction : Arrows of Environmental Destruct ...

Today’s RSS feeds picked up this article by Marianne Sullivan, Chris Sellers, Leif Fredrickson, and Sarah Lamdanon on the woeful state of enforcement actions by the U.S. Environmental Protection...

View Article

Image may be NSFW.
Clik here to view.

Hacker Breaks Dublin Tram's Website, Demands Handsome Ransom ofOne Bitcoin

Photo: Getty Riders of Dublin’s tram system Luas will have to navigate their commute without the aid of the service’s website on Thursday. The site is down following a hack by someone who mostly...

View Article
Browsing all 12749 articles
Browse latest View live