Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Ransomware, Hackers, and … Guarantees?

Nearly every data recovery firm advertises ‘ransomware recovery guarantees’ on their website. For a fee, they promise to decrypt your data or refund your money. The guarantee reassures the victim and...

View Article



Image may be NSFW.
Clik here to view.

Catching Bloodhound Before it Bites

BloodHound is a public and freely available tool that uses graph theory to automate much of the confusion behind understanding relationships in an Active Directory (AD) environment. It allows hackers...

View Article

Image may be NSFW.
Clik here to view.

OWASP Top 10 Security Risks Part IV

To bring awareness to what threatens the integrity of websites, we are continuinga series of posts on the OWASP top 10 security risks . The OWASP Top 10 list consists of the 10 most seen application...

View Article

The Elite Intel Team Still Fighting Meltdown and Spectre

A year ago today, Intel coordinated with a web of academic and independent researchers to disclose a pair of security vulnerabilities with unprecedented impact. Since then, a core Intel hacking team...

View Article

Image may be NSFW.
Clik here to view.

Tips Every New Cryptocurrency Investor Should Know

CoinSpeaker Tips Every New Cryptocurrency Investor Should Know You’ve probably already asked yourself some of the following questions: Is it too late to get started? Did the Bitcoin bubble really...

View Article


Image may be NSFW.
Clik here to view.

A CISO’s Journey to Find a Web Application Firewall that Works

Before joining ThreatX, Jeremiah Cruit was no stranger to Web Application Firewalls. As a seasoned CISO with 20+ years in the industry, he tried dozens of WAF solutions along the way. And with each...

View Article

Image may be NSFW.
Clik here to view.

Hackers Exploit Known Google Chromecast Vulnerability in Thousands of Devices

Starting the New Year off with a bang, Hacker Giraffe and J3ws3r reportedly exploited a vulnerability in thousands of Google Chromecast streaming devices. The CastHack bug, allegedly disclosed nearly...

View Article

One way to use Openssl in different languages ​&ZeroW ...

Openssl is known to be a standard in crypto world. Openssl is written in pure C, so the problem comes that how to use Opnessl in different languages? such Java. Though Java provides JCE and...

View Article


Image may be NSFW.
Clik here to view.

Let’s Encrypt are enabling the bad guys, and why they should

Let’s Encrypt are enabling the bad guys, and why they should kdobieski Thu, 01/03/2019 10:48 Enabling the bad guys The problem with making something freely available to anyone that wants to use it,...

View Article


Image may be NSFW.
Clik here to view.

Keeping Your Cryptocurrencies Safe

In the first half of 2018 alone, $1.1B in cryptocurrency has been stolen . That means $4,243.83 in cryptocurrency was stolen every second in the first half of 2018. Could most of these thefts have...

View Article

The gig economy is changing the way we work. Now here's how to give workers...

A chilly, rainy evening can be great news for a ride-hail driver ― who wants to walk in the rain? But what happens when a stretch of beautiful weather causes a sudden dip in business? For gig workers,...

View Article

Linux Hacker Board Trends in 2018 and Beyond

When I read Brian Benchoff’s recent claim in Hackaday that the maker board market was stalling, I had a sense that there might be some truth to it. The novelty of community-backed, open-spec SBCs has...

View Article

Image may be NSFW.
Clik here to view.

MobSTSPY Info-Stealing Trojan Goes Global Via Google Play

Across six apps, the spyware managed to spread to 196 different countries. An Android spyware dubbed MobSTSPY has managed to ride trojanized apps to a widespread, global distribution, mainly via Google...

View Article


Dual Data Leaks of Blur, Town of Salem Impact Millions

Password-manager Blur and role-playing game Town of Salem both disclosed data breaches this week that impacted a combined 10 million. The new year has started off with the disclosure of two...

View Article

Microsoft, Google Use Artificial Intelligence to Fight Hackers

(Bloomberg) -- Last year, Microsoft Corp.’s Azure security team detected suspicious activityin the cloud computing usage of a large retailer: One of the company’s administrators, who usually logs on...

View Article


Image may be NSFW.
Clik here to view.

Exfiltrating User Data from Mobile Devices What Cybercriminals Look For

Jan 3, 2019 Author: Sachin Sharma Sachin Sharma is a senior product line marketing manager for VMware’s End-User Computing business unit, specializing in security. Share This Post On Part 3 of a...

View Article

Our PHP Security Roadmap for the Year 2019

Since our inception, we've typically published retrospective blog posts every year: Year 2015 retrospective Year 2016 retrospective Year 2017 retrospective A recurring theme of these posts has been,...

View Article


Emotet Malware Gets More Aggressive

Emotet's operators have been adding new capabilities, making the malware now even more dangerous to its enterprise targets. Emotet, a nasty botnet and popular malware family, has proven increasingly...

View Article

Synapse raises $6M to bring neural net weapon detection to x-ray machines

With all of the advances made by computer vision tech in the past few years, it might seem a little crazy that so much of the x-ray security equipment being used at sensitive locations is leaning so...

View Article

How to Build a Successful Continuous Monitoring (CM) Program

For years, continuous monitoring has been serving the IT industry regardless of the size of the businesses utilizing it. Historically, the ITIL programs featured this aspect, but now continuous...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images