Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

邮储新罗支行:把关堵口,严防电信网络诈骗

邮储新罗支行:把关堵口,严防电信网络诈骗 昨天来源:东南新闻网 9月7日上午10:15,一位50岁上下的男子走进邮储银行新罗支行的营业大厅,大堂助理上前询问其需要办理什么业务,客户称要汇款5000元,大堂助理引导至填单区指导其填单,填完单后,客户在等候区等候办理业务,其间,该客户接了多个电话,且一直解释:“现在银行人多,再一会儿就汇过去”,客户多次同样的通话,引起了当班大堂经理林瑶的注意。...

View Article


Image may be NSFW.
Clik here to view.

CipherLoc aims to fix 'broken' encryption

Companies are turning to encryption in order to protect their sensitive data, but many of the systems used can be cumbersome and don't necessarily offer total protection. CipherLoc Corporation is...

View Article


Image may be NSFW.
Clik here to view.

信息安全厂商采购名录指南

摘要: 游侠安全网(www.youxia.org)说明:资料来自易安在线,点击图片可以直接进入易安在线的相关厂家介绍,游侠注意到名单来源是上海的相关单位。感谢易安在线整理的精彩内容! 点击厂商图片,即可跳转网页,查看该厂商的“基本信息”、“公司介绍”、“联系方式”。... 游侠安全网(www.youxia.org)说明:资料来自 易安在线...

View Article

Vulnerability Disclosures in an Open Source World

Before open source software took over the world, people bought software from companies with cold hard cash. There were rolex watches involved, but there were also regular security updates, too. Crazy,...

View Article

Image may be NSFW.
Clik here to view.

5 Recipes For How to Design a Resilient Cyber-Attack Environment

1. Focus on availability-security Latency is a high focus for these folks. Most just focus on confidentiality and integrity-based security models.All three aspects need to be focused on to ensure...

View Article


Image may be NSFW.
Clik here to view.

Enterprise IoT deployment creates a target-rich environment for criminals

For years now, the editorial staff of TechRepublic, and just about every other information technology publication around, has been touting the revolution that is theInternet of Things (IoT). If the...

View Article

Image may be NSFW.
Clik here to view.

Apple to send security update to strengthen iOS 10's weak backup encryption

It turns out that the local encrypted backups on iOS 10, the ones that are created in iTunes, are not as secure as they should be. According to researchers at Moscow based software developer...

View Article

Mobile security stripped bare: Why we need to start again

We’re all familiar with the cartoon image of a character stopping a water leak by plugging a finger into the hole, only for another leak to start, needing another finger, and so on, until the...

View Article


Image may be NSFW.
Clik here to view.

让企业安全项目最终失败的9种误区

在决策过程中,我们并不总是像自己想象的那么明智。这一点在日常生活中体现得非常明显,从午餐吃什么之类微不足道的小事,到买什么类型的车,选什么地方定居之类的人生大事,谁能保证每一个决定都是理性而明智的呢?...

View Article


Image may be NSFW.
Clik here to view.

Samsung Galaxy A8 is also getting September security update

After unlockedGalaxy S7 andS7 edge unitsin Europe andT-Mobile variants of the handsets in the US, another Samsung phone has started receiving the Android security update for September. One of our...

View Article

Image may be NSFW.
Clik here to view.

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “ Your files have been...

View Article

Image may be NSFW.
Clik here to view.

1-15 September 2016 Cyber Attacks Timeline

Autumn is here! And unluckily its winds were not strong enough to sweep off the trail of mega breaches that are really the most remarkable infosec trends of this troubled 2016. Yes, it’s true, this...

View Article

Image may be NSFW.
Clik here to view.

These five weird tricks will help you manage your hybrid cloud

When you get to a certain age, and you've been in the IT industry for enough years, you start to get an idea of what auditors are looking for when they descend on you and ask you pointed questions...

View Article


Image may be NSFW.
Clik here to view.

'Beep' Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner

Beep Prepared: How Security Economics Can Help The Coyote Catch The Roadrunner The practice of security economics demonstrates how gaps in the security architecture impair business results. Acme...

View Article

Image may be NSFW.
Clik here to view.

10 Web Security Testing Tools Every Tester And Developer Should Know

“We don’t do security testing. That’s the job of the Pen Test team!” You’ve probably heard that before, right? Not recently though I hope, because if we’re all responsible for quality now, then we’re...

View Article


Image may be NSFW.
Clik here to view.

On Phone Numbers and Identity

Coinbase sees a lot of motivated attackers, it’s one of the things that makes working in security at Coinbase so interesting. I want to deep dive into one recent attack for a few reasons: 1) when we...

View Article

Image may be NSFW.
Clik here to view.

Yahoo employees blame Marissa Mayer for giant hack

Cyber security took a back seat at Yahoo: NYT Yahoo failed to make defending against hackers a priority in the leadup to the massive hack the internet company announced last week, reports The New York...

View Article


Image may be NSFW.
Clik here to view.

Defending Against Hackers Took a Back Seat at Yahoo, Insiders Say

Photo Alex Stamos, then Yahoo’s chief information security officer, at a Senate hearing in 2014. The hiring of Mr. Stamos that year was hailed as a sign that Yahoo was prioritizing its users’ privacy...

View Article

用 PHP 来加密解密 Cloudflare 邮箱保护

Cloudflare 有一项功能挺不错的,就是将页面上所有的邮箱地址都加密起来,防止机器人抓到然后干坏事。 这项功能要在后台开启 email address obfuscation 之后就可以在页面上加入一个邮箱地址,比如说 abc@abc.com 查看源代码就能发现类似如下的代码 <a class="__cf_email__"...

View Article

GnuTLS gnutls_ocsp_resp_check_crt安全机制绕过漏洞(CVE-2016-7444)

GnuTLS gnutls_ocsp_resp_check_crt安全机制绕过漏洞(CVE-2016-7444) 发布日期:2016-09-28 更新日期:2016-09-28 受影响系统: GnuTLS GnuTLS < 3.4.15 描述: CVE(CAN) ID: CVE-2016-7444 GnuTLS是SSL、TLS和DTLS的开源实现,用APIs、X.509、PKCS...

View Article
Browsing all 12749 articles
Browse latest View live