Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

火车站免费手机充电桩你用过吗?当心被黑客钻空子

火车站免费手机充电桩你用过吗?当心被黑客钻空子 昨天来源:重庆晨报 近日有旅客在火车站使用免费充电桩给安卓手机充电时,发现会被要求必须打开手机USB调试功能和下载指定App。充电桩运营商表示,这是推广App的一种方式。但网安专家称,USB调试功能是手机中最高的开放权限,这种安装方式有可能会被黑客利用。 php?url=0EZXt9CTJi" alt="火车站免费手机充电桩你用过吗?当心被黑客钻空子"...

View Article


Meet The Christian Hackers Looking To Connect People To The Gospel Using...

Indigitous is a movement founded by Cru , an organization that seeks to connect people to Jesus using digital strategies. The name of the movement comes from the fusion of two ideas - indigenous ,...

View Article


Image may be NSFW.
Clik here to view.

网络诈骗“七大暗器”,你招架得住吗?

在发达的移动互联时代,网络的便捷性给人们带来了极优的体验,成为了亿万网民的精神家园。但同时也给不法分子提供了更多诈骗机会,他们不断开发新型的诈骗手段和与之配合的网络诈骗工具进行牟利,使网络空间蒙上了阴霾。下面安全君给大家盘点一下网络诈骗背后的“七大暗器”: 一、伪基站...

View Article

Image may be NSFW.
Clik here to view.

Introducing Dedicated SSL Certificates

When we launchedUniversal SSL in September 2014 we eliminated the costly and confusing process of securing a website or application with SSL, and replaced it with one free step: sign up for...

View Article

Image may be NSFW.
Clik here to view.

Google dev tools beef up Content Security Policy defenses

Cross-site scripting attacks the ability to inject unauthorized scripts into web applications is pervasive, and even though developers have plenty of tools and technologies that can detect and fix XSS...

View Article


Garden-Variety Cybercrooks Breached Yahoo, Says Security Firm

The hackers who stole the data of hundreds of millions of Yahoo users two years ago were two cybercriminal gangs, InfoArmor reported Wednesday. That finding contradicts the notion that state-sponsored...

View Article

5 Ways Hackers Can Use Public Wi-Fi to Steal Your Identity

We’ve all been tempted to use public Wi-Fi: it’s free, saves on your data allowance, and is always helpful in speeding up loading times. You might love public Wi-Fi ― but so do hackers. Here are just a...

View Article

baeldung - Coding and Testing Stuff: Introduction to Java Config for Spring...

The Master Class of " Learn Spring Security " is out: >> CHECK OUT THE COURSE 1. Overview This article is anintroduction to Java configuration for Spring Security which enables users to easily...

View Article


Image may be NSFW.
Clik here to view.

Become an Ethical Hacker with This Professional Certification Package

Leap towards a career in ethical hacking with 60+ hours of preparation toward CISM, CISA and other certification exams. Head over toWCCFtech Deals and get the Computer Hacker Professional...

View Article


IoT DDoS Attack Code Released

Mirai malware could signal the beginning of new trend in using Internet of Things devices as bots for DDoS attacks. The perpetrator of a massive distributed denial-of-service (DDoS) attack on the...

View Article

Image may be NSFW.
Clik here to view.

Xtream Codes IPTV Panel Review Part 2: Movie Data Editing, Security, Reseller...

Dear readers, after part 1 of Xtream Codes Panel v.2.2.0 EVO review , here is part 2. I tried hard to get all in two parts, but “t o be exhaustive” there will also have to be a part 3… Movie Editing...

View Article

Image may be NSFW.
Clik here to view.

Cyber-Security Career Planning

Intro This article will differ from ones I wrote before. You may get used to my pieces of content which usually cover in-depth aspects of cyber-security and especially SAP Cybersecurity . I’m pretty...

View Article

Image may be NSFW.
Clik here to view.

Maersk on the Move: Preserving Security in a Microsoft Azure Migration

The Maersk Group is a worldwide conglomerate operating in more than 130 countries with a workforce surpassing 89,000 employees. Owning the world’s largest container shipping company, Maersk is...

View Article


Image may be NSFW.
Clik here to view.

IBM and Carbon Black Offer a Rapid Response Tool for Cyber Attacks

Companies hit by hackers often waste precious time asking, “What now?” Such delays can be costly, since network invaders, once they know their cover is blown, are apt to make additional mischief by...

View Article

Image may be NSFW.
Clik here to view.

IDG Contributor Network: SoftLayer founder’s new company, StackPath, releases...

It’s always interesting to see what happens when a high-profile CEO sells his company and then finishes up his earn-out period. There are a few different models: some individuals go buy an island,...

View Article


Image may be NSFW.
Clik here to view.

Which country has the most malware-infected devices?

Is your computer committing cybercrime? New research reveals which countries across Europe, the Middle East and Africa have the largest number of internet-connected devices infected with malware "bots"...

View Article

Image may be NSFW.
Clik here to view.

Making The Case For Containers

linux container technology is IT’s shiny new thing. Containers promise to ease application development and deployment, a necessity in a business environment where getting ahead of application demand...

View Article


Image may be NSFW.
Clik here to view.

Akamai acquires enterprise secure access innovator Soha Systems

Providing employees with secure access to enterprise applications deployed behind the firewall is a core requirement for all businesses. Increasingly, businesses must also deal with delivering...

View Article

Assembling a Container Security Program [New Series]

The explosive growth of containers is not surprising technologies such as Docker address several problems facing developers when they deploy applications. Developers need simple packaging, rapid...

View Article

Image may be NSFW.
Clik here to view.

Why Adaptability Is Critical for State CIOs

ByDennis McCafferty | Posted 10-04-2016 Email Why Adaptability Is Critical for State CIOs State government CIOs must constantly redefine the way they manage a wide range of IT systems and applications....

View Article
Browsing all 12749 articles
Browse latest View live