Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

IoT security: when X.509 certificate authentication may not work

Security is complex and requires manufacturers building IoT devices to carefully analyze all software/hardware components in the solution. Some time ago, a DEFCON paper uncovered a huge amount of...

View Article


Image may be NSFW.
Clik here to view.

AirWatch Connect: VMware boosts unified endpoint management, BYOD security...

Image: iStockphoto/scanrail On Tuesday, VMware detailed two new updates for existing products in unified endpoint management (UEM) and enterprise BYOD security at AirWatch Connect in Atlanta. VMware...

View Article


Cyber-Anything-As-A-Service: Should The Government Just Outsource Everything?

Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency. A day doesn’t go by without reading...

View Article

Image may be NSFW.
Clik here to view.

Increased interest in Managed Security at Light Reading NFV and Carrier SDN...

Increased interest in Managed Security at Light Reading NFV and Carrier SDN event October 4, 2016 ― by Mike O'Malley ― 0 Last week in Denver, Carriers discussed their plans to migrate their networks to...

View Article

Android October Security Bulletin Fixes 78 Vulnerabilities

Google released on Monday, the Android October Security Bulletin, which this month addresses 78 security flaws, spread across two different patch levels. These patch levels organize security flaws...

View Article


Image may be NSFW.
Clik here to view.

Your Security Concerns About Using Mobile Payment Are Valid

Despite the surge in mobile phone usage, and the innovative payment technologies that have come of age in mainstream usage, some consumers remain reluctant to completely embrace the latest payment...

View Article

Image may be NSFW.
Clik here to view.

How Users Perceive Security During the Checkout Flow (Incl. New 'Trust Seal'...

“People have lost everything you know, so I always check a 100 times before I purchase anything” , one of our test subject explained as she meticulously entered her credit card information. Indeed,...

View Article

Image may be NSFW.
Clik here to view.

Banking industry group requests a way to disable forward secrecy in TLS 1.3

[ Date Prev ][ Date Next ][ Thread Prev ][ Thread Next ][ Date Index ][ Thread Index ] Re: [TLS] Industry Concerns about TLS 1.3 To : BITS Security < BITSSecurity at fsroundtable.org > Subject :...

View Article


Image may be NSFW.
Clik here to view.

Why the older generation is an attractive target for cybercriminals

People aged 55 and over are behaving insecurely online and often become the victim of fraud, according to Kaspersky Lab and B2B International. The survey questioned 12,546 Internet users across the...

View Article


Image may be NSFW.
Clik here to view.

Checklist: IoT security and privacy

The Online Trust Alliance (OTA) released the consumer IoT security and privacy checklist, which contains steps consumers can take to help increase the security, privacy and safety of their connected...

View Article

Image may be NSFW.
Clik here to view.

Drop, no, wait, deploy Anchore: Security code plunges into containers

Schrdinger's cat, as described in a famous thought experiment formulated to explain the indeterminacy of quantum states, sits in a steel box, at once alive and dead. It's conceit that depends on the...

View Article

Image may be NSFW.
Clik here to view.

Insulin pump vulnerabilities could lead to overdose

Rapid7 Users of the Animas OneTouch Ping insulin pump system have been warned that security vulnerabilities in the device allow attackers to remotely deliver insulin doses. On Tuesday, researchers...

View Article

Image may be NSFW.
Clik here to view.

Why Access Management Is Security's Weak Link

BySamuel Greengard | Posted 2016-10-05 Email Why Access Management Is Security's Weak Link Weak and recycled passwords, along with the lack of a centralized password management policy and a credential...

View Article


Image may be NSFW.
Clik here to view.

Security Think Tank: Making a game of phishing

Phishing continues to be the most popular route for cyber criminals, and was number one on the Top 10 Common Threat Techniques list in the (ISC) 2Global Information Workforce Study . Given that anyone...

View Article

Image may be NSFW.
Clik here to view.

Mastercard rolls out pay-by-selfie across Europe

AnalysisMaterCard’s "selfie pay" will be coming to Europe next year after trials in the US, Canada and the Netherlands. The financial services firm is rolling out technologies that will allow European...

View Article


Image may be NSFW.
Clik here to view.

SMEs are the Achilles heel for Asean security

Small and medium-sized enterprises (SMEs) have become the preferred targets for cyber criminals. Not only are they often easy targets, but they offer a stepping stone to larger, more lucrative...

View Article

New security measures for conan package manager

In a previous post “Are C and C++ languages ready for the NPM debacle” , we described the approach of Conan package manager to security, which stands on: Namespaces. Packages are created on user...

View Article


Security has become a byword for complexity. How is your organization adapting?

Watch the news on TV, read the newspaper or browse your favorite news site on the web and almost daily you find headlines of data breaches and other cybercrimes. With nearly 80% of data breaches being...

View Article

Diabetics warned that insulin pump has security vulnerability

Johnson & Johnson has told people using one of its insulin pumps that there is a vulnerability in the device’s security that could allow hackers to gain access to the pump and make the device...

View Article

Image may be NSFW.
Clik here to view.

Security budgets double but UK business still in the dark when it comes to...

According to PwC’s annual Global State of Information Security Survey 2017 , UK businesses are spending 6.2m on average (2015: 3m), and over one and a half times more than their global counterparts...

View Article
Browsing all 12749 articles
Browse latest View live