Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

【技术分享】甲方安全日常之一场反击灰色产业链的暗战

【技术分享】甲方安全日常之一场反击灰色产业链的暗战 2016-10-20 11:47:34 来源:安全客-Darker@0Kee Team 作者:0keeTeam 阅读:609次 点赞(0) 收藏 0x1起因 近期信息安全部收到公司某业务部门反馈,有部分用户账户被盗。...

View Article


360手机总裁祝芳浩:手机安全领域有信心拔得头筹

360手机总裁祝芳浩:手机安全领域有信心拔得头筹 一点号科记汇3小时前 文/丁昕昕 张磊 10月13日,360N4A在360集团总部报告厅发布上市,该款手机主打快充+长续航。此间,在接受媒体提问时,360手机总裁祝芳浩表示,公司没有设定手机销量目标,但对产品品质和用户口碑设定了目标。360手机将继续深耕安全领域,有信心在手机安全领域拔得头筹。 安全是长远战略,安全设计三位一体...

View Article


Image may be NSFW.
Clik here to view.

iPhone6被黑遭锁定勒索,黑客叫嚣没动数据不是犯罪

iPhone6被黑遭锁定勒索,黑客叫嚣没动数据不是犯罪 2小时前来源:澎湃新闻 史无前例的打击电信诈骗风暴下,黑客攻击个人用户并勒索,可能成为漏网之鱼。 近日,上海的张先生就因为iPhone...

View Article

ISC BIND 9 Denial-of-Service Technical Analysis and Solution

阅读: 1 Internet Systems Consortium (ISC) officially released a security advisory to announce a vulnerability (CVE-2016-2776) and its fixing. The vulnerability exists in buffer.c. When constructing a...

View Article

黑客攻击致使Salesforce收购计划泄露 目标无推特

周二有黑客发布了一份Salesforce董事会主席Colin Powell五月份的电子邮件缓存,其中有一份题为“并购目标审核”的演示幻灯片演示稿件。 该稿件中60张幻灯片文件确定了14个可能的收购目标。其中包括Adobe...

View Article


Firmware Security Lags as IoT Devices Proliferate

As the era of automation and the Internet of Things (IoT) continues to dawn, businesses are seeing a marked increase in connected devices as part of their hardware footprint. Yet most businesses don’t...

View Article

Image may be NSFW.
Clik here to view.

【技术分享】IoT安全系列-如何发现攻击面并进行测试

【技术分享】IoT安全系列-如何发现攻击面并进行测试 2016-10-20 13:53:54 来源:安全客 作者:mryu1 阅读:642次 点赞(0) 收藏 作者:mryu1 稿费:400RMB(不服你也来投稿啊!) 投稿方式:发送邮件至linwei#360.cn,或登陆网页版在线投稿...

View Article

Image may be NSFW.
Clik here to view.

不了解安全加密技术吗?那就out了

①对称加密 基本概念 采用 单钥密码系统 的加密方法,同一个密钥可以同时用作信息的加密和解密,这种加密方法称为对称加密,也称为单密钥加密。 速度快,对称性加密通常在消息发送方需要加密大量数据时使用 所谓对称,就是采用这种加密方法的双方使用方式用同样的密钥进行加密和解密 密钥是控制加密及解密过程的指令 算法是一组规则,规定如何进行加密和解密 图示:...

View Article


Image may be NSFW.
Clik here to view.

恶意软件即服务(MaaS)出租业务:新一代黑客工具套件OffensiveWare

恶意软件舞台上上演的最新戏码就是一套新的黑客工具出现在OffensiveWare旗下的广告宣传中。这些工具用于恶意软件即服务(Malware-as-a-Service,MaaS )工具包出租业务。目前正在黑客论坛中出售,出售者与开发Aaron远程安装键盘记录器(Aaron?Remote Installable Keylogger ,ARIK) 和 Ancalog Exploit...

View Article


SSL Analysis: Now With More Pinning

In the past week, we’ve been hard at work on new features forSearchlight. In our previous releases, we scanned for a library version that accepted self-signed certificates and others that allowed...

View Article

Image may be NSFW.
Clik here to view.

SHA-256 and SHA3-256 Are Safe For the Foreseeable Future

Hashing, it’s always a contentious issue used to be md5, then sha-1, then bcrypt and now it looks like SHA-256 or SHA3-256 might the future with quantum science boffins predicting it’s not feasable to...

View Article

Image may be NSFW.
Clik here to view.

富士通实验室开发出多种区块链安全技术,保持透明度的情况下还能安全处理机密信息

富士通实验室已经开发出了基于区块链的安全技术,用来在多个组织之间安全地处理机密数据。区块链最著名的特点就是能够高度透明且可信赖地进行信息共享,同时不需要特殊的可信任组织来管理。...

View Article

Nginx:配置 HTTPS 服务器

要配置一个https服务,配置中的ssl参数必须按照 listening sockets 在服务中的配置,而且本地的服务端证书和私钥文件必须明确: server { listen 443 **ssl**; server_name www.example.com; ssl_certificate **www.example.com.crt**; ssl_certificate_key...

View Article


Image may be NSFW.
Clik here to view.

安全扫描自动化检测平台建设(Web 黑盒下)

注:本文为“小米安全中心”原创,转载请联系“小米安全中心” 上期回顾: 安全扫描自动化检测平台建设(Web黑盒中) 扫描云平台架构设计...

View Article

Injecting Relevance: Getting Use Out of a Useful Risk Assessment

A show of hands: how many of you reading this have done a risk assessment, but felt that after it was completed it was never going to be used for much? I have done many and the results often fall on...

View Article


Image may be NSFW.
Clik here to view.

Why Cloud security is key to tackling the productivity puzzle

Philip Turner, Vice President of Europe for the Middle East and Africa at Okta, examines the corporate mindset that’s restraining the uptake of secure cloud solutions in the UK… Following the latest...

View Article

Image may be NSFW.
Clik here to view.

Why Poor Cyber Hygiene Invites Risk

Modern cybersecurity today is all about risk management. That means eliminating and mitigating risks where possible, and knowingly accepting those that remain. Organizations around the world are...

View Article


Image may be NSFW.
Clik here to view.

Massive ATM Hack Hits 3.2 Million Indian Debit Cards ― Change Your PIN Now!

India is undergoing the biggest data breaches to date with as many as 3.2 Million debit card details reportedly stolen from multiple banks and financial platforms. The massive financial breach has hit...

View Article

Image may be NSFW.
Clik here to view.

How to Overcome Common Hybrid Cloud Security Issues

Hybrid cloud security continues to pose a barrier to enterprise cloud adoption, and both enterprises and cloud service providers (CSPs) share responsibility for coming up with secure cloud solutions....

View Article

Red Hat Virtualization andSecurity

The usage of open source technologies has grown significantly in the public sector. In fact, according to a published memo , open source technologies allow the Department of Defense to “develop and...

View Article
Browsing all 12749 articles
Browse latest View live