Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Browsing all 12749 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hacker who stole nude photos from Jennifer Lawrence sentenced to 18 months in...

Jennifer Lawrence was one of the hacker's many female celebrity victims. Juan Naharro Gimenez/ Getty Images The hacker who obtained access tothe Apple and Google accounts of more than 100well-known...

View Article



Image may be NSFW.
Clik here to view.

A famous hacker has terminated his self-driving car project after a...

George Hotz Comma.ai Comma.AI, a startup run by famous hacker George Hotz, has shut down its project dedicated to building a Tesla-like semi-autonomous driving system after a warning from the federal...

View Article

APK反逆向之二:四种基本加固方式

近些年来移动 APP 数量呈现爆炸式的增长,黑产也从原来的PC端移到了移动端,伴随而来的逆向攻击手段也越来越高明。本篇章主要介绍应用加固的最基础的四种方式:1.proguard 混淆 2.签名比对验证 3.ndk 编译 .so 动态库 4.代码动态加载 原文地址: APK反逆向之二:四种基本加固方式 0x00 简介...

View Article

Image may be NSFW.
Clik here to view.

A few quick links, October 28 edition

Welcome to our weekly curated list of interesting stories. Covering anything and everything in the industry, we collect and share a handful of links every Friday. Enjoy! Coding like Shakespeare:...

View Article

Image may be NSFW.
Clik here to view.

CISO’s View: Why an integrated approach matters.

If you’ve been reading along, you’re aware of the lightbulb moments from my article, “echo: hello world” , that allowed me to discover the benefits of an analytic approach to cybersecurity. This is...

View Article


Healthcare industry is the bullseye for hackers in 2017

Healthcare is the most cyber attacked industry according to the 2016 IBM X-Force Cyber Security Intelligence Index. In the same report just a year ago -- when financial services held the top spot --...

View Article

PhishMe Recognized by Gartner as a Leader in Magic Quadrant for Security...

PhishMe positioned as a leader for ability to execute and its completeness of vision Leesburg, VA October 28th 2016 PhishMe, a global provider of phishing defense and intelligence solutions for the...

View Article

Business Leaders Know They’re Not Doing Enough to Protect Their Data

As digital strategy increasingly becomes a priority for Canadian business leaders and more are migrating their data to the cloud, a new survey from Microsoft Canada reveals concerns and confusion...

View Article


Image may be NSFW.
Clik here to view.

[TA Deals] Name your price on the White Hat Hacker 2017 Bundle

The term “hacking” always seems to have a negative connotation, but it’s not always a seedy activity that only results in DDoS attacks or your bank account getting stolen. On the opposite end of those...

View Article


Of course smart homes are targets for hackers

The Wirecutter , an in-depth comparative review site for various electrical and electronic devices, just published an opinion piece on whether users should be worried about security issues in IoT...

View Article

Image may be NSFW.
Clik here to view.

A new look for Lookout, designed by you

To the people whose data, devices, and digital lives we protect every day: Lookout has just released a brand new design for the Lookout app for Android, all based on your feedback. We recently...

View Article

Email to owasp-leaders about SecDevOps Risk Workflow Book

Here is the email I just sent to the OWASP-leaders list SecDevOps Risk Workflow Book (please help with your feedback) Hi fellow OWASP leaders and friends, over the past 4 years I made the move from...

View Article

Netty SSL性能调优

嗯,这篇不长的文章,是一个晚上工作到三点的血泪加班史总结而成。多一个读,可能就少一个人加班。 《 TLS协议分析 与 现代加密通信协议设计》 首先要感谢这篇文章,如果没有它,我可能还要花更多的时间才能完成。文章有点长,能看多少是多少,每句都是收获。 1.背景知识 1.1 协议史 1996: SSL3.0. 写成RFC,开始流行。目前(2015年)已经不安全,必须禁用。 1999: TLS1.0....

View Article


Image may be NSFW.
Clik here to view.

FiveThirtyEight's polling data for the US Presidential election

3,000+ voting intention surveys Like many others around the world, I have been watching with interest the democratic process in the United States of America. One of the most influential and watched...

View Article

Image may be NSFW.
Clik here to view.

In bid to achieve quantum encryption, China set to finish 2,000-kilometer...

Perhaps it’s not surprising that China, a country obsessed with government secrecy and control of its citizens’ online activities, seems to be so interested in the idea of quantum communications. Just...

View Article


Our Role in Protecting the Internet ― With Your Help

Protecting the security of the Internet requires everyone . We talked about this themein a recent post, and in this post we’ll expand on the role Mozilla plays, and how our work supports and relies on...

View Article

Image may be NSFW.
Clik here to view.

硬件级安全手机,海信金盾(E76)真机图赏

硬件级安全手机,海信金盾(E76)真机图赏 一点号玩客科技昨天 说到海信集团,有可能大家第一反应是耳熟能详的海信电视,而海信在手机这个领域,有可能了解的并不多,那么今天小编就来揭开海信手机的神秘面纱――海信金盾(E76)真机图赏。php?url=0Enes9ChaD" alt="硬件级安全手机,海信金盾(E76)真机图赏" />配置方面: 海信金盾(E76)采用5.5寸的1080P屏幕;...

View Article


中国互联网发展基金会网安专项基金 网络安全奖学金评选结果公示

中国互联网发展基金会网安专项基金 网络安全奖学金评选结果公示 一点号中国互联网发展基金会CIDF昨天 为落实中央网信办、发展改革委、教育部、科技部、工信部、人社部《关于加强网络安全学科建设和人才培养的意见》精神,根据《中国互联网发展基金会网络安全专项基金网络安全奖学金评选办法(试行)》,经培养单位推荐、专家评审,现将2016年网络安全奖学金评选结果公示如下: 本科生 王 喜 安徽大学 斯 琴...

View Article

Image may be NSFW.
Clik here to view.

Coming to an SSL library near you? AI learns how to craft crude crypto all by...

Neural networks trained by researchers working at Google Brain can create their own cryptographic algorithms but no one is quite sure how it works. Neural networks are systems of connections that are...

View Article

Flashback Database Logs can exceed the Retention Target

The documentation on the Flashback Retention Target in 11.2 and 1 2.1 states that this parameter specifies an upper limit on how far the database may be flashed back. However, if the FRA...

View Article
Browsing all 12749 articles
Browse latest View live




Latest Images