Hacker who stole nude photos from Jennifer Lawrence sentenced to 18 months in...
Jennifer Lawrence was one of the hacker's many female celebrity victims. Juan Naharro Gimenez/ Getty Images The hacker who obtained access tothe Apple and Google accounts of more than 100well-known...
View ArticleA famous hacker has terminated his self-driving car project after a...
George Hotz Comma.ai Comma.AI, a startup run by famous hacker George Hotz, has shut down its project dedicated to building a Tesla-like semi-autonomous driving system after a warning from the federal...
View ArticleAPK反逆向之二:四种基本加固方式
近些年来移动 APP 数量呈现爆炸式的增长,黑产也从原来的PC端移到了移动端,伴随而来的逆向攻击手段也越来越高明。本篇章主要介绍应用加固的最基础的四种方式:1.proguard 混淆 2.签名比对验证 3.ndk 编译 .so 动态库 4.代码动态加载 原文地址: APK反逆向之二:四种基本加固方式 0x00 简介...
View ArticleA few quick links, October 28 edition
Welcome to our weekly curated list of interesting stories. Covering anything and everything in the industry, we collect and share a handful of links every Friday. Enjoy! Coding like Shakespeare:...
View ArticleCISO’s View: Why an integrated approach matters.
If you’ve been reading along, you’re aware of the lightbulb moments from my article, “echo: hello world” , that allowed me to discover the benefits of an analytic approach to cybersecurity. This is...
View ArticleHealthcare industry is the bullseye for hackers in 2017
Healthcare is the most cyber attacked industry according to the 2016 IBM X-Force Cyber Security Intelligence Index. In the same report just a year ago -- when financial services held the top spot --...
View ArticlePhishMe Recognized by Gartner as a Leader in Magic Quadrant for Security...
PhishMe positioned as a leader for ability to execute and its completeness of vision Leesburg, VA October 28th 2016 PhishMe, a global provider of phishing defense and intelligence solutions for the...
View ArticleBusiness Leaders Know They’re Not Doing Enough to Protect Their Data
As digital strategy increasingly becomes a priority for Canadian business leaders and more are migrating their data to the cloud, a new survey from Microsoft Canada reveals concerns and confusion...
View Article[TA Deals] Name your price on the White Hat Hacker 2017 Bundle
The term “hacking” always seems to have a negative connotation, but it’s not always a seedy activity that only results in DDoS attacks or your bank account getting stolen. On the opposite end of those...
View ArticleOf course smart homes are targets for hackers
The Wirecutter , an in-depth comparative review site for various electrical and electronic devices, just published an opinion piece on whether users should be worried about security issues in IoT...
View ArticleA new look for Lookout, designed by you
To the people whose data, devices, and digital lives we protect every day: Lookout has just released a brand new design for the Lookout app for Android, all based on your feedback. We recently...
View ArticleEmail to owasp-leaders about SecDevOps Risk Workflow Book
Here is the email I just sent to the OWASP-leaders list SecDevOps Risk Workflow Book (please help with your feedback) Hi fellow OWASP leaders and friends, over the past 4 years I made the move from...
View ArticleNetty SSL性能调优
嗯,这篇不长的文章,是一个晚上工作到三点的血泪加班史总结而成。多一个读,可能就少一个人加班。 《 TLS协议分析 与 现代加密通信协议设计》 首先要感谢这篇文章,如果没有它,我可能还要花更多的时间才能完成。文章有点长,能看多少是多少,每句都是收获。 1.背景知识 1.1 协议史 1996: SSL3.0. 写成RFC,开始流行。目前(2015年)已经不安全,必须禁用。 1999: TLS1.0....
View ArticleFiveThirtyEight's polling data for the US Presidential election
3,000+ voting intention surveys Like many others around the world, I have been watching with interest the democratic process in the United States of America. One of the most influential and watched...
View ArticleIn bid to achieve quantum encryption, China set to finish 2,000-kilometer...
Perhaps it’s not surprising that China, a country obsessed with government secrecy and control of its citizens’ online activities, seems to be so interested in the idea of quantum communications. Just...
View ArticleOur Role in Protecting the Internet ― With Your Help
Protecting the security of the Internet requires everyone . We talked about this themein a recent post, and in this post we’ll expand on the role Mozilla plays, and how our work supports and relies on...
View Article硬件级安全手机,海信金盾(E76)真机图赏
硬件级安全手机,海信金盾(E76)真机图赏 一点号玩客科技昨天 说到海信集团,有可能大家第一反应是耳熟能详的海信电视,而海信在手机这个领域,有可能了解的并不多,那么今天小编就来揭开海信手机的神秘面纱――海信金盾(E76)真机图赏。php?url=0Enes9ChaD" alt="硬件级安全手机,海信金盾(E76)真机图赏" />配置方面: 海信金盾(E76)采用5.5寸的1080P屏幕;...
View Article中国互联网发展基金会网安专项基金 网络安全奖学金评选结果公示
中国互联网发展基金会网安专项基金 网络安全奖学金评选结果公示 一点号中国互联网发展基金会CIDF昨天 为落实中央网信办、发展改革委、教育部、科技部、工信部、人社部《关于加强网络安全学科建设和人才培养的意见》精神,根据《中国互联网发展基金会网络安全专项基金网络安全奖学金评选办法(试行)》,经培养单位推荐、专家评审,现将2016年网络安全奖学金评选结果公示如下: 本科生 王 喜 安徽大学 斯 琴...
View ArticleComing to an SSL library near you? AI learns how to craft crude crypto all by...
Neural networks trained by researchers working at Google Brain can create their own cryptographic algorithms but no one is quite sure how it works. Neural networks are systems of connections that are...
View ArticleFlashback Database Logs can exceed the Retention Target
The documentation on the Flashback Retention Target in 11.2 and 1 2.1 states that this parameter specifies an upper limit on how far the database may be flashed back. However, if the FRA...
View Article