谷歌的深度学习神经网络已经学会了加密技术
AI世代讯 据外媒报道, 谷歌 (微博)机器学习研发部门Google Brain发现,人工智能系统能自行设计加密技术,从而很好地实现保密。 在发布至arXiv的研究中,Google Brain团队研究员马丁阿巴迪(Martin Abadi)和大卫安德森(David...
View ArticleCVE-2016-3298: Microsoft Puts the Lid on Another IE Zero-day Used in AdGholas...
Microsoft’s Patch Tuesday forOctober fixed another previous zero-day vulnerability in Internet Explorer (IE) via MS16-118 and MS16-126 : CVE-2016-3298 . Before the was lid put on it, the security flaw...
View ArticleWe could lose the internet, warns security researcher Dan Kaminsky
Image: iStock/RyanKing999 "The internet is not a safe place right now, and, more importantly, the tools we're using to interact with it are relatively broken," warns Dan Kaminsky in a podcast with...
View ArticleCentralized Security and Consolidated Networking Make Hybrid DMZ a Sweet Treat
Security concerns and networking complexity often are cited as key challenges to public cloud adoption. Since most public clouds run on proprietary architectures that are often inconsistent with...
View ArticleThe Effects of the Forthcoming FCC Privacy Rules on Internet Security
Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of...
View ArticleScary security: Halloween costume ideas from the EFF and us
Still don’t have a Halloween costume? The Electronic Frontier Foundation (EFF) has you covered five costume ideas , all concerned with digital rights. Facial Recognition Face Paint If you’ve got a...
View ArticleIn A World With Automation, Where Does Human Intelligence Fit In?
For all the talk about robots taking over jobs, there are still important roles for humans in incident response workflows of the not-too-distant future. Here are three. Countless articles have been...
View ArticleEnterprises continue to struggle to find cybersecurity talent, survey finds
As enterprises rapidly digitize more business processes with cloud computing, mobile, IoT, and data they are straining their ability to find the security talent they need to secure their systems....
View Article2016年呈现出来的网络安全趋势,你知道几个?
2016年呈现出来的网络安全趋势,你知道几个? 一点号黑客联盟4小时前 【黑客联盟2016年11月02日讯】2016年,各国围绕互联网关键资源和网络空间国际规则的角逐将更加激烈,工业控制系统、智能技术应用、云计算、移动支付领域面临的网络安全风险进一步加大,黑客组织和网络恐怖组织等非国家行为体发起的网络安全攻击将持续增加,影响力和破坏性显著增强,我国网络安全形势更加严峻。...
View Article不能靠一味的修复漏洞来抵御黑客攻击!
不能靠一味的修复漏洞来抵御黑客攻击! 一点号黑客联盟4小时前 【黑客联盟2016年11月02日讯】互联网充斥着漏洞,这是不足为奇的事。从程序员开始写代码起,他们就必定会犯错。而只要他们犯错,犯罪分子、政府、黑客分子就都能对这些漏洞无所不用其极。...
View ArticleZabbixSQL注入漏洞利用
Zabbix是一个开源的企业级性能监控解决方案(再此之前还真没听说过),昨天在CodeSec被曝出SQL注入漏洞Zabbixjsrpc.php?type=9&method=screen.get×tamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=1+or+updat...
View Article如何使用ODROID-C2打造个人专属的渗透测试系统
几周前,我接到一个任务,对即将到来的零售组织商做一次评估。为了准备这次评估,我开始收集所有可能在活动中需要的装备,并试图获得对其网络的访问权。而社会工程学攻击的方式已经被我排除,因为我不可能要求任何一位员工插入我的 USB 设备,或者进入到他们的房间里,更别谈打开他们的终端,并检查他们的电子邮件内容了。从本质上说,我只能尝试使用物理攻击的方式。那么,我可以不可以使用基于物理攻击的...
View Article如何利用Rowhammer漏洞Root Android手机
近期,安全研究专家通过研究发现了一种root安卓手机的新方法,即通过Rowhammer漏洞来root安卓手机。除此之外,攻击者甚至还可以用这个漏洞配合目前已知的安卓系统漏洞(Bandroid和Stagefright)来对目标用户实施攻击。...
View ArticleKali Linux:高级WLAN攻击
作为渗透测试者,了解黑客可以执行的高阶攻击十分重要,即使你可能不会在渗透测试中执行它们。这一章致力于展示黑客如何能够将无线访问用作接入点,执行高级攻击。 这一章中,我们会看到我们如何能够使用所学的知识来执行高级攻击。我们基本上专注于中间人攻击(MITM),它的成功需要大量的技巧和实战。一旦我们完成了它,我们会使用这个 MITM 攻击作为更加复杂的攻击的基础,例如窃听和会话劫持。 7.1 中间人攻击...
View ArticleNumber of DDoS attacks down but speed and size increases
The number of DDoS attacks fell more than 40 percent to 97,700 attacks in the second quarter of 2016 according to the latest threat report from DDoS security service Nexusguard . The report reveals...
View ArticleFreeze ...SCADA! Flaw lets hackers peel away Human Machine Interface
Security researchers have discovered another serious vulnerability in industrial control kit from Schneider Electric. System crashing flaws in the physical HMI (Human Machine Interface) hardware,...
View ArticleHackers release new malware into the wild for Mirai botnet successor
Symantec A group of cyberattackers has created a new strain of malware dedicated to transforming vulnerable IoT devices into slave components for DDoS attacks. The new malware, dubbed linux/IRCTelnet,...
View ArticleThe Hacker News (THN) Celebrates 6th Anniversary Today
Can you believe that it's been 6 years since we first launched The Hacker News? Yes, The Hacker News is celebrating its sixth anniversary today on 1st November. We started this site on this same day...
View ArticleWhat the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS
Cloud-OnlyEFSS October 21st, 2016 went into the annals of Internet history for the large scale DistributedDenial of Service ( DDoS ) attacks that made popular Internet properties like...
View ArticlePair of Bugs Can Disconnect Schneider HMI Gear From SCADA Networks
Researchers have discovered a pair of serious vulnerabilities in several ICS products made by Schneider Electric that can allow an attacker to freeze the control panel of vulnerable devices and force...
View Article