足球竞猜app软件网络世界Fahmida Y. Rashid报道 //m.banksfrench.com EN-US 周五年,2020年16点04分11秒-0700 5月22日 周五年,2020年16点04分11秒-0700 5月22日 https://idge.staticworld.net/nww/networkworld510x510.png 足球竞猜app软件 m.banksfrench.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 足球竞猜app软件 m.banksfrench.com 796 288 在线安全的现代指南 2017年5月19日星期五09:57:00 -0700 Fahmida Y. Rashid, Serdar Yegulalp报道 Fahmida Y. Rashid, Serdar Yegulalp报道

The internet can be a scary place. Threats come in many forms, lurking in practically any corner. Worse, yesterday’s prevailing advice for staying safe online -- avoid dodgy websites, don’t traffic in stolen or illegal goods, interact only with people you know -- no longer holds. Phishing emails from supposed family members, spyware piggybacking on legitimate apps, well-known sites hijacked with malicious code -- digital safety clearly needs new rules to meet today's evolving threatscape.

Considering how much of our digital lives occurs online -- communications, financial transactions, entertainment, work, education, to name a few -- adopting even a few safe browsing practices can lead to broad benefits. And this includes how we deal with email messages as well, given how popular email is as a delivery mechanism for online attacks using exploit kits and malware.

To read this article in full, please click here

//m.banksfrench.com/article/3197688/the-modern-guide-to-staying-safe-online.html
McAfee: Shamoon网络攻击浪潮由一个组织协调 2017年4月26日星期三10:14:00 -0700 Fahmida y拉希德 Fahmida y拉希德

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found.

Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks against Saudi Arabia’s state-run oil company Saudi Aramco and Qatari natural gas company RasGas, the attacks last November against Saudi organizations, and these latest attacks are all the work of hacker groups supported and coordinated by a single actor, and not the efforts of multiple gangs operating independently, said McAfee principal engineer Christiaan Beek and McAfee chief scientist Raj Samani. 

To read this article in full, please click here

//m.banksfrench.com/article/3192705/mcafee-wave-of-shamoon-cyberattacks-being-coordinated-by-a-single-group.html
不要被僵尸云数据咬伤 2017年4月20日星期四04:23:00 -0700 Fahmida y拉希德 Fahmida y拉希德

The internet never forgets, which means data that should have been deleted doesn't always stay deleted. Call it "zombie data," and unless your organization has a complete understanding of how your cloud providers handle file deletion requests, it can come back to haunt you.

Ever since the PC revolution, the concept of data deletion has been a bit misunderstood. After all, dragging a file to the Recycle Bin simply removed the pointer to the file, freeing up disk space to write new data. Until then, the original data remained on the disk, rediscoverable using readily accessible data recovery tools. Even when new data was written to that disk space, parts of the file often lingered, and the original file could be reconstructed from the fragments.

To read this article in full, please click here

//m.banksfrench.com/article/3191174/dont-get-bit-by-zombie-cloud-data.html
影子经纪人转储包含Solaris黑客工具 2017年4月12日星期三13:03:00 -0700 Fahmida y拉希德 Fahmida y拉希德 <文章> <节类= “页”>

Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.

The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.

To read this article in full, please click here

//m.banksfrench.com/article/3189650/shadow-brokers-dump-contained-solaris-hacking-tools.html
信任问题:了解SSL证书的限制 星期四,2017年4月6日五时十六分00秒-0700 Fahmida y拉希德 Fahmida y拉希德

Certificate authorities (CAs) have given themselves a black eye lately, making it hard for users to trust them. Google stopped trusting Symantec after discovering the CA had mis-issued thousands of certificates over several years, and researchers found that phishing sites were using PayPal-labeled certificates issued by Linux Foundation’s Let’s Encrypt CA. Even with these missteps, the CAs play a critical role in establishing trust on the internet.

To read this article in full, please click here

//m.banksfrench.com/article/3188086/trust-issues-know-the-limits-of-ssl-certificates.html
旧的攻击代码是俄罗斯黑客的新武器 04:56:00 -0700 Fahmida y拉希德 Fahmida y拉希德

Attackers prefer to reuse code and tools for as long as they keep working. In that tradition, researchers have found evidence suggesting a cyberespionage group is still successfully using tools and infrastructure that was first deployed in attacks 20 years ago.

The Moonlight Maze refers to the wave of attacks that targeted U.S. military and government networks, universities, and research institutions back in the mid-to-late 1990s. While the Moonlight Maze disappeared from the radar after the FBI and Department of Defense investigation became public in 1999, there were whispers within the security community that the cyberespionage group never entirely went away. Turla, a Russian-speaking attack group that's also known as Venomous Bear, Uroburos, and Snake, was floated as a possibility, but until recently, all links were guesswork and speculation.

To read this article in full, please click here

//m.banksfrench.com/article/3187493/old-attack-code-is-new-weapon-for-russian-hackers.html
谷歌试图在云安全领域打败AWS 2017年3月10日星期五05:34:00 -0800 Fahmida y拉希德 Fahmida y拉希德 <本文> <节课=“页面”>

谷歌知道,如果企业都去他们的关键业务转移到其云,那么它必须提供一些AWS没有。At Google Cloud Next, the company’s leadership made the case that Google Cloud was the most secure cloud.

At the conference this week, Google unveiled tools that would let IT teams provide granular access to applications, better manage encryption keys, and enforce stronger authentication mechanisms for applications running on Google Cloud. While Google is just playing catch-up to Amazon with the Key Management System for GCP, it is stepping into uncharted territory with Data Leak Prevention API by giving administrators tools that go beyond the infrastructure to protect individual applications. Google is tackling the identity access management challenge differently from Amazon, and it will be up to enterprises to decide which approach they prefer.

To read this article in full, please click here

//m.banksfrench.com/article/3179453/google-tries-to-beat-aws-at-cloud-security.html
如何从“寻人”网站擦洗你的私人数据 2017年2月23日星期四06:27:00 -0800 Fahmida y拉希德 Fahmida y拉希德

It doesn’t matter what you do online: The internet knows a ton about you, and that information is a mouse click away.

Search any people finder site—Spokeo, PeekYou, Whitepages, to name a few—and odds are you’ll find a page listing your full name, date of birth, names of family members, current address, and phone number. Depending on the site's aggressiveness, it may offer (for a low membership fee or the price of registering an account) additional details such as past addresses, social media profiles, marital status, employment history, education, court cases such as bankruptcies, hobbies, and even a photo of where you live.

Forget the National Security Agency. Aggregator sites such as Intelius, Radaris, and PeopleFinder have data warehouses full of information about you, accessible to people without your permission, and used for purposes you know nothing about. While these sites ostensibly provide background checks and other public services, they also simplify identity theft, stalking, and doxxing (exposing personal information online to encourage harassment), which is both creepy and downright dangerous.

To read this article in full, please click here

//m.banksfrench.com/article/3173261/how-to-scrub-your-private-data-from-people-finder-sites.html
开源安全工具太好了,不容忽视 2017年2月21日星期二06:12 -0800 Fahmida y拉希德 Fahmida y拉希德 <文章> <节类=“网页”>

开源是一个非常好的事情。当今的企业IT和个人技术的显著块依赖于开源软件。但是,即使在开源软件在网络,操作系统和虚拟化广泛应用,企业安全平台仍倾向于是专有和供应商锁定。幸运的是,情况正在发生变化。 

If you haven’t been looking to open source to help address your security needs, it’s a shame—you’re missing out on a growing number of freely available tools for protecting your networks, hosts, and data. The best part is, many of these tools come from active projects backed by well-known sources you can trust, such as leading security companies and major cloud operators. And many have been tested in the biggest and most challenging environments you can imagine. 

To read this article in full, please click here

//m.banksfrench.com/article/3172398/5-open-source-security-tools-too-good-to-ignore.html
为什么2017年将是最糟糕的一年以往任何时候都安全 04:53:00 -0800 Fahmida y拉希德 Fahmida y拉希德 <文章> <节类= “页”>

索尼。国歌。人事管理办公室。目标。雅虎。陆续和2017年有望成为最具灾难性的一年还没有过去的两年里,一个大型突破口。

安全专家早就警告说,大多数企业甚至不知道他们已经被突破。攻击者依靠隐身,了解网络,找到有价值的信息和系统,并窃取他们想要的东西。直到最近,企业提高了他们的检测力度,并开始投资的时间,资金和需要来发现安全漏洞的人。当他们这样做,其结果是往往令人震惊。 <一边类= “fakesidebar”> <强> [ 18项为安全人员令人惊讶的建议。|发现如何保护您的系统与InfoWorld的安全报告简报。 ]

“I think we are going to find more, not less, breaches in 2017,” says Ray Rothrock, CEO of RedSeal, a security analytics firm.

To read this article in full, please click here

//m.banksfrench.com/article/3164514/why-2017-will-be-the-worst-year-ever-for-security.html
自我保护的关键是Linux内核的安全性 2017年1月26日星期四05:26:00 -0800 Fahmida y拉希德 Fahmida y拉希德

Linux已经悄然接管了世界。现在的操作系统权力大型数据中心,使我们所有的云应用和服务成为可能,数十亿的Android设备与互联网连接的小工具包括的东西(IOT)互联网一起。Even the systems that handle the day-to-day operations on the International Space Station run Linux.

To read this article in full, please click here

(内幕故事)
//m.banksfrench.com/article/3161943/self-protection-is-key-to-linux-kernel-security.html IDG内幕
5个迹象表明我们终于在安全问题上达成一致 2016年12月29日星期四04:36:00 -0800 Fahmida y拉希德 Fahmida y拉希德

The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.

For example, ransomware has surged in the last year. Although that kind of malware has been around for years, the current model of encrypting user files to hold data hostage came about just recently. Infections quadrupled in 2016, with the FBI estimating an average of 4,000 attacks a day. A recent IBM survey of 600 business leaders in the United States found that one in two had experienced a ransomware attack in the workplace, and that companies paid the ransom 70 percent of the time. As a result, criminals are on track to make nearly $1 billion this year from ransomware, IBM X-Force said.

To read this article in full, please click here

//m.banksfrench.com/article/3153620/5-signs-were-finally-getting-our-act-together-on-security.html
2016年加密:小胜利累积起来 2016年12月28日星期三04:42:00 -0800 Fahmida y拉希德 Fahmida y拉希德 <本文> <节课=“页面”>

技术发展似乎每年更快驰骋一点。但总有一个滞后:加密。为什么故意步伐?因为一个单一的,小的失误也会切断通讯或关停的企业。

然而,有当你的股票才发现加密景观次似乎已经改变了一夜。现在是时候。虽然变化是增加了好几年了,效果是显着的。 <抛开类= “fakesidebar”> [给自己职业生涯的技术优势与的 InfoWorld的深潜技术报告和Computerworld的就业趋势报告。打通1月15日,2017年15%的折扣:使用代码8TIISZ4Z。

有些变化,美国政府广泛的监视设备的斯诺登的披露后不久就开始了。Others are the natural result of cryptographic ideas reaching the marketplace, says Brent Waters, an associate professor at the University of Texas at Austin and the recipient of the Association for Computing Machinery’s 2015 Grace Murray Hopper Award.

To read this article in full, please click here

//m.banksfrench.com/article/3153591/encryption-in-2016-small-victories-add-up.html
Nmap安全扫描器获得新脚本,性能提升 2016年12月21日星期三10:06:00 -0800 Fahmida y拉希德 Fahmida y拉希德 <本文> <节课=“页面”>

在Nmap的项目刚刚发布了其开源的跨平台的安全扫描器和网络映射的假日版,有几个重要的改进和bug修复。

New features in Nmap 7.40 include Npcap 0.78r5, for adding driver signing updates to work with Windows 10 Anniversary Update; faster brute-force authentication cracking; and new scripts for Nmap Script Engine, the project’s maintainer Fyodor wrote on the Nmap mailing list.

The de facto standard network mapping and port scanning tool, Nmap (Network Mapper) Security Scanner is widely used by IT and security administrators for network mapping, port-scanning, and network vulnerability testing. Administrators can run Nmap against the network to find open ports, determine what hosts are available on the network, identify what services those hosts are offering, and detect any network information leaked, such as the type of packet filters and firewalls in use.

To read this article in full, please click here

//m.banksfrench.com/article/3152854/nmap-security-scanner-gets-new-scripts-performance-boosts.html
谷歌开源测试套件,以发现密码漏洞 2016年12月20日星期二05:33:00 -0800 Fahmida y拉希德 Fahmida y拉希德

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find weaknesses in cryptographic software libraries, Google has released a test suite as part of Project Wycheproof.

"In cryptography, subtle mistakes can have catastrophic consequences, and mistakes in open source cryptographic software libraries repeat too often and remain undiscovered for too long," Google security engineers Daniel Bleichenbacher and Thai Duong, wrote in a post announcing the project on the Google Security blog.

To read this article in full, please click here

//m.banksfrench.com/article/3152364/google-open-sources-test-suite-to-find-crypto-bugs.html