Aggregator
The CISO: A Field Guide
Android Devices Potentially Compromised by Judy App Weaknesses
We’ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a...
The post Android Devices Potentially Compromised by Judy App Weaknesses appeared first on McAfee Blog.
Fight Credential Stuffing by Taking a New Approach to Authorization
Spark编程手抄 - Python
第三十期 取证实战篇-Surface设备取证
SambaCry: The Linux Sequel to WannaCry
Samba远程代码执行漏洞-CVE-2017-7494
安全摘记:关于安全与黑客
How I Learned to Love Cyber Security
Fake WannaCry Protection Apps Hit the Google Play Store
WannaCry was the ransomware attack heard around the world. It impacted more than 150 countries and infected over 250,000 devices...
The post Fake WannaCry Protection Apps Hit the Google Play Store appeared first on McAfee Blog.
Q1 2017 DDoS Trends Report: 26 Percent Increase in Average Peak Attack Size
Verisign just released its Q1 2017 DDoS Trends Report, which represents a unique view into the attack trends unfolding online, through observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of Verisign DDoS Protection Services. Verisign saw a 23 percent decrease in the number of attacks in Q1 2017; however, […]
The post Q1 2017 DDoS Trends Report: 26 Percent Increase in Average Peak Attack Size appeared first on Verisign Blog.
How a CISO Can Play a Role in Selling Security
Esteemaudit(XP&2003 3389 0day)缓解方法初探
Why Cloud Sprawl Is a Security Risk
Python打包成exe
How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks
Last Friday, the biggest ransomware attack we’ve seen hit organizations everywhere, impacting more than 150 countries. It shut down a...
The post How a Young Cybersecurity Researcher Stopped WannaCry Ransomware in Its Tracks appeared first on McAfee Blog.