Article on the subject of "network security"
-
Alibaba and the fortified Jack Ma wall made the Chinese hackers terrified
to deal with dangerous hackers, jack ma decided to recruit all those who attacked alibaba's network to the company to work for themselves.
-
Young people are too confident when talking about online security!
when talking to many young people who are in daily contact with technology even more with relatives or friends, many of them tell me that humanity is really living at the height of public technology and information security. is this thought correct?
-
Deep Learning - new cybersecurity tool?
artificial intelligence (ai) is increasingly contributing to every area of human life. among the sub-domains of artificial intelligence in general and machine learning in particular, it can be said that deep learning is a truly outstanding technological breakthrough.
-
Endpoint Detection and Response threats, an emerging security technology
endpoint threat detection and response (etdr) is a term first introduced by security expert anton chuvakin from gartner in 2013 to refer to the tools mainly focus on detecting and investigating suspicious activities (as well as traces of other phenomena that don't always happen) on the server or
-
The alarming increase in the number of attacks targeted at IoT devices
along with the explosive growth of globalized internet and especially wireless connectivity, the number of attacks targeted internet devices and things (iot) has escalated 'scary. 'throughout 2018.
-
There were 12,449 serious data breaches recorded in 2018, an increase of 424% compared to 2017
a recent statistical report showed alarming facts. specifically, the number of confirmed data violations in 2018 has reached 12,449 cases, an increase of 424% compared to 2017.
-
Ransomware STOP started installing Trojans to steal victim passwords
in addition to encrypting files on the system, ransomware stop strains have also started quietly installing the azorult password stealing trojan on the victim's computer to steal account information, electronic wallet, and file desktop ...
-
Application protection against DFA attacks
differential fault analysis, also known as dfa, is an attack technique designed to recover cryptographic keys from the application ...
-
Ransomware LockerGoga is making a big corporation miserable
norsk hydro - one of the world's largest aluminum and renewable energy corporations based in oslo, norway, was forced to suspend most of its production lines and switch to manual operation. part of a network attack is said to be related to lockergoga malicious code.
-
What is cybercrime? How to prevent cybercrime?
we live in an era of internet globalization. the internet invades every corner of the street, is present in every living room and appears in every breath of life. in addition to the obvious benefits, as well as the enormous positive role in the overall development of all humanity, the global
-
DDoS is ranked as the top threat for businesses in 2018
ddos attacks are considered to be the top high threats for global organizations and businesses.
-
Supercomputers can completely detect cyber threats
as governments, businesses and individual users increasingly trust and use the internet for their daily activities, maintaining cybersecurity will still be an essential task for researchers. as well as security experts worldwide.
-
The new algorithm can prevent cyber-attacks on GPS devices
scientists have developed a new algorithm that can help detect and prevent cyberattacks on gps-enabled devices in real time.
-
Hacker was jailed for 2 years for DDoS attacks against Skype and Google
a 21-year-old was jailed for two years after being accused of conducting ddos attacks on high-tech companies such as skype and google.
-
KRACK attack breaks down the WPA2 WiFi protocol
researcher mathy vanhoef from leuven university discovered a serious security flaw on wi-fi protected access ii (wpa2) network security protocol.
-
If there is not enough ransom for the file, send an email to complain to the hacker, maybe you will get a surprise gift
due to the low income and inability to pay ransom, a victim sent an email to the hacker and received unexpected results.
-
The more dangerous WannaCry version 2.0 has appeared
despite being stopped by a 22-year-old hero, the wannacry 2.0 version will be a new challenge for heroes.
-
Microsoft released an emergency patch to prevent ransomware from attacking
microsoft has released an emergency patch for windows versions to prevent further attacks by wannacry ransomware (microsoft flagged as ransom: win32 / wannacrypt).
-
Funny caption of hackers spreading WannaCry malicious code
the hacker who spreads the most dangerous virus in 2017 also tries to make a joke in his ransom notice with a joke.
-
McAfee expert explained how deepfake and AI are drilling through the cyber security wall
'hundred listeners are not equal to one', this proverb might not be accurate when it comes to cyber security.
-
The basic steps in dealing with network security issues that you need to understand
with the general situation of network security, which is becoming more and more complicated, today, the system security is becoming more urgent than ever.
-
Will 5G make us more vulnerable to cyber attacks?
the new generation of 5g mobile networks is beginning to be deployed increasingly popular in countries around the world.
-
Israel launches the world's first cybersecurity network
social networks are having more and more profound impacts on all aspects of life, including the field of network security and security.
-
Awareness and experience - the most important factor in every network security process
need to improve information security capacity in 3 basic elements: people, processes, and technology solutions
-
Guidelines for securing computer network systems
today security has become the hottest topic on the internet. with the rapid pace of development of the global network has brought undeniable economic and social benefits. the same advantages have been the ideal place for criminals, hackers use exploits for many different purposes.
-
[Infographic] 5G network security: What service providers need to know
with such influence, the security risks and security that 5g brings are also great. the cisco infographic below will show you the basic information about 5g security for network service providers.
-
What is Network TAP? How does it help secure the system?
a network tap is a hardware device that you place in a network, especially between two connected devices of a network (such as a switch, router, or firewall) to monitor network traffic.
-
Alarming statistics on the situation of network security in our country in the first half of 2019
the number of cyber attacks on our country's computer systems in the first 6 months of 2019 had a record increase.
-
Network security challenges in 2014
cyber security company bkav afternoon 13/11 announced that ddos attacks, spyware and malicious code on mobile phones were outstanding security issues in 2013 and will continue to be trend of 2014.
-
Multiple choice questions about network security implementation have P2 answers
security of information and network security is essential in today's 4.0 technology era. to help readers have more useful knowledge on this topic, the quiz below network administrators will send you interesting questions.
-
IBM embarked on FPT to distribute new network security solutions
in the context of many experts warning about the explosion of cyberattacks and the increasing complexity of current cyber threats, ibm has partnered with fpt trading company (fpt trading) to introduce new network security solution ibm security network protection xgs 4100
-
Multiple choice questions on network security deployment have the answer P6
in the current technology era, it is extremely necessary for anyone to be secure when accessing the network. in this test, network administrator will provide you with useful knowledge to ensure network security. invite your reference.
-
The 5G era is near, but are security procedures ready?
the new 5g mobile network generation is beginning to be gradually deployed in leading countries like the united states and europe, bringing promises of the future of a seamless and seamless connection standard among all. technology world gadgets, from sensors, software systems, to robots and iot
-
Multiple choice questions on network security implementation have P3 answers
what do you know about network security deployment? if you are a person who is studying and working on information technology, you probably can't ignore the very interesting knowledge that the network administrator wants to share below.
-
Google launches Backstory - New network security tool for businesses
today, march 7, google's one-year-old network security co-operation organization, chronicle, officially announced its first commercial product, called backstory.
-
What is Network Security and the benefits it brings?
network security is defined as a set of measures and technologies to protect the integrity, usability and availability of computer networks.
-
Find out about Ghidra - NSA's powerful cybersecurity tool
cyber security is always an urgent issue, making headaches for network security professionals not only in every business, but at the national level, it is even more difficult.
-
4 problems difficult for network security 2013
after a dizzying pace of development, it can be said that 2012 is a year when global internet in general and network security in particular show signs of slowing down. many experts have predicted that some trends or trends have shaped the internet world in 2012 will continue to play an important
-
Multiple choice questions about network security implementation have the answer P5
network security is extremely necessary for anyone. in this article, join the network administrator to learn about this topic through multiple-choice questions below.
-
Tricks to improve wifi network security
the more developed the use of wifi network, the more problems arise, the unsafe wifi security affects the access speed. so how to improve the absolute security of home wireless network.