2月29日-每日安全知识热点

https://p1.ssl.qhimg.com/t01eba11609afc35030.jpg

1.cisco 2016年度安全报告

http://www.cisco.com/c/dam/assets/offers/pdfs/cisco-asr-2016.pdf

2.android baidu浏览器远程代码执行漏洞(主要是T5Update更新的时候实现中间人替换APK内的lib) 

http://www.lifeform-labs.com/blog/2016/2/27/remote-code-execution-in-the-baidu-browser-for-android

3.eko11安全会议上8个优秀的英文议题 

http://www.giba.space/2016/02/8-great-talks-at-eko11-in-english_25.html

4.使用metaspliot pwn常见的后门和botnet 

http://resources.infosecinstitute.com/pwning-common-backdoors-and-botnets/

5.Intel SGX 内存加密引擎 

http://eprint.iacr.org/2016/204.pdf

6.openssh for windows 

https://github.com/PowerShell/Win32-OpenSSH/releases

7.车辆连接通信:监视威胁和缓解 

https://www.blackhat.com/docs/eu-15/materials/eu-15-Petit-Self-Driving-And-Connected-Cars-Fooling-Sensors-And-Tracking-Drivers-wp2.pdf

8.使用日用硬件进行高级wi-fi攻击 

https://people.cs.kuleuven.be/~mathy.vanhoef/papers/acsac2014.pdf

9.50个必须参加的安全会议 

https://digitalguardian.com/blog/top-50-must-attend-information-security-conferences

10.Intel CPU bugs 

http://danluu.com/cpu-bugs/

11.树莓派3将内嵌蓝牙和WIFI模块 

http://www.i-programmer.info/news/91-hardware/9485-raspberry-pi-3-with-wifi-and-bluetooth.html

12.事件响应中使用被动DNS 

https://www.vanimpe.eu/2016/02/27/passive-dns-for-incident-response/

13.基于AMD CPU系统的QEMU非权限帐号到host内核ring0利用 

https://lkml.org/lkml/2016/2/26/876

14.android 应用安全设计/安全编码指南书 

https://www.jssec.org/dl/android_securecoding_en.pdf

15.使用rootcheck快速审计*NIX系统 

https://isc.sans.edu/forums/diary/Quick+Audit+of+NIX+Systems/20771

16.outlook 2016 pop3 bug 将删除你的邮件 

http://wp.josh.com/2016/02/24/outlook-2016s-new-pop3-bug-deletes-your-emails/

17.OpenSSL CVE-2016-0799:通过Bio_printf的堆损坏 

https://guidovranken.wordpress.com/2016/02/27/openssl-cve-2016-0799-heap-corruption-via-bio_printf/

18.加固安全现代软件交付生命周期 

http://www.infoq.com/articles/secure-continuous-integration-delivery-lifecycl

免责声明:文章内容不代表本站立场,本站不对其内容的真实性、完整性、准确性给予任何担保、暗示和承诺,仅供读者参考,文章版权归原作者所有。如本文内容影响到您的合法权益(内容、图片等),请及时联系本站,我们会及时删除处理。查看原文

为您推荐