王信傑

98 Added | 2 Magazines | 2 Followers | @cyrilwang2013 | Keep up with 王信傑 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “王信傑”

Blockly Games

[曹家榮] 別搞錯方向!程式設計不是未來教育的核心

其實蔡英文在就職典禮上說的那句:「我們有⋯⋯務實可靠的工程師文化」,只讓我想到一個又一個被責任制壓垮的工程師身體。當然,因為這篇不是從「靠北工程師」轉來的文章,這點我就不多談了。 這篇文章想要談談的是關於「工程師文化」席捲全球帶來的問題。當那個最擅長新媒體政治的美國總統歐巴馬也大張旗鼓地寫下了他第一 …

Google Project Zero discloses dangerous Symantec vulnerability

Google Project Zero disclosed a Symantec vulnerability that can be exploited with zero interaction and was described being as bad as it can possibly …

Information Security

新科技在哪裡,惡意駭客就往那裡去!5大新科技安全堪慮|數位時代

連蘋果的Mac電腦都慘遭勒索軟體的毒手,「大家使用什麼新科技,駭客就會往那裡去!」趨勢科技全球核心技術部資深協理張裕敏7日以「從駭客進化的觀點看新技術的安全問題」為題,分別從勒索軟體、無人機、Docker、手機沒電的公共插座、智慧家庭等5大新科技分享資安新趨勢。他認為資訊安全無所不在,在手機、雲端、 …

小心「鷹眼」!奈及利亞駭客攻擊用信件詐騙中小企業|數位時代

數位時代<p>小心「鷹眼」!奈及利亞駭客攻擊用信件詐騙中小企業|數位時代<p>https://www.bnext.com.tw/article/36637/BN-2015-06-29-154210-44<p>article

數字當密碼太無聊?英國廠商推出表情符號密碼系統,瞄準年輕用戶|數位時代

數位時代<p>數字當密碼太無聊?英國廠商推出表情符號密碼系統,瞄準年輕用戶|數位時代<p>https://www.bnext.com.tw/article/36543/BN-2015-06-17-044249-81<p>article

Will HTTP/2 satisfy the need for speed and enterprise Web security?

The first revision of HTTP in 16 years is close to becoming a formal Internet specification; HTTP/2 has been approved...<p>by the Internet Engineering …

Information Security

Facebook photo leak flaw raises security concerns

A Facebook mobile code vulnerability, which exposed private photos to hackers, has raised questions about the safety of the social network’s coding …

Social Media

Venom is serious, but no Heartbleed, say experts

Security researchers have discovered a zero-day vulnerability in the virtual floppy drive code used by many virtualisation platforms, but experts say …

Information Security

Google Study Shows Security Questions Aren’t All That Secure

What is your favorite food? What was your first teacher’s name? What’s the name of your first pet? Do those questions sound familiar to you? If they do, it’s probably because you either have really boring and repetitive conversations or you’ve answered them as security questions when you signed up …

How can e-commerce website security be ensured?

I am looking for some information about e-commerce website security baselining. I read your e-commerce website...<p>security tip from a few years ago, …

Information Security

NetUSB router vulnerability puts devices in jeopardy

Security researchers recently discovered a major router vulnerability in a widely used Linux kernel driver that...<p>could lead to hackers compromising …

Information Security

PCI DSS 3.1 debuts, requires detailed new SSL security management plan

A new version of the Payment Card Industry Data Security Standard (PCI DSS) has arrived, and with it merchants...<p>must not only prepare for the …

Information Security

Google Compute Engine experiences global cloud outage

Google this week became the latest public cloud vendor to experience a worldwide cloud outage.<p>Google Compute Engine (GCE), the company’s …

Cloud Computing

Lenovo faces lawsuit for pre-installing Superfish adware

A class action lawsuit has been filed against Lenovo after it emerged that the company pre-installed adware that made customers vulnerable to HTTPS …

Cybersecurity

Use latest Android if possible, urge security professionals

Security professionals are urging Android users to update to the latest version of the mobile operating system (OS) after Google decided to halt …

Google Nexus

NASA’s 10 rules for developing safety-critical code

NASA’s been writing mission-critical software for space exploration for decades, and now the organization is turning those guidelines into a coding …

研調:2015年六成品牌企業資料庫恐將遭駭|數位時代

fortune.com 23日報導,高贏國際律師事務所(Goodwin & Procter)隱私暨數據安全事務合夥人Gerard Stegmaier表示,如果說2014年是數據外洩年、那麼2015年將是數據洩露訴訟年。Stegmaier進一步指出,企業很難證明他們安裝了合理的安全防護措施、特別是在這 …

Developers must follow security rules, too

We live in a least-privilege, role-based security world where no company should have full-time admins with full rights. Instead, you should …

Information Security

CodeMonkey

BACK X<p>{{ i18n.t('signup.in_order_to_subscribe') }}<p>Start your free <b>30 days</b> trial or click here to purchase<p>TEACHER<p>Classroom management, tracking and …

Researchers uncover serious NTP security flaws

Researchers have uncovered several vulnerabilities in the Network Time Protocol (NTP), used to synchronize time...<p>across computers and servers around …

Information Security

Expert: FIN4 phishing attacks show new operational sophistication

Phishing has long been such a common attack vector that enterprise information security teams have endeavored to...<p>educate users about the dangers of …

Cybersecurity

SSDP DDoS attacks driving up average DDoS sizes

New research shows the average size of a distributed denial-of-service attack continued to grow last quarter as...<p>more attackers targeted the Simple …

Cybersecurity

Poor password practices put 60% of UK citizens at risk

More than six in 10 UK consumers put their data at risk by using a single password across multiple online accounts, a study has shown.<p>Despite the …

Information Systems

White House hack confirmed; state-affiliated actors suspected

Unnamed White House officials have confirmed that hackers recently infiltrated the unclassified network at the...<p>U.S. government building, with a …

SEO

Snapchat leak shows need for better privacy education, says security analyst

The online leak, via a third party, of images shared on mobile app Snapchat by up to 200,000 teenagers underlines the need for better privacy …

Security

Attackers already targeting Bash security vulnerability

As vendors such as Red Hat Inc. and Apple continue to work on patches that address the "Shellshock" vulnerability...<p>in Bourne-again shell (Bash), new …

Information Security

Zeus malware is back with a new target: Mobile devices

I've heard that a new variant of Zeus -- Zeus-in-the-mobile -- has begun targeting smartphones and other mobile...<p>devices. Can you please explain how …

SEO