Cyber Security

Want to know cyber security? we have a huge selection of cyber security information on alibabacloud.com

UF support software into the progressive localization

With the discontinuation of services in Windows XP and the drafting of a special support program for the localization of information security equipment, as well as the announcement by the State Internet Information Office about the upcoming cyber security review system in China, the cyber security hot spots such as information technology products related to national security are constantly under review. There are indications that, as the country continues to strengthen the building of information security, IT localization is gradually from the hardware to the operating system, information services and other industrial chain spread. At the first China-made Software Industry Chain Cooperation Summit in 2014, China National Information Security Alliance started the "Localization of Large-scale Enterprise Information System ...

NASA servers exposed to major security risks

NASA's security chief today declared that there were major security risks in the computer servers in the United States, and that outlaws could launch an attack entirely via the Internet. "We found a high risk gap in the mission network across the entire NASA organization, which was exposed before the Internet attack, especially the six control spacecraft," NASA watchdog Paul Martin said at a NASA cyber security review today. Computer servers containing sensitive data have remote attack vulnerabilities that remote attackers can control or make unusable. ...

Precision marketing should pay attention to, beware of advertising fees by hackers suck away

December 9, cyber security research company White Ops Inc. disclosed a shocking report: By adding a monitoring module to various video ads launched by a group of brands, they found that 23% of video advertising browsing across the United States could be false-they should come from a hacker's invasion "Broiler" computers that are programmed at night and automatically click on ads. The survey, by White Ops Inc., selected 36 brands across the U.S. and observed 181 of them in 60 days ...

Data security: Who will win the cyber war?

Data security has been a priority for financial services companies. But a series of cyber attacks by international hackers such as the recent "anonymous", combined with the public mistrust that followed the financial crisis, forced financial services companies to raise their cyber security to prevent data leaks and restore customers ' trust. While the victims of a series of major cyber attacks and data leaks in the 2011 years were Sony, PBS, the U.S. Senate, and even some large companies and government agencies such as the CIA and the FBI, security experts said financial services companies, which had always been the target of fraud, were moving ...

Interpreting DNS attacks: A time bomb for future cyber security threats

Absrtact: 2013 DDoS attacks targeting DNS March 18, 2013, the International Anti-Spam organization website Spamhaus began to suffer from DDoS attacks, to March 27, the peak attack traffic has reached 300Gbps, become the largest DDoS attack in history. The attack caused a network congestion in Europe 2013 DDoS attacks targeting DNS March 18, 2013, the International Anti-Spam organization website Spamhaus began to suffer from DDoS attacks, to March 27, the peak attack traffic has reached 300G ...

Pentagon's research and development department, DARPA, is carrying out an X plan.

Absrtact: The Pentagon's research and development department, DARPA, is implementing an X plan to build the world's first online battlefield alert and defense system in 4 years, costing 125 million of dollars. Associated with the prosperity of Internet applications is an increasingly serious threat to cyber security. DARPA, the military Pentagon's research and development department, is carrying out an X plan to build the world's first online battlefield warning and defense system in 4 years, costing 125 million of dollars. Associated with the prosperity of Internet applications is an increasingly serious threat to cyber security. For the military department, here ...

Pentagon's X Plan: Building the world's first online battlefield alert

Absrtact: The Pentagon's research and development department, DARPA, is implementing an X plan to build the world's first online battlefield alert and defense system in 4 years, costing 125 million of dollars. Associated with the prosperity of Internet applications is an increasingly serious threat to cyber security. DARPA, the military Pentagon's research and development department, is carrying out an X plan to build the world's first online battlefield warning and defense system in 4 years, costing 125 million of dollars. Associated with the prosperity of Internet applications is an increasingly serious threat to cyber security. For the military sector, this is a stark ...

A competitor who makes cyber security products accuses 360 of having copied its product

Absrtact: December 5 News, yesterday afternoon, entrepreneurs in the Black Horse competition, a network security products contestant accused 360 had copied its products, to serve as the judges of Qihoo 360 chairman of the Zhou (Micro bo) on the spot mad. The two staged a red dress to challenge the red clothes December 5 News, yesterday afternoon, a black horse competition, a network security products contestant accused 360 had copied its products, to serve as the judges of Qihoo 360 chairman Zhou (Micro Bo) on the spot. The two staged a "Red Men challenge Red cannon", so that the scene audience surprised. ...

North letter to participate in corporate information operations summit seminar

The current increasingly serious information security issues, not only to personal information security problems, but also become a concern for many businesses. With the recent data breaches, cyber attacks and other information security incidents occur frequently, it is a wake-up call for government and business units. Recently, the 17th Symposium on Enterprise Information Security, organized by SASAC Information Center, was held in Jinan, Shandong Province. The meeting focused on corporate information security, promoting central enterprises to carry out in-depth management and promotion activities, continuously improve the level of information technology, strengthen the information system of state-owned enterprise information security awareness and improve the important information security.

Behind the "Chinese hacker Threat Theory"

Absrtact: The Chinese hacker threat theory is again rampant. The New York Times said January 30 that newspaper computers continued to be attacked by Chinese hackers. The next day, the Wall Street Journal publisher, Dow Jones, also called the gun. The Washington Post also joined the "Chinese hacker Threat Theory" this month 2nd. The New York Times said January 30 that newspaper computers continued to be attacked by Chinese hackers. The next day, the Wall Street Journal's publisher, Dow Jones, also called it "shot." The Washington Post also joined the chorus this month 2nd, saying a 2011-year cyber attack could ...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.