New: information-securityAll contenthive-129948hive-196917krsteemzzanhive-183959hive-180932photographyhive-166405hive-185836uncommonlabhive-150122lifehive-183397hive-144064bitcoinhive-188619krsuccesshive-139150hive-101145hive-103599hive-124908hive-180301hive-109690hive-184714TrendingNewHotLikersaaforward (25)inย information-securityย โขย last yearBusinesses need to know this or the basics of information security!**Businesses need to know this or the basics of information security! ** In this article, I would like to talk about information that needs to be protected from attackers planning to harm yourโฆnigelmarkdias (69)inย hive-160196ย โขย 3 years agosteemCreated with Sketch.H.E. Dr. Mohamed Al-Kuwaiti, Head of Cyber Security, United Arab Emirates Government , United Arab Emirates at GISEC 2021H.E. Dr. Mohamed Al-Kuwaiti, Head of Cyber Security, United Arab Emirates Government , United Arab Emirates at GISEC 2021, anchored by Eithne Treanor, Former journalist (BBC, CNBC, Sky)teamhumble (74)inย steemhuntย โขย 5 years agobdrive - The benchmark for information securitybdrive The benchmark for information security Screenshots Hunter's comment Our cryptography and technology might be complex, but our user interface is designed to be intuitive andโฆremlaps-lite (76)inย rsslogย โขย 5 years agoScience and technology micro-summaries for July 17, 2019Astronaut is a popular profession for kids in China, but kids in America and the UK would rather be Youtubers; FaceApp application claims perpetual right to use your photos; Neuralink wants to embedโฆsecure-kor (46)inย information-securityย โขย 6 years ago2. ํ์๊ฐ์ ์ค์? - ๋ชธ์บ ํผ์ฑ! ์์ง๋ ๋นํ๋? (Porno live cam chat phishing)์๋ ํ์ธ์! @secure-kor ๋๋ฒ์งธ ๊ธ์ด๋ค์. ์ธํฐ๋ท ์ธ์์๋ ์ ๋ง์ ๋ฒ์ฃ๊ธฐ๋ฒ์ด ์์ต๋๋ค. ๊ทธ์ค์์ ๋ฒ์ฃ์๋ค์ด ๊ฝค๋(?) ์งญ์งคํ ์์ต์ ์ฐฝ์ถํด๋ธ ๋ฒ์ฃ๊ฐ ์์ต๋๋ค. ์๋ก์ด๊ฒ๋ ์๋๊ณ ๊ธฐ๋ฐํ๊ฒ๋ ์๋๋ฐ ๊พธ์คํ๊ฒ ํผํด์๊ฐ ์๊ธฐ๋ ๋ฒ์ฃ์ด๊ธฐ๋ ํฉ๋๋ค. ์ค๋งํธํฐ์ ์ ์ฑ์ดํ ์ค์น๋ฅผ ์ ๋ํด ํ๊ธ์ ๊ฐ์ทจ, ํ๋ฐํ๋ ๋ชธ์บ ํผ์ฑ ์ ๋๋ค. ๋ชธ์บ ํผ์ฑ์โฆsecure-kor (46)inย information-securityย โขย 6 years ago1. SNS ๊ณต๊ฒฉ1์ โํผ์ฑโ ์คํ์์ ์์ ํ ๊น? - ๊ฐ์ง ํ์ด์ค๋ถ ๋ง๋ค๊ธฐ! (Crate fake facebook login page)์๋ ํ์ธ์! @secure-kor์ ๋ณธ๊ฒฉ์ ์ธ ์ฒซ ๊ธ์ด๋ค์. (์ด๊นจ์ ํ๋นผ๊ณ ) ๊ฐ๋ณ๊ฒ ์ฝ์ ์ ์๋ ์ฃผ์ ๊ฐ ๋ญ๊ฐ ์์๊น~? ํ๋ค๊ฐ ์ ํ ์ค๋์ ์ฃผ์ ๋ ๋ฐ๋ก!! ํผ์ฑ์ ๋๋ค. ๋์์ฃ ๋์.. ์ฌ๋ฌ๋ถ๋ค์ ๋... ์ฅ?ใ ๊ทธ๊ฑฐ ๋๋ ์ ๋นํ๋๋ ๋ฐ๋ณด๋ค๋ง ๋นํ๋๊ฑฐ ์๋๊ฐ? ๊ทธ๋์! ์ค์ ํผ์ฑ ์ฌ๋ก๋ค์ ๋ณด๊ณ ์ง์ ๋ชจ์์ํฉ์โฆsecure-kor (46)inย kr-joinย โขย 6 years ago0. ์์ํ๋ ๊ธ์, ์๋ ํ์ธ์ โ steemit ํ์๊ฐ์ ์ด ์ฝ 2์ฃผ ๋ง์ ์น์ธ๋์๋ค์. ๋ญ๊ฐ ์ ์๋ ์ค๋ ๊ฑธ๋ฆด ๊ฒ ๊ฐ๊ณ ์คํ์๋ง์ ๊ธฐ๋ฅ (๋ณดํ , ๋งํฌ๋ค์ด ๊ฐ์..) ๋ ์ต์ํด์ ธ์ผ๊ฒ ๋ค์. newbie๋ ๋ณดํ ๋ด๋ ๋ถ๋ฌ์ ์ธ์ง๋๋ฅผ ์ฌ๋ ค์ผ ํ๋ค๋๋ฐ...์...? ๋ฐฉํฅ์ฑ์ ์ ๋ณด๋ณด์ ๊ณต๋ถ๋ฅผ ์ ๋ฆฌํด์ ์ฌ๋ฆฌ๋ ํฌ์คํ ์ด ์ฃผ๊ฐ ๋ ๊ฒ ๊ฐ์ต๋๋ค. ์๋ฌ๋ฅผโฆtworld (73)inย kr-securityย โขย 7 years ago[์์ ํฐ์ฌ] ์๋์ ์ด๋ฉฐ ์ ๋์ ์ธ Tworld ์ฌ์ ์ ๋ณด์์ด์ผ๊ธฐ "๋ณด์ ๊ด์ ๋ชจ๋ํฐ๋ง... ์ด๊ฑด ์๊ฐ์ง๋..."[์๋์ ์ด๋ฉฐ ์ ๋์ ์ธ Tworld ์ฌ์ ] ์๋ ํ์ธ์, ์ด๊ฒ ์ ๊ฒ ์ ๊ฐ ํ๊ณ ์ถ์ ์ด์ผ๊ธฐ๋ฅผ ์ ๋ @tworld ์ ๋๋ค. ๋๋ฌธ์ ๋ง๋ค์ด์ฃผ์ sunshineyaya7 ์๊ฐ๋ ๋๋ฌด ๊ฐ์ฌ ๋๋ฆฝ๋๋ค. ์ค๋๋ง์ ๋ณด์ ๊ด๋ จ๋ ์ด์ผ๊ธฐ๋ฅผ ๋ ์ฐ๊ฒ ๋์์ต๋๋ค. ํ์ฌ์์ ๋ณด์๋ด๋น์๋ก ์ ๋ฌด๋ฅผ ํ๊ณ ์์ผ๋ฉด์ ์นจํด๋์์ผํฐ ๋ผ๊ณ ๋ถ๋ฆฌ๋ ๋ณด์ ๊ด์ ์ผํฐ๋ฅผ ์ด์์โฆdatapipeline (34)inย securityย โขย 7 years agosteemCreated with Sketch.[SecurityNews] Welcome to the launch of SecurityNewsOur goal here is to provide you with timely and easy-to-use security advice. After writing security alerts for various clients over the years, we thought it would be a good idea to spread securityโฆkukonkoudele (40)inย weblogย โขย 7 years agoChina Defense WeblogThe Reversible Strap Covers are a trendy way to make child's car seat extra comfy. They move beautifully and make an exquisite extension of your expression. Kitchen sinks are usually designed forโฆremlaps (75)inย businessย โขย 7 years agoLearning from Equifax: information security and corporate cultureBefore it's a technical problem, information security is a business problem. The recent breach at Equifax makes me wonder about the company's corporate culture. Here are some musings...โฆcryptobk (40)inย militaryย โขย 7 years agoHow an Elevated US Cyber Command Could Transform the IT Security IndustryOn August 18th, 2017 the White House issued a press release indicating US Cyber Command is to be elevated to the status of a Unified Combatant Command. Currently a subsect of US Strategic Commandโฆsupremezero (36)inย malwareย โขย 7 years ago์คํ์ ์์ํ์ต๋๋ค.๊ฐ์ํํ๋ฅผ ํตํด ์ฒ์ ์ ํ๊ฒ๋ ์คํ์ด ์์ง๋ ์ด๋ค๊ฒ์ธ์ง, ์ด๋ป๊ฒ ๋์๊ฐ๋ ๊ฒ์ธ์ง ์๋ฟ์ง๊ฐ ์๋ค์. ๊ฐ์ํํ๋ฅผ ์๊ณ ๋ ์ดํ๋ถํฐ ๊ณต๋ถํด์ผํ ๊ฒ์ด ์์ฒญ ๋ง์์ก๋ค์. ๋ฐฑ์์ผ๋ ์์๋๋ผ๋ฉด ์ผ๋ง๋ ์ข์์๊น ๋ผ๋ ์๊ฐ์ด ๋ญ๋๋ค. ์ง์ฅ์ธ์ผ๋ก์ ๋ฒ๋ ๋์ ์ ๋ถ ๊ฐ์ํํ์ ํฌ์ํ๋ ์ฌ๋์ด ๋ฏธ๋์ ์น๋ฆฌ์๊ฐ ๋์์ผ๋ฉด ์ข๊ฒ ์ต๋๋ค. ์ด์์ ๋๋ค. ์ปจํ ์ธ ๋ ์ ๊ฐ ๊ณต๋ถํโฆchr15par15y (25)inย libertarianย โขย 8 years agoWho Am I???My passions encompass libertarian, constitutionally conservative philosophies, inventing new and innovative forms of computer hardware and software technologies that aims to strengthen and enhanceโฆmrosenquist (70)inย securityย โขย 8 years agoAttribution of Cyber Attacks Has Limited ValueEnterprises are the target of cyber attacks all the time. Some are minor while others make headlines. Unfortunately, the more public the incident, the greater the emphasis is placed on identifyingโฆ