Tag

information security

1 views collected around this technical thread.

AntTech
AntTech
Jun 16, 2025 · Information Security

Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses

A comprehensive study reveals that Model Context Protocol (MCP) platforms lack strict vetting, users struggle to detect malicious servers, and current large language models cannot effectively resist MCP‑level injection attacks, highlighting critical security challenges and proposing mitigation strategies.

LLM securityMCPSupply chain attack
0 likes · 11 min read
Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses
Java Captain
Java Captain
Jun 8, 2025 · Mobile Development

Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats

This article explains WeChat’s hidden “recover” feature, detailing its official purpose, technical limits, step‑by‑step recovery methods, effectiveness, backup strategies, and the risks of third‑party tools, helping users safely restore lost chat records.

Data RecoveryMobile DevelopmentWeChat
0 likes · 8 min read
Unlock WeChat’s Hidden ‘recover’ Feature to Restore Deleted Chats
Java Captain
Java Captain
May 28, 2025 · Information Security

WeChat Account Unblocking Guide: Self-Service and Manual Appeal Procedures (2025 Update)

This comprehensive guide explains the 2025 WeChat account unblocking process, covering identification of restriction types, required evidence, self‑service five‑step recovery, advanced manual appeal tactics, common issues, and post‑unblock security measures to help users restore access efficiently.

Account RecoverySelf-ServiceWeChat
0 likes · 10 min read
WeChat Account Unblocking Guide: Self-Service and Manual Appeal Procedures (2025 Update)
Efficient Ops
Efficient Ops
May 27, 2025 · Information Security

How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm

Guangzhou police investigated a foreign cyber‑attack on a local tech firm, traced the malicious code to a Taiwan‑based hacker group linked to the DPP, and detailed the group’s low‑level tactics, extensive asset scanning, and use of VPNs and overseas cloud servers.

Taiwan hacker groupcybersecurityhacker attribution
0 likes · 4 min read
How a Taiwan‑Backed Hacker Group Targeted a Guangzhou Tech Firm
Java Tech Enthusiast
Java Tech Enthusiast
May 22, 2025 · Information Security

Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites

Google Chrome now offers an automatic password‑change function that detects leaked credentials, generates strong passwords, and updates them with minimal user effort, while websites must adopt specific autocomplete attributes and change‑password URLs to integrate seamlessly with this security enhancement.

Auto-Password ChangeChromeWeb Development
0 likes · 5 min read
Chrome’s Automatic Password Change Feature and Implementation Guidelines for Websites
Efficient Ops
Efficient Ops
May 20, 2025 · Information Security

How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services

A coordinated overseas cyber‑attack breached a Guangzhou tech firm's self‑service equipment backend, causing hours of service outage, data leakage, and significant losses, prompting swift police investigation, evidence preservation, and a detailed technical analysis of the attackers' methods.

Chinacybersecurityhacker group
0 likes · 4 min read
How an Overseas Hacker Group Disrupted a Guangzhou Tech Company's Services
Top Architect
Top Architect
May 7, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common security threats such as theft, replay and forgery, and provides practical mitigation measures including HTTPS, token encryption, secure storage, expiration policies, two‑factor authentication and safe token refresh mechanisms.

AuthenticationJWTWeb Development
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
macrozheng
macrozheng
Apr 29, 2025 · Information Security

Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights

The article explains why some companies prohibit IntelliJ IDEA, citing copyright risks, security vulnerabilities, efficiency losses from activation prompts, collaboration challenges, and the high cost of commercial licenses, while emphasizing the need to follow unified tool policies.

IntelliJ IDEASoftware Licensingcompany policy
0 likes · 6 min read
Why Companies Ban IntelliJ IDEA: Legal, Security, and Cost Insights
Top Architect
Top Architect
Apr 21, 2025 · Information Security

Understanding JWT Token Security and Mitigation Strategies

This article explains the fundamentals of JSON Web Tokens (JWT), compares token‑based authentication with traditional session authentication, outlines common token security threats such as theft, replay, and forgery, and presents practical mitigation measures including HTTPS, encryption, secure storage, short expiration, MFA, and safe token refresh mechanisms.

AuthenticationHTTPSJWT
0 likes · 14 min read
Understanding JWT Token Security and Mitigation Strategies
Java Architect Essentials
Java Architect Essentials
Apr 20, 2025 · Information Security

Free PC Firewall Recommendations and Comparative Analysis

This article provides a comprehensive comparison of free PC firewall solutions, detailing each software's core functions, suitable scenarios, drawbacks, and source references, followed by key recommendations, compatibility notes, performance assessments, and user feedback to help readers choose the most suitable firewall.

PC securitySoftware Comparisonfirewall
0 likes · 14 min read
Free PC Firewall Recommendations and Comparative Analysis
php中文网 Courses
php中文网 Courses
Apr 11, 2025 · Information Security

Best Practices for Securing PHP Files and Directories

This article explains the risks of exposing sensitive PHP files, outlines common security threats, and provides concrete best‑practice measures such as proper permission settings, .htaccess rules, placing files outside the web root, configuration safeguards, and regular security audits to protect web applications.

File PermissionsSecurityWeb Development
0 likes · 6 min read
Best Practices for Securing PHP Files and Directories
Selected Java Interview Questions
Selected Java Interview Questions
Apr 9, 2025 · Information Security

Using nmap4j in Java to Scan Services and Retrieve Database Version Information

This article explains how to integrate the nmap4j library into a Java SpringBoot project to perform Nmap scans for service and version detection, retrieve database details, handle both Windows and Linux environments, and process the XML results with Dom4j, providing complete code examples and parameter guidance.

Javabackendinformation security
0 likes · 11 min read
Using nmap4j in Java to Scan Services and Retrieve Database Version Information
AntTech
AntTech
Apr 2, 2025 · Information Security

ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group

The ISO/IEC JTC 1/SC 27 plenary meeting in Virginia approved the ISO/IEC 25330 Part 3 standard on Oblivious Transfer Extension, a cryptographic protocol standardized by Ant Group with contributions from Chinese researchers, aiming to improve OT efficiency and interoperability for secure multi‑party computation.

Ant GroupISO/IEC 25330Oblivious Transfer
0 likes · 4 min read
ISO/IEC 25330-3 Standard on Oblivious Transfer Extension Approved, Led by Ant Group
IT Architects Alliance
IT Architects Alliance
Mar 29, 2025 · Information Security

Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison

The article explains why data masking is essential for protecting sensitive information, then details three implementation methods—SQL, Java (with open‑source plugins), and the MyBatis‑Mate‑Sensitive‑Jackson ORM extension—comparing their principles, code examples, advantages, limitations, performance, suitable scenarios, and cost considerations.

JavaMyBatisSQL
0 likes · 17 min read
Database Data Masking Techniques: SQL, Java, and MyBatis-Mate Sensitive-Jackson Comparison
Raymond Ops
Raymond Ops
Mar 28, 2025 · Information Security

Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking

This guide walks you through systematic Linux password hunting techniques—including searching filenames, scanning file contents, extracting credentials from web and config files, cracking hashes with Hashcat and John, leveraging hidden files, MySQL databases, backup archives, and automating discovery with LinPEAS—to elevate privileges and gain full root access.

HashcatJohn the RipperPassword Hunting
0 likes · 30 min read
Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking
Python Programming Learning Circle
Python Programming Learning Circle
Mar 27, 2025 · Information Security

Decrypting Password‑Protected Zip Files with Python

This article explains how to use Python's built‑in zipfile module and the third‑party rarfile library to brute‑force and decrypt encrypted zip archives, handle Chinese filename encoding issues, and generate password permutations efficiently with itertools for flexible password lengths.

file decryptioninformation securityitertools
0 likes · 9 min read
Decrypting Password‑Protected Zip Files with Python
php中文网 Courses
php中文网 Courses
Mar 25, 2025 · Information Security

Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage

This article explains how to automatically detect and block accidental commits of sensitive data such as database passwords or API keys in a PHP project by integrating the captainhook/secrets library via Composer, covering installation, predefined suppliers, custom regex, whitelist usage, and the benefits of CI/CD integration.

CI/CDComposerPHP
0 likes · 4 min read
Using captainhook/secrets with Composer to Detect and Prevent Sensitive Information Leakage
IT Architects Alliance
IT Architects Alliance
Mar 23, 2025 · Information Security

Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies

The article examines the often‑ignored hidden vulnerabilities in cloud architectures—such as API flaws, misconfigurations, and third‑party service risks—illustrates real‑world incidents, explains why enterprises neglect these issues, and offers concrete measures to strengthen cloud security.

API vulnerabilitiescloud securityinformation security
0 likes · 10 min read
Cloud Architecture Security: Overlooked Hidden Vulnerabilities and Mitigation Strategies
IT Services Circle
IT Services Circle
Mar 22, 2025 · Information Security

Microsoft Restores Material Theme Extensions After False Security Flag

Microsoft reinstated the "Material Theme - Free" and "Material Theme Icons - Free" VSCode extensions after an AI‑driven security scan mistakenly flagged them as malicious, prompting a public apology and a review of its scanning policies.

AI scannerMaterial ThemeSecurity
0 likes · 5 min read
Microsoft Restores Material Theme Extensions After False Security Flag
Cognitive Technology Team
Cognitive Technology Team
Mar 22, 2025 · Information Security

Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances

The article examines how cryptographic watermarking can secure AI‑generated content by embedding robust, undetectable, and unforgeable signatures, reviews existing methods such as SynthID and Video Seal, and discusses recent research using pseudo‑random codes, error‑correcting codes, and diffusion inversion to improve watermark resilience.

AI watermarkingLDPCcryptography
0 likes · 9 min read
Cryptographic Watermarking for Generative AI: Techniques, Challenges, and Recent Advances