Article 47: Network operators shall strengthen management of information published by users and, upon discovering information that the law or administrative regulations prohibits the publication or transmission of, they shall immediately stop transmission of that information, employ handling measures such as deleting the information, prevent the information from spreading, save relevant records, and report to…
Read MoreAll versions of TLS and SSL are at risk from BREACH regardless of the encryption algorithm or cipher used. Based on the CRIME attack a BREACH attack can extract login tokens, email addresses or other sensitive information from TLS encrypted web traffic in as little as 30 seconds (depending on the number of bytes to…
Read MoreWhether you take an in-person or online class, cybersecurity courses are great for introducing you to fundamental concepts and helping build up your cybersecurity skills. Preparing yourself for the exam gives you a broad base of practical knowledge and skills you’ll need to handle real-world security situations. Local Hackfest groups organize and compete to develop…
Read MoreWith the benefit of a growing number of libraries, security teams can employ Python to perform malware analysis, create intrusion detection systems, and send TCP packets to machines without third-party tools. When a Cybersecurity Analyst writes a script in Python to automate repetitive processes, this is an example of a programming skill in the cybersecurity…
Read MoreWhere due to business requirements it is truly necessary to provide it outside the mainland, they shall follow the measures jointly formulated by the State cybersecurity and informatization departments and the relevant departments of the State Council to conduct a security assessment; where laws and administrative regulations provide otherwise, follow those provisions. Early research efforts…
Read More