¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181127
Ðû²¼Ê±¼ä 2018-11-27
µÂ¹úÕþ¸®Ðû²¼¼ÒÍ¥¼°Ð¡ÐͰ칫£¨SOHO£©Â·ÓÉÆ÷µÄÇå¾²Ö¸ÄÏ£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¶Ô·ÓÉÆ÷Çå¾²ÖÆ¶©±ê×¼»¯µÄ¹æÔò¡£¡£¡£¡£Õâ·Ý22Ò³µÄÎĵµ×ÛºÏÁË·ÓÉÆ÷³§ÉÌ¡¢µçÐŹ«Ë¾ºÍÓ²¼þÉçÇøµÄÒâ¼û£¬£¬£¬£¬£¬£¬£¬ÓÉÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©¾ÙÐÐÐû²¼¡£¡£¡£¡£Ò»Ð©Ö÷ÒªµÄ½¨Òé°üÀ¨Â·ÓÉÆ÷±ØÐèÖ§³Ö²¢ÇÒĬÈÏʹÓÃWPA2ÐÒ飻£»£»£»£»WiFiÃÜÂëµÄ³¤¶ÈÓ¦¸Ã²»¶ÌÓÚ20λ£»£»£»£»£»ÃÜÂëÑéÖ¤±ØÐè±ÜÃⱩÁ¦¹¥»÷£»£»£»£»£»Â·ÓÉÆ÷²»µÃ´øÓÐÈκÎδ¼Í¼µÄºóÃÅÕË»§µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/germany-proposes-router-security-guidelines/2¡¢Ñо¿Åú×¢Ò»°ëÒÔÉϵÄPHIÐÅϢй¶ÓëÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÊèºöÓйØ
ÃÜЪ¸ùÖÝÁ¢´óѧºÍÔ¼º²»ôÆÕ½ð˹´óѧµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬53%µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¨PHI£©Ð¹Â¶ÊÂÎñÊÇÓÉÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÒòËØµ¼Öµġ£¡£¡£¡£¸ÃÑо¿ÆÊÎöÁË7ÄêÄÚÃÀ¹ú±¬·¢µÄ¿ìÒª1800ÆðPHIй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ33¼ÒÒ½Ôº±¬·¢Á˲»Ö¹1Æðй¶ÊÂÎñ¡£¡£¡£¡£ÕâЩй¶µÄÔµ¹ÊÔÓɹ²ÓÐ6À࣬£¬£¬£¬£¬£¬£¬°üÀ¨ÍµÇÔ¡¢Î´ÊÚȨ»á¼û¡¢ºÚ¿Í¹¥»÷»òITÊÂÎñ¡¢É¥Ê§¡¢²»µ±´¦Öóͷ£ÒÔ¼°ÆäËü¡£¡£¡£¡£ÆäÖÐ53%µÄй¶ÓëÄÚ²¿ÒòËØÓйأ¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÓɺڿͻòÍⲿÒòËØµ¼Ö¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2018/11/26/internal-negligence-data-breaches/3¡¢IntelÕë¶ÔÓÄÁé±äÌåµÄÐÞ¸´´ó·ù½µµÍÁËLinux 4.20ÖеÄÐÔÄÜ
IntelÕë¶ÔÓÄÁé±äÌå2£¨CVE-2017-5715£©µÄÐÞ¸´²½·¥´ó·ù½µµÍÁËLinuxÄÚºË4.20ÖеÄÐÔÄÜ¡£¡£¡£¡£Æ¾Ö¤PhoronixµÄ»ù×¼²âÊÔ£¬£¬£¬£¬£¬£¬£¬¾ß±¸³¬Ïß³ÌÊÖÒÕµÄCPU£¨¼´Core i3ÒÔÉÏ£©ÊÜÓ°Ïì×î´ó£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤²âÊÔÓ¦ÓóÌÐòµÄ²î±ð£¬£¬£¬£¬£¬£¬£¬ÔÚCore i9ÉÏ×î¸ß¿ÉµÖ´ï30%-50%µÄÐÔÄÜϽµ£¬£¬£¬£¬£¬£¬£¬ÕâÏÔÈ»ÊDz»¿É½ÓÊܵġ£¡£¡£¡£¸ÃÎÊÌâÓëSTIBPÓйأ¬£¬£¬£¬£¬£¬£¬STIBPÊÇIntelÌṩµÄÈý¸öÐÞ¸´²½·¥Ö®Ò»£¬£¬£¬£¬£¬£¬£¬ÆäËüÁ½¸öÊÇIBRSºÍIBPB¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://nakedsecurity.sophos.com/2018/11/26/spectre-mitigation-guts-linux-4-20-performance/4¡¢Ñо¿ÍŶÓÐû²¼Òƶ¯¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ¡£¡£¡£¡£XLoader·ºÆðÓÚ2018Äê4Ô£¬£¬£¬£¬£¬£¬£¬¶øFakeSpyÔòÔÚ6Ô·ÝÏòAndroidÓû§Ìᳫ¹¥»÷¡£¡£¡£¡£×èÖ¹10Ô£¬£¬£¬£¬£¬£¬£¬È«Çò¹²ÓÐ384748ÃûÊܺ¦ÕßÊܵ½XLoaderºÍFakeSpyµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚº«¹úºÍÈÕ±¾¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÐÂÑо¿£¬£¬£¬£¬£¬£¬£¬XLoaderºÍFakeSpyҪôÊôÓÚͳһ¸ö¹¥»÷×éÖ¯£¬£¬£¬£¬£¬£¬£¬ÒªÃ´ËüÃǵÄÔËÓªÕßÖ®¼ä±£´æÁªÏµ¡£¡£¡£¡£Í¨Ì«¹ýÎöXLoaderºÍFakeSpyµÄ´úÂë½á¹¹ºÍÐÐΪģʽ£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÒÔΪFakeSpyÓë·¸·¨ÍÅ»ïYanbian Gang±£´æ¹ØÁª¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/5¡¢¿¨°Í˹»ùÐû²¼2019Äê½ðÈÚÍþвºÍ¼ÓÃÜÇ®±ÒÍþвµÄÇ÷ÊÆÕ¹Íû
¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2019Äê½ðÈÚ»ú¹¹¡¢¼ÓÃÜÇ®±ÒÒÔ¼°¹¤ÒµÆóÒµµÄÍþвÇ÷ÊÆµÄÕ¹ÍûÆÊÎö¡£¡£¡£¡£2019Ä깤ҵÆóÒµÃæÁÙµÄÌôÕ½°üÀ¨¹¥»÷ÃæÒ»Ö±ÔöÌí¡¢·¸·¨·Ö×ÓºÍÌØÊâÕûÌåµÄÐËȤÈÕÒæÔöÌí¡¢ÐÅÏ¢²»Í¸Ã÷µ¼Öµ͹ÀͨÀýÍþвˮƽÒÔ¼°¶ÔÍþвϸ½ÚµÄÎó½âµ¼ÖÂδÄܾÙÐÐ×îÓű£»£»£»£»£»¤¡£¡£¡£¡£¹ØÓÚ¼ÓÃÜÇ®±ÒµÄÕ¹ÍûÔò°üÀ¨¶ÔÇø¿éÁ´ÓÃ;µÄ̽Ë÷»òÐí»áÏûÊÅ¡¢¼ÓÃÜÇ®±Ò×÷Ϊ֧¸¶ÊֶεÄÓÃ;¿ÉÄÜ»áϽµÒÔ¼°¼ÓÃÜÇ®±ÒµÄ¼ÛÇ®²»»áÔٻص½2017ÄêµÄ¸ßλ¡£¡£¡£¡£¹ØÓÚ½ðÈÚ»ú¹¹µÄÕ¹Íû°üÀ¨¿ÉÄܻᱬ·¢Í¨¹ýÉúÎïʶ±ðÊý¾ÝʵÑéµÄ͵ÇÔ£¬£¬£¬£¬£¬£¬£¬Õë¶ÔÓ¡°ÍµØÇø¡¢¶«ÄÏÑǺÍÖÐÅ·µÄ½ðÈÚÍþв¿ÉÄÜ»á¼Ó¾ç£¬£¬£¬£¬£¬£¬£¬¹©Ó¦Á´¹¥»÷½«»áÒ»Á¬µÈ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/6¡¢Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý3.36Íò¸öÊÛ¼ÙÓòÃû
ƾ֤ŷÖÞÐ̾¯×éÖ¯µÄÐÂΟ壬£¬£¬£¬£¬£¬£¬Å·Ã˸÷µØµÄÖ´·¨»ú¹¹ÒÑÀֳɹرÕÁË33654¸öÏúÊÛð³äαÁÓ²úÆ·£¨°üÀ¨¼ÙÒ©¡¢µÁ°æÓ°Ï·¡¢µÁ°æÒôÀֵȣ©µÄÓòÃû¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÖªÊ¶²úȨ·¸·¨Ðµ÷ͬÃË£¨IPC3£©»¹¾Ð²¶ÁË12ÃûÏÓÒÉÈ˲¢²é»ñÁ˼ÛÖµÁè¼Ý100ÍòÅ·ÔªµÄÕË»§¡£¡£¡£¡£¸ÃÐж¯ÊÇ2014ÄêÆô¶¯µÄ¹¥»÷ÊÛ¼ÙµÄIn Our Sites£¨IOS£©Ðж¯µÄÑÓÐø¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.europol.europa.eu/newsroom/news/operation-takes-down-over-33-600-internet-domains-selling-counterfeits-goodsÉùÃ÷£º±¾×ÊѶÓÉ918²©ÌìÌÃάËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ