¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181127

Ðû²¼Ê±¼ä 2018-11-27
1¡¢µÂ¹úÕþ¸®Ðû²¼SOHO·ÓÉÆ÷Çå¾²Ö¸ÄÏ£¬£¬£¬Ìá³ö¶àÏîÇå¾²½¨Òé

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


µÂ¹úÕþ¸®Ðû²¼¼ÒÍ¥¼°Ð¡ÐͰ칫£¨SOHO£©Â·ÓÉÆ÷µÄÇå¾²Ö¸ÄÏ£¬£¬£¬Ö¼ÔÚ¶Ô·ÓÉÆ÷Çå¾²ÖÆ¶©±ê×¼»¯µÄ¹æÔò¡£ ¡£¡£¡£¡£¡£¡£Õâ·Ý22Ò³µÄÎĵµ×ÛºÏÁË·ÓÉÆ÷³§ÉÌ¡¢µçÐŹ«Ë¾ºÍÓ²¼þÉçÇøµÄÒâ¼û£¬£¬£¬ÓÉÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©¾ÙÐÐÐû²¼¡£ ¡£¡£¡£¡£¡£¡£Ò»Ð©Ö÷ÒªµÄ½¨Òé°üÀ¨Â·ÓÉÆ÷±ØÐèÖ§³Ö²¢ÇÒĬÈÏʹÓÃWPA2ЭÒ飻£»£»£»£»£» £»WiFiÃÜÂëµÄ³¤¶ÈÓ¦¸Ã²»¶ÌÓÚ20λ£»£»£»£»£»£» £»ÃÜÂëÑéÖ¤±ØÐè±ÜÃⱩÁ¦¹¥»÷£»£»£»£»£»£» £»Â·ÓÉÆ÷²»µÃ´øÓÐÈκÎδ¼Í¼µÄºóÃÅÕË»§µÈ¡£ ¡£¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/germany-proposes-router-security-guidelines/


2¡¢Ñо¿Åú×¢Ò»°ëÒÔÉϵÄPHIÐÅϢй¶ÓëÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÊèºöÓйØ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÜЪ¸ùÖÝÁ¢´óѧºÍÔ¼º²»ôÆÕ½ð˹´óѧµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬53%µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¨PHI£©Ð¹Â¶ÊÂÎñÊÇÓÉÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÒòËØµ¼ÖµÄ¡£ ¡£¡£¡£¡£¡£¡£¸ÃÑо¿ÆÊÎöÁË7ÄêÄÚÃÀ¹ú±¬·¢µÄ¿ìÒª1800ÆðPHIй¶ÊÂÎñ£¬£¬£¬ÆäÖÐ33¼ÒÒ½Ôº±¬·¢Á˲»Ö¹1Æðй¶ÊÂÎñ¡£ ¡£¡£¡£¡£¡£¡£ÕâЩй¶µÄÔµ¹ÊÔ­Óɹ²ÓÐ6À࣬£¬£¬°üÀ¨ÍµÇÔ¡¢Î´ÊÚȨ»á¼û¡¢ºÚ¿Í¹¥»÷»òITÊÂÎñ¡¢É¥Ê§¡¢²»µ±´¦Öóͷ£ÒÔ¼°ÆäËü¡£ ¡£¡£¡£¡£¡£¡£ÆäÖÐ53%µÄй¶ÓëÄÚ²¿ÒòËØÓйØ£¬£¬£¬¶ø²»ÊÇÓɺڿͻòÍⲿÒòËØµ¼Ö¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2018/11/26/internal-negligence-data-breaches/


3¡¢IntelÕë¶ÔÓÄÁé±äÌåµÄÐÞ¸´´ó·ù½µµÍÁËLinux 4.20ÖеÄÐÔÄÜ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


IntelÕë¶ÔÓÄÁé±äÌå2£¨CVE-2017-5715£©µÄÐÞ¸´²½·¥´ó·ù½µµÍÁËLinuxÄÚºË4.20ÖеÄÐÔÄÜ¡£ ¡£¡£¡£¡£¡£¡£Æ¾Ö¤PhoronixµÄ»ù×¼²âÊÔ£¬£¬£¬¾ß±¸³¬Ïß³ÌÊÖÒÕµÄCPU£¨¼´Core i3ÒÔÉÏ£©ÊÜÓ°Ïì×î´ó£¬£¬£¬Æ¾Ö¤²âÊÔÓ¦ÓóÌÐòµÄ²î±ð£¬£¬£¬ÔÚCore i9ÉÏ×î¸ß¿ÉµÖ´ï30%-50%µÄÐÔÄÜϽµ£¬£¬£¬ÕâÏÔÈ»ÊDz»¿É½ÓÊܵÄ¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâÓëSTIBPÓйØ£¬£¬£¬STIBPÊÇIntelÌṩµÄÈý¸öÐÞ¸´²½·¥Ö®Ò»£¬£¬£¬ÆäËüÁ½¸öÊÇIBRSºÍIBPB¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://nakedsecurity.sophos.com/2018/11/26/spectre-mitigation-guts-linux-4-20-performance/


4¡¢Ñо¿ÍŶÓÐû²¼Òƶ¯¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ¡£ ¡£¡£¡£¡£¡£¡£XLoader·ºÆðÓÚ2018Äê4Ô£¬£¬£¬¶øFakeSpyÔòÔÚ6Ô·ÝÏòAndroidÓû§Ìᳫ¹¥»÷¡£ ¡£¡£¡£¡£¡£¡£×èÖ¹10Ô£¬£¬£¬È«Çò¹²ÓÐ384748ÃûÊܺ¦ÕßÊܵ½XLoaderºÍFakeSpyµÄ¹¥»÷£¬£¬£¬ÆäÖд󲿷ÖλÓÚº«¹úºÍÈÕ±¾¡£ ¡£¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÐÂÑо¿£¬£¬£¬XLoaderºÍFakeSpyҪôÊôÓÚͳһ¸ö¹¥»÷×éÖ¯£¬£¬£¬ÒªÃ´ËüÃǵÄÔËÓªÕßÖ®¼ä±£´æÁªÏµ¡£ ¡£¡£¡£¡£¡£¡£Í¨Ì«¹ýÎöXLoaderºÍFakeSpyµÄ´úÂë½á¹¹ºÍÐÐΪģʽ£¬£¬£¬Ñо¿Ö°Ô±»¹ÒÔΪFakeSpyÓë·¸·¨ÍÅ»ïYanbian Gang±£´æ¹ØÁª¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/


5¡¢¿¨°Í˹»ùÐû²¼2019Äê½ðÈÚÍþвºÍ¼ÓÃÜÇ®±ÒÍþвµÄÇ÷ÊÆÕ¹Íû

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2019Äê½ðÈÚ»ú¹¹¡¢¼ÓÃÜÇ®±ÒÒÔ¼°¹¤ÒµÆóÒµµÄÍþвÇ÷ÊÆµÄÕ¹ÍûÆÊÎö¡£ ¡£¡£¡£¡£¡£¡£2019Ä깤ҵÆóÒµÃæÁÙµÄÌôÕ½°üÀ¨¹¥»÷ÃæÒ»Ö±ÔöÌí¡¢·¸·¨·Ö×ÓºÍÌØÊâÕûÌåµÄÐËȤÈÕÒæÔöÌí¡¢ÐÅÏ¢²»Í¸Ã÷µ¼Öµ͹ÀͨÀýÍþвˮƽÒÔ¼°¶ÔÍþвϸ½ÚµÄÎó½âµ¼ÖÂδÄܾÙÐÐ×îÓű£»£»£»£»£»£» £»¤¡£ ¡£¡£¡£¡£¡£¡£¹ØÓÚ¼ÓÃÜÇ®±ÒµÄÕ¹ÍûÔò°üÀ¨¶ÔÇø¿éÁ´ÓÃ;µÄ̽Ë÷»òÐí»áÏûÊÅ¡¢¼ÓÃÜÇ®±Ò×÷Ϊ֧¸¶ÊֶεÄÓÃ;¿ÉÄÜ»áϽµÒÔ¼°¼ÓÃÜÇ®±ÒµÄ¼ÛÇ®²»»áÔٻص½2017ÄêµÄ¸ßλ¡£ ¡£¡£¡£¡£¡£¡£¹ØÓÚ½ðÈÚ»ú¹¹µÄÕ¹Íû°üÀ¨¿ÉÄܻᱬ·¢Í¨¹ýÉúÎïʶ±ðÊý¾ÝʵÑéµÄ͵ÇÔ£¬£¬£¬Õë¶ÔÓ¡°ÍµØÇø¡¢¶«ÄÏÑǺÍÖÐÅ·µÄ½ðÈÚÍþв¿ÉÄÜ»á¼Ó¾ç£¬£¬£¬¹©Ó¦Á´¹¥»÷½«»áÒ»Á¬µÈ¡£ ¡£¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/


6¡¢Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý3.36Íò¸öÊÛ¼ÙÓòÃû

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

ƾ֤ŷÖÞÐ̾¯×éÖ¯µÄÐÂΟ壬£¬£¬Å·Ã˸÷µØµÄÖ´·¨»ú¹¹ÒÑÀֳɹرÕÁË33654¸öÏúÊÛð³äαÁÓ²úÆ·£¨°üÀ¨¼ÙÒ©¡¢µÁ°æÓ°Ï·¡¢µÁ°æÒôÀֵȣ©µÄÓòÃû¡£ ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÖªÊ¶²úȨ·¸·¨Ð­µ÷ͬÃË£¨IPC3£©»¹¾Ð²¶ÁË12ÃûÏÓÒÉÈ˲¢²é»ñÁ˼ÛÖµÁè¼Ý100ÍòÅ·ÔªµÄÕË»§¡£ ¡£¡£¡£¡£¡£¡£¸ÃÐж¯ÊÇ2014ÄêÆô¶¯µÄ¹¥»÷ÊÛ¼ÙµÄIn Our Sites£¨IOS£©Ðж¯µÄÑÓÐø¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/operation-takes-down-over-33-600-internet-domains-selling-counterfeits-goods


ÉùÃ÷£º±¾×ÊѶÓɼøºÚµ£±£ÍøÎ¬ËûÃüÇ徲С×é·­ÒëºÍÕûÀí