¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181127

Ðû²¼Ê±¼ä 2018-11-27
1¡¢µÂ¹úÕþ¸®Ðû²¼SOHO·ÓÉÆ÷Çå¾²Ö¸ÄÏ£¬£¬£¬£¬£¬Ìá³ö¶àÏîÇå¾²½¨Òé

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


µÂ¹úÕþ¸®Ðû²¼¼ÒÍ¥¼°Ð¡ÐͰ칫£¨SOHO£©Â·ÓÉÆ÷µÄÇå¾²Ö¸ÄÏ£¬£¬£¬£¬£¬Ö¼ÔÚ¶Ô·ÓÉÆ÷Çå¾²ÖÆ¶©±ê×¼»¯µÄ¹æÔò¡£¡£¡£¡£¡£Õâ·Ý22Ò³µÄÎĵµ×ÛºÏÁË·ÓÉÆ÷³§ÉÌ¡¢µçÐŹ«Ë¾ºÍÓ²¼þÉçÇøµÄÒâ¼û£¬£¬£¬£¬£¬ÓÉÁª°îÐÅÏ¢Çå¾²°ì¹«ÊÒ£¨BSI£©¾ÙÐÐÐû²¼¡£¡£¡£¡£¡£Ò»Ð©Ö÷ÒªµÄ½¨Òé°üÀ¨Â·ÓÉÆ÷±ØÐèÖ§³Ö²¢ÇÒĬÈÏʹÓÃWPA2ЭÒ飻 £»£»WiFiÃÜÂëµÄ³¤¶ÈÓ¦¸Ã²»¶ÌÓÚ20λ£» £»£»ÃÜÂëÑéÖ¤±ØÐè±ÜÃⱩÁ¦¹¥»÷£» £»£»Â·ÓÉÆ÷²»µÃ´øÓÐÈκÎδ¼Í¼µÄºóÃÅÕË»§µÈ¡£¡£¡£¡£¡£

   

Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/germany-proposes-router-security-guidelines/


2¡¢Ñо¿Åú×¢Ò»°ëÒÔÉϵÄPHIÐÅϢй¶ÓëÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÊèºöÓйØ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


ÃÜЪ¸ùÖÝÁ¢´óѧºÍÔ¼º²»ôÆÕ½ð˹´óѧµÄÒ»ÏîÐÂÑо¿Åú×¢£¬£¬£¬£¬£¬53%µÄСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¨PHI£©Ð¹Â¶ÊÂÎñÊÇÓÉÒ½ÁÆ»ú¹¹µÄÄÚ²¿ÒòËØµ¼ÖµÄ¡£¡£¡£¡£¡£¸ÃÑо¿ÆÊÎöÁË7ÄêÄÚÃÀ¹ú±¬·¢µÄ¿ìÒª1800ÆðPHIй¶ÊÂÎñ£¬£¬£¬£¬£¬ÆäÖÐ33¼ÒÒ½Ôº±¬·¢Á˲»Ö¹1Æðй¶ÊÂÎñ¡£¡£¡£¡£¡£ÕâЩй¶µÄÔµ¹ÊÔ­Óɹ²ÓÐ6À࣬£¬£¬£¬£¬°üÀ¨ÍµÇÔ¡¢Î´ÊÚȨ»á¼û¡¢ºÚ¿Í¹¥»÷»òITÊÂÎñ¡¢É¥Ê§¡¢²»µ±´¦Öóͷ£ÒÔ¼°ÆäËü¡£¡£¡£¡£¡£ÆäÖÐ53%µÄй¶ÓëÄÚ²¿ÒòËØÓйØ£¬£¬£¬£¬£¬¶ø²»ÊÇÓɺڿͻòÍⲿÒòËØµ¼Ö¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2018/11/26/internal-negligence-data-breaches/


3¡¢IntelÕë¶ÔÓÄÁé±äÌåµÄÐÞ¸´´ó·ù½µµÍÁËLinux 4.20ÖеÄÐÔÄÜ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


IntelÕë¶ÔÓÄÁé±äÌå2£¨CVE-2017-5715£©µÄÐÞ¸´²½·¥´ó·ù½µµÍÁËLinuxÄÚºË4.20ÖеÄÐÔÄÜ¡£¡£¡£¡£¡£Æ¾Ö¤PhoronixµÄ»ù×¼²âÊÔ£¬£¬£¬£¬£¬¾ß±¸³¬Ïß³ÌÊÖÒÕµÄCPU£¨¼´Core i3ÒÔÉÏ£©ÊÜÓ°Ïì×î´ó£¬£¬£¬£¬£¬Æ¾Ö¤²âÊÔÓ¦ÓóÌÐòµÄ²î±ð£¬£¬£¬£¬£¬ÔÚCore i9ÉÏ×î¸ß¿ÉµÖ´ï30%-50%µÄÐÔÄÜϽµ£¬£¬£¬£¬£¬ÕâÏÔÈ»ÊDz»¿É½ÓÊܵÄ¡£¡£¡£¡£¡£¸ÃÎÊÌâÓëSTIBPÓйØ£¬£¬£¬£¬£¬STIBPÊÇIntelÌṩµÄÈý¸öÐÞ¸´²½·¥Ö®Ò»£¬£¬£¬£¬£¬ÆäËüÁ½¸öÊÇIBRSºÍIBPB¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://nakedsecurity.sophos.com/2018/11/26/spectre-mitigation-guts-linux-4-20-performance/


4¡¢Ñо¿ÍŶÓÐû²¼Òƶ¯¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾


Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶÓÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þXLoaderºÍFakeSpyµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£XLoader·ºÆðÓÚ2018Äê4Ô£¬£¬£¬£¬£¬¶øFakeSpyÔòÔÚ6Ô·ÝÏòAndroidÓû§Ìᳫ¹¥»÷¡£¡£¡£¡£¡£×èÖ¹10Ô£¬£¬£¬£¬£¬È«Çò¹²ÓÐ384748ÃûÊܺ¦ÕßÊܵ½XLoaderºÍFakeSpyµÄ¹¥»÷£¬£¬£¬£¬£¬ÆäÖд󲿷ÖλÓÚº«¹úºÍÈÕ±¾¡£¡£¡£¡£¡£Æ¾Ö¤Ç÷ÊÆ¿Æ¼¼µÄÐÂÑо¿£¬£¬£¬£¬£¬XLoaderºÍFakeSpyҪôÊôÓÚͳһ¸ö¹¥»÷×éÖ¯£¬£¬£¬£¬£¬ÒªÃ´ËüÃǵÄÔËÓªÕßÖ®¼ä±£´æÁªÏµ¡£¡£¡£¡£¡£Í¨Ì«¹ýÎöXLoaderºÍFakeSpyµÄ´úÂë½á¹¹ºÍÐÐΪģʽ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹ÒÔΪFakeSpyÓë·¸·¨ÍÅ»ïYanbian Gang±£´æ¹ØÁª¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-into-the-connection-between-xloader-and-fakespy-and-their-possible-ties-with-the-yanbian-gang/


5¡¢¿¨°Í˹»ùÐû²¼2019Äê½ðÈÚÍþвºÍ¼ÓÃÜÇ®±ÒÍþвµÄÇ÷ÊÆÕ¹Íû

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

¿¨°Í˹»ùʵÑéÊÒÐû²¼¹ØÓÚ2019Äê½ðÈÚ»ú¹¹¡¢¼ÓÃÜÇ®±ÒÒÔ¼°¹¤ÒµÆóÒµµÄÍþвÇ÷ÊÆµÄÕ¹ÍûÆÊÎö¡£¡£¡£¡£¡£2019Ä깤ҵÆóÒµÃæÁÙµÄÌôÕ½°üÀ¨¹¥»÷ÃæÒ»Ö±ÔöÌí¡¢·¸·¨·Ö×ÓºÍÌØÊâÕûÌåµÄÐËȤÈÕÒæÔöÌí¡¢ÐÅÏ¢²»Í¸Ã÷µ¼Öµ͹ÀͨÀýÍþвˮƽÒÔ¼°¶ÔÍþвϸ½ÚµÄÎó½âµ¼ÖÂδÄܾÙÐÐ×îÓű£» £»£»¤¡£¡£¡£¡£¡£¹ØÓÚ¼ÓÃÜÇ®±ÒµÄÕ¹ÍûÔò°üÀ¨¶ÔÇø¿éÁ´ÓÃ;µÄ̽Ë÷»òÐí»áÏûÊÅ¡¢¼ÓÃÜÇ®±Ò×÷Ϊ֧¸¶ÊֶεÄÓÃ;¿ÉÄÜ»áϽµÒÔ¼°¼ÓÃÜÇ®±ÒµÄ¼ÛÇ®²»»áÔٻص½2017ÄêµÄ¸ßλ¡£¡£¡£¡£¡£¹ØÓÚ½ðÈÚ»ú¹¹µÄÕ¹Íû°üÀ¨¿ÉÄܻᱬ·¢Í¨¹ýÉúÎïʶ±ðÊý¾ÝʵÑéµÄ͵ÇÔ£¬£¬£¬£¬£¬Õë¶ÔÓ¡°ÍµØÇø¡¢¶«ÄÏÑǺÍÖÐÅ·µÄ½ðÈÚÍþв¿ÉÄÜ»á¼Ó¾ç£¬£¬£¬£¬£¬¹©Ó¦Á´¹¥»÷½«»áÒ»Á¬µÈ¡£¡£¡£¡£¡£

 

Ô­ÎÄÁ´½Ó£º

https://securelist.com/ksb-cyberthreats-to-financial-institutions-2019-overview-and-predictions/88944/


6¡¢Å·ÖÞÐ̾¯×éÖ¯¹Ø±ÕÁè¼Ý3.36Íò¸öÊÛ¼ÙÓòÃû

ÄϹ¬NGÓéÀÖ(Öйú)¹Ù·½ÍøÕ¾

ƾ֤ŷÖÞÐ̾¯×éÖ¯µÄÐÂΟ壬£¬£¬£¬£¬Å·Ã˸÷µØµÄÖ´·¨»ú¹¹ÒÑÀֳɹرÕÁË33654¸öÏúÊÛð³äαÁÓ²úÆ·£¨°üÀ¨¼ÙÒ©¡¢µÁ°æÓ°Ï·¡¢µÁ°æÒôÀֵȣ©µÄÓòÃû¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÖªÊ¶²úȨ·¸·¨Ð­µ÷ͬÃË£¨IPC3£©»¹¾Ð²¶ÁË12ÃûÏÓÒÉÈ˲¢²é»ñÁ˼ÛÖµÁè¼Ý100ÍòÅ·ÔªµÄÕË»§¡£¡£¡£¡£¡£¸ÃÐж¯ÊÇ2014ÄêÆô¶¯µÄ¹¥»÷ÊÛ¼ÙµÄIn Our Sites£¨IOS£©Ðж¯µÄÑÓÐø¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.europol.europa.eu/newsroom/news/operation-takes-down-over-33-600-internet-domains-selling-counterfeits-goods


ÉùÃ÷£º±¾×ÊѶÓÉÄϹ¬NGÓéÀÖάËûÃüÇ徲С×é·­ÒëºÍÕûÀí