¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20180709

Ðû²¼Ê±¼ä 2018-07-09

¡¾Êý¾Ýй¶¡¿Ñо¿Ö°Ô±·¢Ã÷½¡ÉíAPP Polar±£´æÇå¾²Îó²î£¬¿Éµ¼ÖÂÓû§Î»ÖÃÐÅϢй¶


Ñо¿Ö°Ô±·¢Ã÷Ê¢ÐеĽ¡ÉíÓ¦ÓÃPolarµÄAPI±£´æÇå¾²Îó²î£¬¿ÉÔÊÐíÈκÎÈËͨ¹ýÐÞ¸Ää¯ÀÀÆ÷ÍøÖ·À´ÅÌÎÊÈκÎÓû§¼¸ÄêÄڵĽ¡ÉíÔ˶¯£¬ÀýÈçÿһ´ÎÅܲ½ºÍÆïÐеÄÏà¹ØÐÅÏ¢¡£ÕâЩÐÅÏ¢°üÀ¨Êý°ÙÍòÓû§µÄÔ˶¯Êý¾Ý£¬ÉõÖÁ¿Éµ¼ÖÂÔÚ¾üÊ»ùµØºÍÇ鱨²¿·ÖÊÂÇéµÄÓû§µÄλÖÃÐÅϢй¶¡£Ñо¿Ö°Ô±·¢Ã÷Áè¼Ý6400ÃûÓû§Î»ÓÚÀàËÆµÄÃô¸ÐËùÔÚ£¬°üÀ¨¹ú¼ÒÇå¾²¾Ö¡¢°×¹¬¡¢Â׶ؾüÇéÁù´¦ÒÔ¼°Íâ¹úµÄ¾üÊ»ùµØµÈ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/fitness-app-polar-exposed-locations-of-spies-and-military-personnel/


¡¾ÍþвÇ鱨¡¿Ó¢¹ú˰Îñ»ú¹¹HMRC³ÆÈ¥Äê¹²×èÖ¹20750¸ö¶ñÒâÍøÕ¾£¬±ÈǰһÄêÔöÌí29%


Ó¢¹ú˰Îñ»ú¹¹HMRC³ÆÆäÔÚÈ¥Äê¹²×ÊÖú²é·âÁË20750¸ö¶ñÒâÍøÕ¾£¬±ÈǰһÄêÔöÌí29£¥¡£HMRC´¹ÂÚÍøÕ¾³£±»·¸·¨·Ö×ÓʹÓÃÍË˰µÈÃûÄ¿¾ÙÐÐÕ©Æ­Ô˶¯¡£HMRC»¹³Æ£¬ÆäÔÚ2016Äê11ÔÂʵÑéµÄDMARCЭÒéÒÑ×ÊÖú×èÖ¹ÁË5ÒÚ·â´¹ÂÚÓʼþ¡£¸Ã×éÖ¯Éù³ÆÒÑΪÄÉ˰È˽ÚÔ¼ÁËÔ¼240ÍòÓ¢°÷¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/hmrc-29-increase-malicious-site/


¡¾ÍþвÇ鱨¡¿Ñо¿Ö°Ô±ÖÒÑÔGmailµÚÈý·½Ó¦Óñ£´æ¿Éµ¼ÖÂÓʼþÒþ˽й¶µÄΣº¦


ƾ֤»ª¶û½ÖÈÕ±¨±¨µÀ£¬Ò»Ð©»ùÓÚGmailµÄµÚÈý·½ÓʼþAppÔÊÐíÆä¿ª·¢Ö°Ô±ÔĶÁÓû§µÄµç×ÓÓʼþ£¬°üÀ¨ÊÕ¼þÈËID¡¢Ê±¼ä´ÁÒÔ¼°Õû¸öÓʼþµÄÕýÎÄ¡£ÕâÀàµÚÈý·½Óʼþ½â¾ö¼Æ»®ÌṩÉÌÊÎÑݵÄÊÇÓû§ºÍÓÊÏäÖ®¼äµÄ½ÇÉ«£¬ÓÃÓÚÌṩ»ùÓÚµç×ÓÓʼþµÄ¸ü¶à·þÎñºÍ¹¦Ð§¡£ËäÈ»ÆäÓû§Ð­ÒéÖÐÒѾ­ÉùÃ÷Îú¸ÃÐÐΪ£¬µ«Ðí¶àÓû§¿ÉÄܲ¢Ã»ÓÐ×ÐϸÔĶÁÓû§Ìõ¿î¡£Óû§ÈÔÓ¦¸ÃСÐÄÕâÀàµç×ÓÓʼþAPPµ¼ÖÂÒþ˽й¶µÄΣº¦¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2018/07/google-gmail-apps.html


¡¾Çå¾²²¥±¨¡¿Ñо¿Ö°Ô±ÑÝʾͨ¹ýÒþ²Ø´òÓ¡»ú¸ú×ÙµãÒÔ±£»¤¾Ù±¨ÕßµÄÇå¾²


µÂ¹úµÂÀÛ˹¶Ù¹¤Òµ´óѧµÄËÄÃûÑо¿Ö°Ô±¿ª·¢ÁËÒ»¿îÃûΪDEDAµÄAPP£¬¸ÃAPP¿É¼ì²âºÍÑÚÊμ¤É«ÔóÉ«´òÓ¡»úµÄ¸ú×ٵ㣬ÒÔ±£»¤¾Ù±¨ÕßµÄÇå¾²¡£´òÓ¡»úµÄÒþ²Ø¸ú×Ùµã°üÀ¨Óë´òÓ¡»úÓ²¼þ¡¢´òÓ¡Îĵµ×Ô¼ººÍ´òÓ¡ÈÕÆÚÏà¹ØµÄÐÅÏ¢£¬ÕâЩÐÅÏ¢¶ÔÈËÑÛ²»¿É¼û£¬µ«¿É±»ÓÃÓÚ×·×پٱ¨ÏÓÒÉÈË¡£¸ÃAPP¿ÉÒÔ¼ì²âµ½ÕâЩ¸ú×Ùµãͼ°¸£¬²¢Ìí¼ÓÌØÁíÍâµãÒÔ¾ÙÐÐÄäÃû»¯¡£Ñо¿Ö°Ô±ÌåÏÖËûÃǵÄÄ¿µÄÊÇΪÁËÈ·±£¹«ÃñÓµÓгä·ÖµÄÑÔÂÛ×ÔÓÉ¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/app-masks-hidden-printer-tracking-dots-to-keep-whistleblowers-safe/


¡¾Çå¾²²¥±¨¡¿ÈÕ±¾Ò»¹«Ãñ³ÉΪÊ×ÃûÒò¶ñÒâʹÓÃCoinhiveÍÚ¿ó¾ç±¾¶øÅÐÐ̵ÄÈË


ÈÕ±¾Õþ¸®Åд¦Ò»ÃûÃû½ÐMasato YasudaµÄ24ËêÄÐ×ÓÒ»ÄêÓÐÆÚͽÐÌ£¬µ«»ºÐÌÈýÄê¡£¸ÃÄÐ×ÓÔÚ1ÔºÍ2ÔÂʱ´ú½«Coinhive JavaScriptÍÚ¿ó¾ç±¾Ç¶Èëµ½ÆäÌṩÏÂÔØµÄÓÎÏ·×÷±×¹¤¾ßÖУ¬¸Ã¹¤¾ßµÄÏÂÔØ´ÎÊýÁè¼Ý90´Î£¬²¢ÎªYasudaÍÚ¾òÁ˼ÛÖµÔ¼5000ÈÕÔªµÄÃÅÂÞ±Ò£¨Ô¼45ÃÀÔª£©¡£¸ÃÄÐ×Ó³ÉΪÊ×λÒò¶ñÒâʹÓÃCoinhiveÍÚ¿ó¾ç±¾¶ø±»ÅÐÐ̵ÄÈË¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/first-ever-person-sentenced-for-malicious-use-of-coinhive-library/


¡¾Çå¾²²¥±¨¡¿7ÔÂ6ÈÕÆðÓ¡¶ÈÑëÐÐÕýʽʵÑé¶Ô¼ÓÃÜÇ®±ÒÉúÒâµÄ½ûÁî


ƾ֤ӡ¶Èʱ±¨±¨µÀ£¬7ÔÂ6ÈÕÓ¡¶ÈÑëÐÐ×îÏÈʵÑéÆä¼ÓÃÜÇ®±ÒÉúÒâµÄ½ûÁî¡£ÕâÒ»½ûÁîµÄʵÑéÒâζ×ÅÓ¡¶È¹«Ãñ½«ÎÞ·¨ÔÙÔÚÉúÒâËùÉúÒâ¼ÓÃÜÇ®±Ò£¬Ö»ÄÜʹÓõã¶ÔµãÍøÂç¾ÙÐÐÉúÒâ¡£ÈôÊÇÓ¡¶È¹«ÃñÏëÒª½«¼ÓÃÜÇ®±Ò¶Ò»»³É·¨±Ò£¬ÔòÖ»ÄÜͨ¹ýÊг¡½»Á÷¾ÙÐС£±ðµÄ£¬¼ÓÃÜÇ®±ÒÉúÒâËùºÍÏà¹ØÆóÒµ½«ÎÞ·¨´ÓÓ¡¶ÈÒøÐоÙÐдû¿î¡£

 

Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/cryptocurrency-exchanges-banned-in/