Hacking events ringing network security alarms
(Forwarded ... )
22nd this month, Weibo topic # E-commerce in the face of hackers lost millions # sparked a hot debate. It is reported that the event is the first social e-commerce show Ah, the app in the event of a machine in lieu of real users to register for download to obtain rewards, many times cheating, millions of active funds immediately exhausted, the actual interests of other users have been infringed.
According to the China Internet Network Information Center (CNNIC) statistics, as of June 2015, the total number of Internet users has reached 668 million people. It can be said that the internet has been deep into people's lives. But at the same time, hackers have happened, hacking and people's lives are getting closer.
Mobile phone system Storage vulnerability
The 2014 large-scale "hollywood actress nude leaked photos" event sensation, the incident is likely to be a foreign hacker exploit Apple's icloud cloud system vulnerability, after cracking the simple password of the female artists to invade and illegally steal nude photos, and then published in the online forum. On the mobile side, attackers use the Samsung IME vulnerability to spy on users ' cameras and microphones, read input and outgoing text messages, and install malicious applications that affect more than 600 million of Samsung mobile users worldwide.
The same Web site password buried worries
Last year, a large number of 12306 of usernames and passwords were spread on the black market, and the data could be obtained by hackers attempting to log in 12306 with other compromised cipher libraries. If the user in different sites with the same user name password, 12306 of the account ID number and other sensitive information, it is likely to be exploited by criminals.
The car program can be manipulated by hackers
Surprisingly, in addition to mobile phone systems, computer systems, hackers can also invade the car's program. Jeep in this year suffered a robbery-the United States genius experts Charlie Miller and Chrisvalasek in Las Vegas Defcon Congress, and the domestic Syscan360 Congress to demonstrate the use of loopholes in the Jeep's driving process to control it, The order made the vehicle deviate from the road and into the ditch.
Endless hacker events for network security sounded a wake-up call, network security has been from the original niche area gradually by ordinary netizens know and concern. Whether it is a website or institutions, enterprises, should be aware of the importance of network security, increase network security forces to defend their network systems and information security is not intrusive. As netizens, to establish a sense of security, log on to the various sites to pay attention to the different password, do not have a certified site to fill in personal important information. From all aspects of the strengthening of prevention, do not allow criminals to take advantage.
Day and Day PA http://www.riripa.cn
Hacking incidents ringing network security alarms