A large sphere of influence of high-risk vulnerabilities exposed last week called the unprecedented CPU, while the well-known hacker organization 'shadow economy' and send ads to sell hacker forum on service, it means that criminals have started to use CPU loopholes to make money. Advertising commitment shadow economy people can get the password and personal information from the user's smartphone or computer, asking price of $ 8900 or the equivalent value of Bitcoin.
Affects nearly every computer processors in the world 'blown' and 'Ghost' vulnerability has been discovered in the last week, despite the presence of some of the technology giant a year ago has been known vulnerabilities. Apple on Friday warned that more than 1 billion units the iPhone, iPad tablet and Apple Computer are subject to vulnerability. Microsoft Windows devices and Android devices are no exception.
Shadow economy of people advertising their authenticity has yet to be confirmed, but it is a network underground world, that dark network's first services to provide examples of hackers exploit loopholes in the recent outbreak of the CPU, meaning the real case will soon surfaced.
On the one hand is the major technology companies non-stop busy updating, on the other hand it is a race against time criminals try to exploit loopholes to grab interests, including stealing passwords, keys, etc., and web history. Since June 2017, the researchers issued a vulnerability warning and vulnerability information may have leaked start.
Apple last Friday acknowledged that in addition to its smart watch, all other devices are affected by the vulnerability. Although it pushed some updates, but many users fear the credibility of some of the sites or the App store, still waiting for further updates. At the same time Google, Microsoft is also in the beleaguered busy updating.
In this war of offensive and defensive vulnerability, speed is everything. |