主机论坛_虚拟主机_美国主机_美国虚拟主机_云主机技术_全球主机交流聚集地—Web Hosting Talk 中文站

找回密码
立即注册
发新帖

0

收听

3

听众

46

主题
发表于 2018-1-9 11:09:17 | 查看: 863| 回复: 2
上周曝出的CPU高危漏洞影响范围之大堪称前所未有,而知名黑客组织“影子经济人”在出售黑客服务论坛上发的广告,则意味着已有犯罪分子开始利用CPU漏洞赚钱。影子经济人的广告宣传承诺,可从用户的智能手机或计算机上拿到口令和个人信息,开价8900美元或同等价值的比特币。
几乎影响到世界每一台计算机处理器的“熔断”和“幽灵”漏洞,于上周被曝出,尽管某些科技巨头一年前已经知道漏洞的存在。苹果上周五警告,超过10亿台iPhone手机、iPad平板和苹果电脑均受漏洞影响。微软的Windows设备和安卓设备也不例外。
影子经济人的广告其真实性还有待确认,但这是网络地下世界,即暗网中的首个利用近期爆发的CPU漏洞提供黑客服务的例子,意味着真实案例不久就会浮出水面。
一方面是各大科技公司马不停蹄的忙于更新,另一方面则是犯罪分子争分夺秒的试图利用漏洞攫取利益,包括盗取口令、网页历史记录和密钥等。自从2017年6月,研究人员发出漏洞警告之后,漏洞信息就有开始泄露的可能。
苹果在上周五承认,除了它的智能手表以外,其他所有设备都受漏洞影响。虽然已经推送了一些更新,但许多用户由于担心一些网站或App商店的可信性,仍然在等待进一步的更新。与此同时谷歌、微软也都在焦头烂额的忙于更新。
在漏洞攻防的这场战争中,速度决定一切。

收藏回复 显示全部楼层 道具 举报

发表于 2018-1-16 16:51:57
A large sphere of influence of high-risk vulnerabilities exposed last week called the unprecedented CPU, while the well-known hacker organization 'shadow economy' and send ads to sell hacker forum on service, it means that criminals have started to use CPU loopholes to make money. Advertising commitment shadow economy people can get the password and personal information from the user's smartphone or computer, asking price of $ 8900 or the equivalent value of Bitcoin.
Affects nearly every computer processors in the world 'blown' and 'Ghost' vulnerability has been discovered in the last week, despite the presence of some of the technology giant a year ago has been known vulnerabilities. Apple on Friday warned that more than 1 billion units the iPhone, iPad tablet and Apple Computer are subject to vulnerability. Microsoft Windows devices and Android devices are no exception.
Shadow economy of people advertising their authenticity has yet to be confirmed, but it is a network underground world, that dark network's first services to provide examples of hackers exploit loopholes in the recent outbreak of the CPU, meaning the real case will soon surfaced.
On the one hand is the major technology companies non-stop busy updating, on the other hand it is a race against time criminals try to exploit loopholes to grab interests, including stealing passwords, keys, etc., and web history. Since June 2017, the researchers issued a vulnerability warning and vulnerability information may have leaked start.
Apple last Friday acknowledged that in addition to its smart watch, all other devices are affected by the vulnerability. Although it pushed some updates, but many users fear the credibility of some of the sites or the App store, still waiting for further updates. At the same time Google, Microsoft is also in the beleaguered busy updating.
In this war of offensive and defensive vulnerability, speed is everything.

回复 显示全部楼层 道具 举报

发表于 2018-1-16 16:53:05
A large sphere of influence of high-risk vulnerabilities exposed last week called the unprecedented CPU, while the well-known hacker organization 'shadow economy' and send ads to sell hacker forum on service, it means that criminals have started to use CPU loopholes to make money. Advertising commitment shadow economy people can get the password and personal information from the user's smartphone or computer, asking price of $ 8900 or the equivalent value of Bitcoin.
Affects nearly every computer processors in the world 'blown' and 'Ghost' vulnerability has been discovered in the last week, despite the presence of some of the technology giant a year ago has been known vulnerabilities. Apple on Friday warned that more than 1 billion units the iPhone, iPad tablet and Apple Computer are subject to vulnerability. Microsoft Windows devices and Android devices are no exception.
Shadow economy of people advertising their authenticity has yet to be confirmed, but it is a network underground world, that dark network's first services to provide examples of hackers exploit loopholes in the recent outbreak of the CPU, meaning the real case will soon surfaced.
On the one hand is the major technology companies non-stop busy updating, on the other hand it is a race against time criminals try to exploit loopholes to grab interests, including stealing passwords, keys, etc., and web history. Since June 2017, the researchers issued a vulnerability warning and vulnerability information may have leaked start.
Apple last Friday acknowledged that in addition to its smart watch, all other devices are affected by the vulnerability. Although it pushed some updates, but many users fear the credibility of some of the sites or the App store, still waiting for further updates. At the same time Google, Microsoft is also in the beleaguered busy updating.
In this war of offensive and defensive vulnerability, speed is everything.

回复 显示全部楼层 道具 举报

您需要登录后才可以回帖 登录 | 立即注册

Archiver|手机版|小黑屋|WebHostingTalk中文站

GMT+8, 2024-5-18 09:48 , Processed in 0.068197 second(s), 23 queries .

Powered by Discuz! X3.4

Copyright © 2001-2024, Tencent Cloud.

快速回复 返回顶部 返回列表