World cup hassle to one's heart's content
Nevertheless, besides the world cup
For safe to broad netizen and network practitioner
The near future has the doubt of famous website two cases to be like user information to divulge incident
Be worth to cause take seriously
Above all station of A of website of 2 dimension barrage releases announcement to say
Suffer hacker attack, close ten million the discharge outside user data
The user that A station appeals the user that never has landed after July 7, 2017 and password intensity are low changes a code in time. If as same as A station code is used in other website, also answer to be revised in time.
The message says, be in early this year March
The skill user data that sells AcFun is published with respect to somebody in dark net
The amount is as high as 8 million!
Average 1 yuan can buy 800!
Do not pass
Release information to divulge in A station that day
The hacker organization that doubt is like attack A to stand expresses in post of dark net hair
Stem from A manner of station customer service is cordial
And the passion to 2 dimension world
Decide termless cutout to divide a database
This can say is to comparative allow (not) quality (should) (face)
The story that A stands comes to an end
Recently
Have website of a large invite applications for a job again " future does not have care " (51job)
user account password is exposed to the sun to be hawked in dark net
With A station photograph is compared, the user message of this leak is more overall, besides common user name and password, still have the crucial news such as real full name and Id date.
Hair post person profess to have 1952690 news
The price is 12 bit money (about 500 thousand yuan of RMBs)
?
To this
When future accepts media to interview without care, express
Password of partial user account is bumped into library
But deny company data to be pulled library
Hacker term term explains
Bumping into a library is the user that the hacker already divulged through collecting Internet and password information, generate corresponding dictionary to express, attempt batch lands other website, get a series of act that can log onto Zhang number information.
Pulling a library is to point to originally derive from inside the database data, in hacker circle, pull a library to also be used to after showing the website inbreaks, hacker filch its database.
Do not have care test and verify according to future
The user information of these this leak
Great majority already was in of all kinds in the database that divulge
It is register before 2013
The user that did not login for years
And these users also did not establish a code again
Safe researcher analysis also is the hacker picked a few data from other place likely, camouflage is pulled into 51job library, take its data sale.
Nevertheless
In the informatization times that individual information divulges often
We should have protected our Zhang order security above all
Once you are divulged in the Zhang name code of some website, aggressor can bring into your information company project library, will get your password in other website or information through bumping into a library, carry out a series of attack such as fishing then, let you finally undergo worth other perhaps loss...
Accordingly
Net alarm Sichuan millet suggests everybody protects Zhang order security so
Meizhou net alarm
Safety reminds
Need to amend a code in time, password of best will all website undertakes updating. Prevent illegal element to pass " bump into a library " wait for a method, cause more large-scale profit loss.
Trade to involving fund, more individual is sensitive the Zhang date of information, do not use identical or similar code.
To the entry password of important website and Zhang date, ensure change regularly.
Use complex degree of taller password, the password of website of nowadays great majority stores is to use impose close kind, the password is complex rate is higher, the difficulty of the Cheng Mingwen that tear open solution is greater, although go out to reveal a problem now, password of proclaimed in writing also won't be learned easily.
To Internet behavior, use the 2nd capacity. If be faced with,must wanting to leave couplet is a phone, when the circumstance such as mailbox, can wait for means through using deputy card, new mailbox, with the individual true identity does segregation.
Arrange integratedly: Net of insurgent news, Pudong alarm