E installs weekly of E of online information safety, collect is newest and safe dynamic (information safety incident, safe flaw is released reach early-warning) , make an appointment every week one, disappear not to come loose!
Governmental move
Australia establishs network information to monitor a branch to be in charge of hitting of all kinds network to commit a crime
The intermediary outside occupying reports, for blow terroristic, wash money and network finance bilk, australian government established information of a network to monitor a section a few days ago, it is reported, this branch will make Australian state security " protection is magical " . This " protection is magical " also be Australia hold the post of premier spy favour newly Boer one of acceptance when entering into an election contest, he alleges at that time the transition that drives the network security that enhances Australia domestic economy through science and technology.
Australian attorney general base accept expresses, this branch belongs to be subordinate to Australia to trade the report analyses a center (AUSTRAC) , future will be responsible investigation is online the network finance that pay platform and attacks all sorts of types commits a crime.
American army leading compose builds a network to train an environment continuously
Continue to compose builds network unit and change system of professional network army group as the U.S. Army, network of senior official appeal trains an environment continuously (Persistent Training Environment, abbreviate PTE) . Although American network headquarters can run extensive practice every year, for instance " network bodyguard " and " the network seizes a banner " project, but still far insufficient.
The chief commander Ron Pontius of headquarters of American army network came 4 days to express on the TechNet Augusta that Georgia holds on August 2, american department of defense lets army lead combination to serve compose to build PTE. Pontius expresses, "Network PTE provides the network task force that is us setting incident management, high quality individual and collective training and task to push perform changeover ability, provide American network headquarters and the space that 4 great services need. " effectively promotion has training to still can help network soldier be familiar with setting
Network safety incident
Key of masses remote control puts hole 100 million car can be solved to lock up
According to foreign media coverage, the remote control key of masses car is put in two large hole, among them, the value of secret key key of masses brand did not change 20 years, other trademark uses the password system of 90 time as before, the hacker can use technical measure to inbreak easily the system of remote control door lock of car, this one problem may affect the whole world nearly 100 million cars.
The researcher of British Birmingham university and Kasper &Oswald of German engineering company plans Yu Benzhou to announce two of system of door lock of masses remote control apparent leak, among them a flaw can make bandits uses wireless means to open all cars that the masses produced in 20 years in the past, include Ao Di and Si Ke to amount to. The car amount that the 2nd flaw affects is more, except alpha still is affected beyond the masses - Romeo, Xue Tielong, Feiyate, Ford, 3 water chestnut, day is produced, Ou Bao and beautiful wait for a brand.
Control of hacker of Russia of credit card danger exceeds 330 thousand to brush calorie of machine
Group of passenger of Russia be astonished invades the interconnected system of computer science department that uses processing credit card to pay, the credit card data of purloin enterprise and client. More than 330000 cafeteria, gambling house, bar and cafe got inbreak.
Iformation flow of 6000 individual of more than bank give source is bank interior unexpectedly
Recently, classics detect total fleet detects Shanghai public security bureau to sell together, offer proposal of citizen individual information illegally. More than 6000 " accurate " individual loan iformation flow goes out, after many the sale that increase price. And the fountainhead of information comes from bank interior actually.
Came in July 2015 in August, guilty suspect Hu Mou finds the Li Mou in some bank hold office and Wang Mou, use 2 people post, through the individual of this bank loan inquires a system, inquire more than 6000 illegally to other bank collects letter information, and with every treaty 30 yuan price signs these banks letter information to sell Chen Mou; Chen Mou again with every price that differs 45 yuan to 50 yuan, resell gives the person such as Qi Mou; Qi Mou exceeds information 50 yuan price resell to wait for a person to Chen Mou, Liu Mou with every again.
In fact, getting citizen information illegally is the first pace only. these information " deep treatment " later, guilty suspect can use these information to carry out all sorts of crime, for instance: Channel pays move on the net, pretend to be, bogus card pilfer is brushed, a variety of crime forms such as information of individual of illegal filch sale.
Flaw of join of Linux equipment TCP exposing to the sun: Receive a net to be able to be atttacked only
Come from California university school of river bank cent, and the researcher of lab of American army research, published a paper jointly recently, the problem is " Off-Path TCP Exploits: Global Rate Limite Considered Dangerous " . The TCP that this article mentions Linux server joins executive plan exists to high high safe flaw, aggressor can use this flaw to hijack did not increase close Web flow, the Jiamitong that if Tor joins,perhaps destroys a kind dispatch; CVE-2016-5696 of this flaw number.
Textual link: Http://sec.chinabyte.com/485/13859985.shtml
"Anonym " turn over orgnaization of a shot in the arm and international sports arbitration tribunal to initiate a network to atttack to the world
The intermediary outside occupying reports, international hacker was organized recently " anonym " (Anonymous) polish branch turns over orgnaization of a shot in the arm to the world (WADA) and international sports arbitration tribunal (CAS) launched network attack. "Anonym " atttacked international sports arbitration tribunal already successfully (CAS) website server, divulged relevant data and the video that release its member to atttack CAS server process.
"Anonym " have not announce the world to turn over orgnaization of a shot in the arm at present (the data of WADA) . Nevertheless Maggie Durand of WADA female spokesman expressed to associated press reporter yesterday, WADA ever encountered the hacker makes a surprise attack. Do not cross a hacker not breach WADA is put a shot in the arm detects the database of the result.
Data statistic
Data existence whole world which country is the safest?
Be based on forum of economy of U.N. , world and international transparent organization (TI) the data that collects with other orgnaization, artmotion of safe data center points out in newest report Asian area is in existence of data security aspect is short board. In this portion name is " data danger area " report (in PDF) , to the whole world more than 170 countries and area logarithm occupy degree of safety to undertake deciding integratedly.
Switzerland is in in platoon of data security aspect the first place, data divulges a risk to be only 1.6% .
The data of Singapore divulges a risk to be only 1.9% , can be considered as the country with Asian the safest data.
Hong Kong, Taiwan and Korea before the sheet that list a list of names posted up 15, nevertheless China and India are in the position by mat in sheet of a list of names posted up.
India is most miserable intense, 107 are in sheet of a list of names posted up.
Gartner: Expenses of global information safety will rise 7.9% to come 2016 81.6 billion dollar
What the basis comes from Gartner is newest forecast, the expenditure of product of global information safety and service will reach 81.6 billion dollar 2016, grow 7.9% than 2015. Seek advice and be being wrapped outside IT is current the fractionize market with information safety the biggest spending. Predict by 2020, the bag outside safe test, IT and data are missing defend (DLP) market amplitude is the biggest.
Gartner is newest in forecasting other of safe to information market forecast include:
The average sale price of firewall predicts 2% grow at least before the bottom 2018 or 3% .
To the end of 2018, the enterprise orgnaization that has 90% the compositive DLP at least one kind of form, 50% prep above is current.
To the end of 2019 before, the uses pair of firewall expenditure influence of communal cloud is insufficient 10% , but there can be clear impact after this.
To 2019, those who have half the number is large and medium-sized the company will raise to the middle of their network firewall more large-scale, more advanced it is oriented function in order to detect.
The talent fosters network safety
Undergraduate of 700 more than college is challenged " network space is safe "
On August 13, the information of contest of safety of information of undergraduate of the 9th whole nation is safe 2016 contest of work contest and innovation practice ability is undertaking getting like a raging fire. This contest, the whole nation shares 260 colleges 951 teams, 5000 more than person signs up take part in the match, many 700 student of 641 teams that have 182 colleges is entered surpass first. Among them 162 teams that work contest has 58 schools enter finals; Innovation carries out ability contest to the 16 battle group of 16 schools enters finals.
This second activity is had " contest of innovation practice ability is paid attention to " attack " with " prevent " " , " work surpasses information safety " open mode is own and propositional " two large window.
Flaw fast give
Flaw list