1. Do not write Blackboard Dao: I want to make a great product that can represent me
Baidu's search for bid rankings may not be the largest industry nourished by Putian Hospital, but a lot of three areas, such as certain niche industries. Whose keywords are ranked first, and his competitors are likely to hire DDoS to beat it. This business constitutes a huge amount of traffic.
Daoge put his feet on the coffee table, for the Lei Feng network (search "Lei Feng network" public number concerns) the sinister Coptic lake.
This senior hacker has many identities: "The Red Book of the Arts" written by "Daoge's Blackboard News"; the head of Ali Yunyun Dun. In his heart, the first identity was as light as a feather, and the second as heavy as Mount Tai.
Protecting Alibaba Cloud, a 35% of China’s Web sites, is located on the cloud computing platform and the residents above it. Daoge feels that he is responsible for everything and is not to blame. Digging black production, depicting his own operational map is part of his requirement for his duties.
He told a Lei Feng network a secret: "Want to know what industries in China's black production, just look at the prohibition of Taobao sales limit is enough." DDoS attacks, extortion, dark network black market, these black industries, often will eventually involve To attack the server on Alibaba Cloud.
From his perspective, this world is full of bloody winds.
2. Hacker Yuan Ge: A few stories about me
If you see Yuan Ge, you will almost doubt the above judgment. It's hard to connect the good, even dumb, uncle, with the "Spirit of the Cyberspace" that used to be able to access all personal computers and servers at will.
But please believe me, once you walk into his spiritual world, you will see the stormy waves.
Compared to text and language, Yuan is more accustomed to lyrical with numbers and code. A silent person constantly asks the world for answers, repeatedly overthrowing people's basic understanding of cyberspace.
When Yuan is still Xiaoyuan, when he was in elementary school, he had been holding books of mathematical theory every day, standing in the whizzing time.
I was born in rural areas and my home conditions were not good, so I could only read my favorite books at the elementary school library or the Xinhua Bookstore in the town. Fortunately, the books on mathematics that I care about are not very good sales. You can buy one copy for a dime or two cents. But even so, I can hardly afford it, only picking the one I like the most, the thickest, and the cheapest.
At the time of middle school, Yuan Ge started to look at the content of postgraduate group theory, Boolean Algebra, Symmetric Identity.
As revealed in the Pirates of the Dream, Yuan Bo's deep insights into the logic of numbers and the world, Limbo, who is at the deepest level in cyberspace, gave him insight into the truth in a space of only a few bytes of space.
3. How can we prevent "hit the library" attack if the data leakage of barley network causes users to be cheated?
In recent days, Black Production has used a crash attack to steal personal information from users of barley. And using the stolen information, disguised as a barley network customer service successfully defrauded 1.474 million yuan. According to reports, 39 users across the country have been deceived and the maximum amount of cheating for a single person amounts to 100,000 yuan. After the incident, the barley network quickly responded to the cause of the incident. In a follow-up statement, he stated that in order to alleviate the economic pressure caused by the incident as soon as possible, the board of Directors of Damai Mesh decided to implement measures to “take consumer losses first†for all users causing actual economic losses. funds.
"Hit the library" is a common hacking method in the Internet. The Zuckerberg social account that took place last month was the result of the black incident and the "Jingdong false customer service" incident.
The so-called hit library refers to the user and password information that has been leaked by the hackers through the mobile phone network. The hackers gather to become a “social worker libraryâ€. The target website user login page continuously tries to log in. Once the match is successful, the user information is successfully stolen.
For users who are accustomed to using the same password in different accounts, their personal data can be easily obtained by hackers.
Security experts once told Lei Fengwang that acquiring data from a website database does not necessarily require very advanced technologies and costs. A person with basic hacking techniques plus a powerful and efficient hacking tool can achieve " Hit the library" attack. Therefore, preventing a crash attack is a protracted battle that companies and users must face.
4. Wuyun White Hat Community is inaccessible, official overnight response
On the evening of July 19, 2016, the well-known microblogging blogger, "The Internet's Things," issued a message at 11pm, claiming that the dark cloud of the famous white hat community in the country "has gone wrong." Lei Feng network editor immediately visits Wuyun official website to find the page temporarily unable to open, the information shows: Is upgrading.
On the other hand, in the dark cloud, as the night approached 12 o'clock, official officials issued a statement informing them that the cloud and related services are upgrading.
In spite of this, less than a month before this, a white hat submitted a loophole to Jiayuan, a dating website, and was arrested by relevant departments. This incident has not completely faded in today.
At the same time, the White Hat Community Vulnerability Box, which is close to the positioning of the cloud, issued a statement saying: Suspend the acceptance of Internet vulnerability and threat intelligence, and sort out the process systems and regulations in the Internet vulnerability and threat intelligence project.
5. There are serious loopholes in Apple's system and hundreds of millions of devices are facing security problems
According to CNET, Tyler Bohan, a researcher of Cisco's network security department, recently discovered that in addition to the latest versions of iOS 9.3.3 and El Capitan 10.11.6 systems, all previous versions of Apple devices have the same seriousness. Security vulnerabilities, as long as hackers send an iMessage message with a virus, they have the opportunity to invade the user's device.
Boan mentioned that hackers develop TIF (like JPG image format) files containing malicious code and send them to the target via iMessage, an Apple instant messenger application. Since iMessage can automatically render images in its default settings, this gives hackers a opportunity. When a user receives a file with malicious code, the code can start running on the device, access the device's memory, and obtain a stored password. It can also e-mail or instruct users to use Safari to access websites that contain virus images.
According to official Apple data, only iOS 8 and earlier operating systems have 97 million devices, plus some iOS 9 devices and Macs, so at least hundreds of millions of Apple devices may be hacked at any time. attack. According to external sources, Apple’s security issue is similar to that of Android's Stagefright vulnerabilities last year. The latter also infects devices by sending pictures, exposing 950 million Android devices to danger.