据德国媒体Welt am Sonntag 报道，德国将网络攻击的警戒级别提升至“高度准备”状态。德国表示，政府网站每天都在遭受网络攻击。
E安全3月20日讯 据德国媒体Welt am Sonntag 报道，德国将网络攻击的警戒级别提升至“高度准备”状态。德国表示，政府网站每天都在遭受网络攻击。德国联邦信息安全办公室（BSI）负责人Arne Schoenbohm表示，德国的政府网络每天都在遭受网络攻击。该媒体未详细说明警戒级别的数量和类型，但表示，自网络攻击干扰美国总统大选以前，德国就调高了网络攻击的警戒级别。BSI未立即予以置评，因为，德国本周一在举办最大的年度科技盛会CeBIT。德国联邦宪法保卫局（BfV）局长马森（Hans-Georg Maassen）二月底警告称，随着工业发展不断采用数字技术，工业化国家越来越容易遭受网络攻击。
据《财富》杂志北京时间3月20日报道，维基解密本周接触了包括苹果和谷歌在内的多家知名科技公司，要求他们必须先答应一系列条件，然后才能收到有关中情局掌握的“零日漏洞”和其他监控手段的外泄信息。大概一周前，维基解密创始人朱利安·阿桑奇（Julian Assange）曾表示，他将协助科技公司修复中情局外泄文件中提到的安全漏洞。维基解密周五晚些时候发表了一份声明，称包括火狐浏览器厂商Mozilla在内的一些机构已经决定采取行动。中情局文件中曝光的安全漏洞可能是经由情报机构承包商传递到维基解密手中的，其中包括用于渗透安卓智能手机、iPhone、桌面操作系统、路由器和网络浏览器的方法。“零日漏洞”（Zero day）是指黑客部署的恶意软件和其他攻击手段，企业会以更新或补丁的形式来修复这一漏洞。涉及的企业包括微软、思科、中兴、华为等。
cnBeta.COM3月18日消息，援引ABC News报道，美国特勤局旗下的一台加密笔记本近日在该机构的车辆内失窃，可能让窃贼访问存储在机构服务器上的保密信息。根据曾和这名窃贼交谈过的消息源透露，尽管特勤局在该笔记本上设置了多层安全防护，笔记本中包含特朗普大厦（Trump Tower）的平面图，以及“国家安全机密”依然有可能会泄漏。这台特勤局的笔记本尽管进行了加密和其他安全防护功能，但是并未授权某些分类信息。如果窃贼能够破坏笔记本上的安全功能，就有可能访问特勤局服务器上的某些敏感信息。ABC News表示，一名执法人员表示笔记本电脑中包含朗普大厦的平面图。特勤局发布了一份声明，承认存在笔记本失窃的情况，并已经对窃贼进行了调查，如果有必要，特勤局表示将会远程清除笔记本上的数据。
According to the German media Welt am Sonntag reported that Germany will raise the level of alert network attacks to highly prepared state. Germany said that the government website suffered cyber attacks every day.
Anhui province to strengthen the supervision of online commodity trading
China Network Information Office on March 20th news, Anhui province will strengthen the rectification and regulation of the network market order this year, around consumers, operators and media reflect key commodities strong and outstanding issues, to carry out the deployment of network supervision of special operations, focusing on the fight against infringement and counterfeiting, false propaganda, brush single fried letter online commodity trading behavior. Anhui province Industrial and Commercial Bureau said that industrial and commercial system will further improve the network coordination mechanism of market supervision, to promote the integration of online and offline regulation, smooth and communication management department illegal website positioning, investigation and close cooperation mechanism, and public security departments of criminal justice connecting mechanism, and explore the Alibaba governance path of cooperation platform, make full use of technology the advantage of a large platform, effectively carry out the network crackdown.
The Xinjiang Uygur Autonomous Region launched the online transaction consumer rights special rectification activities
In March 16th, the the Xinjiang Uygur Autonomous Region Administration for Industry and Commerce in the autonomous region Autonomous Region Department of Commerce, product quality supervision and Inspection Institute and enterprises, jointly organized by the network trade consumer activism, this also means that the consumer online trading rights the Xinjiang Uygur Autonomous Region special rectification activities start. According to statistics, in 2016, the first three quarters of Xinjiang local consumers through e-commerce platform to achieve online retail sales of $29 billion, an increase of 36.8% over the same period last year. Xinjiang online shopping consumption has accounted for 14.6% of total retail sales of social consumer goods. In order to give the people of all ethnic groups to build a safe and carefree network consumption environment, autonomous region product quality supervision and Inspection Institute established e-commerce online testing center, focus on supervision, service providers and online shopping, the healthy development of it. Earlier this year, the trade and Industry Bureau of the autonomous region set up a network of trade supervision and management department, and other market regulatory division of labor and cooperation, and jointly promote the integration of online and offline market regulation.
Network security pilot demonstration experience exchange cum Exhibition held in Nanning
1617 on March 2017, to implement the spirit of general secretary Xi Jinping’s important speech series, guide the telecommunications and Internet industries to strengthen the construction of network security technology, the application of innovative projects, the Ministry of industry and Information Network Security Management Bureau commissioned Chinese information communication network security research institute held a pilot experience exchange and achievement exhibition in Nanning. Conference believes that the current network security network attack showed a upward trend, data and user information security risks outstanding, integration and development bring new threats, network security offensive and asymmetric situation highlights four characteristics of network security risks to penetrate into the field of politics, economy, culture, society, national defense, rising to a new stage needs, in-depth analysis, system response. The meeting pointed out that the strong support in the industry, through enterprise reporting, expert review and public notice, in recent years the selection of 82 enterprise network security technology pilot demonstration projects, pilot work has achieved remarkable results, pilot demonstration projects to achieve combat application, some form of experience can be replicated, effectively pulling the network the development of the security industry.
Germany to raise the level of network attack alert to high readiness
E security March 20th hearing, according to the German media Welt am Sonntag reported that Germany will raise the level of alert network attacks to highly prepared state. Germany said that the government website suffered cyber attacks every day. Arne, head of the German Federal Office of information security (BSI) Schoenbohm, said the German government network suffered cyber attacks every day. The media did not elaborate on the number and type of alert level, but said that since the network attacks interfere with the U.S. presidential election, Germany raised the alert level of cyber attacks. BSI did not immediately comment, because Germany is hosting the largest annual science and technology event on Monday CeBIT. The German Federal Constitutional Protection Agency (BfV) director of Marston (Hans-Georg Maassen) at the end of February warned that, along with the development of the industry constantly using digital technology, more and more industrialized countries vulnerable to cyber attack.
WikiLeaks: technology companies access to information security vulnerabilities must be agreed to a few conditions
According to the fortune magazine Beijing time March 20th reported that WikiLeaks this week in contact with a number of well-known technology companies including apple and Google, they must first agree to a series of conditions, and then received the CIA master Zero Day vulnerabilities and other means of monitoring the leakage of information. About a week ago, Wikileaks founder Julian Assange (Julian Assange) has said that he will assist the company to fix the security vulnerabilities mentioned in the CIA leaked files. WikiLeaks issued a statement late Friday, saying that some agencies, including Firefox browser Mozilla, have decided to take action. Security vulnerabilities exposed in CIA documents may be delivered to the Contractor by the intelligence agencies in the hands of WikiLeaks, including Android, intelligent mobile phone penetration method for iPhone and desktop operating system, router and network browser. Zero Day vulnerability (Zero day) refers to the malicious software deployed by hackers and other means of attack, the enterprise will update or patch to repair the vulnerability of the form. Companies involved include Microsoft, CISCO, ZTE, HUAWEI, etc..
360 refute the financial business financing and listing plan does not match the actual situation
Sina science and technology news on March 20th morning news, for the recent media said 360 financial is expected to be listed on the A shares in 2021, is currently conducting small-scale financing of the message, in the morning of this year, the 360 were refuted. The 360 aspect, said the outside of the financing of 100 million yuan, B round of financing, gambling terms and so on are related to external financing speculation, and the actual situation does not match. Public data shows, 360 is a comprehensive Internet financial Qihoo 360’s financial services group, a collection of three financial sector financing, loans, insurance, set up six business lines, which already has your wealth, private home 360 gold, 360 silver, stocks and other brands. However, 360 of the financial sector has been split out from the group, currently operating independently. Earlier, on 2016, there was news that, due to business needs, 360 security payments are being discussed in the acquisition of the third party payment license company (). Denied by 360. 360 Financial Group Executive Vice President He Zhiqiang told the media that in 2016 the net transfer of the acquisition of the financial license to pay the issue of false news of the 360, is still the butt of the interface between the third party payment.
U.S. secret service notebook stolen Trumpt tower plan and confidential information
CnBeta.COM3 Sept. 18, according to ABC News reported that a U.S. secret service’s encrypted laptop recently in the body of the vehicle is stolen, may let the thieves access confidential information in the storage mechanism on the server. According to the name of the thief and had talked to the news source said, although the secret service in the notebook is a multilayered security protection, notebook contains (Trump Tower) of the Trumpt tower plan, as well as national security is still likely to leak. The secret service’s notebook has been encrypted and other security features, but did not authorize certain classified information. If thieves can break the security function of the notebook, it is possible to access some sensitive information on the secret service server. ABC News, a law enforcement officer said the plan includes building a notebook computer lamp. The secret service has issued a statement acknowledging the existence of a laptop theft and has investigated the thief, and if necessary, the secret service said it would remotely clear the data on the laptop.
Hackers invaded the UK’s largest travel association ABTA website 43000 personal data was leaked
Security passengers March 20th news, hackers exploit the vulnerability of the ABTA web server, access to up to 43000 people’s personal data. Currently, the site has notified the user to begin to change the password.
U.S. police 100GB sensitive files have been compromised by extortion software attacks
E security news March 20th Missouri Warren County Police Bureau suffered massive data breaches, sensitive files of 100GB were exposed to public relations network, including thousands of records relating to arrest, crime scene and event report. According to reports, the police station in mid 2016 suffered extortion software attacks.
WeChat sweep attention to the public number
- VDGU FASTFREDDIESBAR