Uncategorized

Mobile Office—SIM and SD Card Security

January 31, 2019 | Adeline Zhang

Case AnalysisCase Analysis If you do not report the loss of the SIM card after your phone is lost, a hacker may use it to obtain SMS verification codes. Activation of the quick pay service requires only the ID card number, bank card number, and SMS verification code.

Genius? Lunatic? Maybe Both (II)

January 28, 2019 | Adeline Zhang

The ubiquity of the Internet is attracting more and more youths to the computer industry, especially the hacker community that holds a supreme position in the realm of cyber security. Every person eager to be part of the IT industry seems to be able to get something from it, ranging from appearing cool to making […]

Mobile Office — Two-Step Verification

January 25, 2019 | Adeline Zhang

Case Analysis It is a common practice to protect an account with a password. However, the account will be compromised if the password is disclosed. Now many mobile phones or apps support two-step verification. When detecting a login to your account from another phone, the mechanism requires the other form of authentication, for example, a […]

2019 Predictions: Email Attachments, IoT, and Cryptominers to be Security Pain Points

January 23, 2019 | Adeline Zhang

  Data breaches in 2018 compromised personal information of millions of people around the world, most notably from large corporations such as Facebook, Marriott, T-Mobile and Quora. Seemingly every week there is a new breach reported, and consumers have taken notice. In the past year, the average number of overall daily searches for keywords such […]

Mobile Office——SMS phishing

January 18, 2019 | Adeline Zhang

Case Analysis This story starts from an SMS message and ends with financial loss, sounding just like an ordinary telecom fraud. But it is distinctive in that a malicious link and a web page that contains a trojan are leveraged, indicating that the attacker is quite tech-savvy. After the mobile phone is infected with the […]

NSFOCUS Detects Two Satan Variants Targeting Financial Sector

January 17, 2019 | Adeline Zhang

  In early November of 2018, NSFOCUS spotted the first variant of Satan malware that targets Linux and Windows systems and spreads by exploiting various application vulnerabilities. A few weeks later, NSFOCUS came across a second variant of this Satan, capable of self-propagation via Windows and Linux platforms. These two variant detections are just another […]

NSFOCUS Forms Strategic Partnerships in LATAM and Around the World

January 14, 2019 | WPAdmin

  By: Andre Tristao e Mello, Vice President, Latin America & Caribbean, NSFOCUS At NSFOCUS, we are always looking for ways to better serve and work with our customers — from innovative product updates to partnerships; we’re dedicated to helping and protecting our customers. Across the LATAM region, we focused many of our efforts into […]

NSFOCUS’s Presence at Botconf 2018

December 17, 2018 | Adeline Zhang

On December 7, 2018 security experts from NSFOCUS Fu Ying Labs delivered a speech at Botconf 2018, presenting WASM security threat analysis technologies with researchers from security firms, media personnel, and security practitioners from CERTs (Computer Emergency Response Teams) of various countries. Their striking insights were highly accepted and acknowledged by the international security industry. […]

ThinkPHP Remote Code Execution Vulnerability Handling Guide

December 17, 2018 | Adeline Zhang

1 Vulnerability Overview Recently, ThinkPHP posted a blog, announcing the release of an update that addresses a high-risk remote code execution (RCE) vulnerability. This vulnerability stems from the framework’s insufficient checks on controller names, which, in case forced routing is not enabled, would allow arbitrary code execution or even access to the server. ThinkPHP is […]

Personal Computer——File Deletion

December 14, 2018 | Adeline Zhang

Case AnalysisCase Analysis When you delete files from a computer or USB flash drive, just clicking the deletion button or doing a quick formatting does not completely remove files because you can easily recover them using data recovery software. Even after you clear the recycle bin, those deleted files can still be retrieved.