1 Background In early November 2018, NSFOCUS discovered that some of its financial customers had been infected with a worm virus FT.exe that could affect both Linux and Windows platforms. Like the ransomware Satan, the virus spreads itself by exploiting multiple application vulnerabilities. However, this virus, after breaking into the...
Ano: 2018
Technical Report on Container Security (III)-1
Security Risks and Challenges — Vulnerability and Security Risk Analysis Vulnerability and Security Risk Analysis As a specific implementation of the container technology, Docker is getting more and more popular in recent years. To some extent, Docker has become a typical representation of the container technology. Docker is based on...
60 Cybersecurity Predictions For 2019
Forbes - I’ve always been a loner, avoiding crowds as much as possible, but last Friday I found myself in the company of 500 million people. The breach of the personal accounts of Marriott and Starwood customers forced us to join the 34% of U.S. consumers who experienced a compromise...
Cyber Defense eMagazine 2018 – Recidivist Hackers
Cyber Defense Magazine - Recidivist is an interesting word. It means “a convicted criminal who reoffends, especially repeatedly.” The word had common usage in the last century although it started to fall into disuse the last 30 years or so. There isn’t another word that aptly describes the behavior identified...
Personal Computer——Encrypted File Storage
Case AnalysisCase Analysis If files are stored in the hard disk, they may be read by others stealing the computer. If files are put in an encrypted disk, others obtaining this disk must type the encryption password before viewing the files. This effectively prevents disclosure of important files. Security Tips/Takeaways...
Sample Analysis Report-3
1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. (mais…)




