Case AnalysisCase Analysis If files are stored in the hard disk, they may be read by others stealing the computer. If files are put in an encrypted disk, others obtaining this disk must type the encryption password before viewing the files. This effectively prevents disclosure of important files. Security Tips/Takeaways...
Categoria: Blog
Sample Analysis Report-3
1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family. (mais…)
Wi-Fi Security——Automatic Connection to Wi-Fi
Case AnalysisCase Analysis When finding a bogus Wi-Fi hotspot with the same name as a legitimate one, smartphones also try to connect to it with the stored password. This gives hackers access to legitimate Wi-Fi networks. Security Tips/Takeaways Disable WLAN on smartphones and laptops when Wi-Fi is not used, in...
Adobe Flash Player Remote Code Execution Vulnerability Threat Alert
Overview On November 20, 2018, local time, Adobe released a security advisory for documenting the remediation of a critical vulnerability in Adobe Flash Player. Successful exploitation of this vulnerability could allow attackers to remotely execute arbitrary code. (mais…)
Sample Analysis Report
1 Sample Introduction 1.1 Sample Type This sample is a trojan, similar to Satori which is a Mirai variant. (mais…)
Technical Report on Container Security (II)-3
Container Basics — Container Networking Container Networking From the evolutionary history of cloud computing systems, the industry has reached a consensus that, while constant breakthroughs have been made to drive the maturation of computing virtualization and storage virtualization, network virtualization has lagged behind, becoming a major bottleneck that encumbers the...



