Não Categorizado

Personal Computer——Password Grading

dezembro 7, 2018 | Adeline Zhang

Case AnalysisCase Analysis Many people use the same user names and passwords to access different websites. This makes it possible for hackers to use the password for access to a website that has been hacked to log in to other websites. Each password for each website seems unlikely. To solve this issue, you can follow […]

Satan Variant Analysis & Handling Guide

dezembro 6, 2018 | Adeline Zhang

1 Background In early November 2018, NSFOCUS discovered that some of its financial customers had been infected with a worm virus FT.exe that could affect both Linux and Windows platforms. Like the ransomware Satan, the virus spreads itself by exploiting multiple application vulnerabilities. However, this virus, after breaking into the system, does not do anything […]

Technical Report on Container Security (III)-1

dezembro 5, 2018 | Adeline Zhang

Security Risks and Challenges — Vulnerability and Security Risk Analysis Vulnerability and Security Risk Analysis As a specific implementation of the container technology, Docker is getting more and more popular in recent years. To some extent, Docker has become a typical representation of the container technology. Docker is based on the common client/server (C/S) architecture […]

Personal Computer——Encrypted File Storage

dezembro 4, 2018 | Adeline Zhang

Case AnalysisCase Analysis If files are stored in the hard disk, they may be read by others stealing the computer. If files are put in an encrypted disk, others obtaining this disk must type the encryption password before viewing the files. This effectively prevents disclosure of important files. Security Tips/Takeaways Store sensitive files in an […]

Sample Analysis Report-3

novembro 26, 2018 | Adeline Zhang

1 Sample Introduction 1.1 Sample Type The sample is a Trojan, which belongs to the Tsunami family.

Wi-Fi Security——Automatic Connection to Wi-Fi

novembro 24, 2018 | Adeline Zhang

Case AnalysisCase Analysis When finding a bogus Wi-Fi hotspot with the same name as a legitimate one, smartphones also try to connect to it with the stored password. This gives hackers access to legitimate Wi-Fi networks. Security Tips/Takeaways Disable WLAN on smartphones and laptops when Wi-Fi is not used, in case the devices automatically connect […]

Adobe Flash Player Remote Code Execution Vulnerability Threat Alert

novembro 23, 2018 | Adeline Zhang

Overview On November 20, 2018, local time, Adobe released a security advisory for documenting the remediation of a critical vulnerability in Adobe Flash Player. Successful exploitation of this vulnerability could allow attackers to remotely execute arbitrary code.

Sample Analysis Report

novembro 22, 2018 | Adeline Zhang

1 Sample Introduction 1.1 Sample Type This sample is a trojan, similar to Satori which is a Mirai variant.

Technical Report on Container Security (II)-3

novembro 22, 2018 | Adeline Zhang

Container Basics — Container Networking Container Networking From the evolutionary history of cloud computing systems, the industry has reached a consensus that, while constant breakthroughs have been made to drive the maturation of computing virtualization and storage virtualization, network virtualization has lagged behind, becoming a major bottleneck that encumbers the fast growth of cloud computing. […]

Microsoft Released September 2018 Patches to Fix 64 Security VulnerabilitiesThreat Alert

novembro 19, 2018 | Adeline Zhang

Overview   On Tuesday, Microsoft released September 2018 security updates to fix 64 vulnerabilities, ranging from spoofing attacks to remote code execution vulnerabilities. Affected products include .NET Core, Active Directory, Adobe Flash Player, Azure, BitLocker, Internet Explorer, Microsoft Drivers, Microsoft Dynamics, Microsoft Edge, Microsoft Exchange Server, Microsoft Graphics Component, Microsoft JScript, Microsoft Office, Microsoft Office SharePoint, […]