999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Hacker 2.0?

2019-05-21 14:59:42ByMaMiaomiao
Beijing Review 2019年18期

By Ma Miaomiao

Pinduoduo, a Chinese online group discounter, announced on January 20, that someone had exploited a loophole on its platform to steal tens of millions of yuan worth of discount vouchers during its New Years promotion. Though the company immediately rectifi ed the bug, it still resulted in a loss of 10 million yuan ($1.49 million), according to the companys risk control team.

Pinduoduo isnt the only high-profile company to have experienced such a breach. In October 2018, Ant Financial, an affi liate of Alibaba Group and the company behind Alipay, one of the leading mobile payment apps, reported that hackers filched money from accounts via stolen Apple IDs, with some losing up to $288. About a week later, Apple officially apologized for the hacking, saying in a statement that it found “a small number of our usersaccounts” had been accessed via a phishing scam. Apple, which has long touted that its operating system as virus-free, can no longer claim immunity.

New-generation viruses

The prevalence of these underground activities has turned econnoisseur, a term describing consumers who insist on the highest quality at the lowest price, into a negative word referring to hackers who carry out fraudulent practices online. Activities such as telecommunications fraud, phishing scams, Trojan viruses, cyber extortion and others may directly violate national laws or walk on the edge of the law.

A report released by JD Finance in May 2018 estimated that the underground fraud chain was operating with over 100 billion yuan ($14.8 billion)—twice that of the domestic cybersecurity industry in 2017—with more than 1.6 million econnoisseurs.

On January 18, Tencents Guardian Plan, an anti-fraud platform cooperating with Chinas law enforcement and fi nancial regulators to fight cybercrimes, said that in 2018, 145 major cybercrime cases were uncovered, with more than 3,200 arrests and 11 billion yuan ($1.64 billion) involved.

The underground chain has recently expanded into cyber extortion, attracting even more gold diggers. Hackers use distributed denial of service attacks to bombard websites with traffic. The targeted sites, including webcast platforms, online games, cloud services, education, healthcare and fi nancial enterprises, crash.The hackers then ask for money to get the websites back up and running.

Another cyberattack involves ransomware, which locks computers so that users cant access their files or programs, at which point hackers ask for payment to unlock the computers. At present, the most active ransomware in China are Cerber, Crysis and WannaCry and their variants. According to the 360 Threat Intelligence Center, it intercepted 183 types of ransomware and their variants in 2017, with more than 4.7 million computers attacked. Hackers target the wealthiest provinces, with Guangdong Province having the highest share at 14.9 percent, followed by Zhejiang at 8.2 percent and Jiangsu at 7.7 percent.

Pei Zhiyong, Director of the 360 Enterprise Security Research Institute, told Economic Information Daily that compared to selling personal information, hackers now use ransomware for cyber extortion since they can sometimes get nearly 100,000 yuan ($14,925) in payment from victims. Some ask for payment in the digital currency bitcoin to avoid being tracked or to camouflage money laundering. Pan Feng, who used to work for an Internet technology company in Beijing, bombarded the websites of three domestic exchanges in 2016, demanding more than 60 bitcoins which were then worth 200,000 yuan($30,000). He was also involved in money laundering with an accomplice. On August 17, 2016, Pan was detained by the police and was sentenced to three years in prison for extortion.

Two traditional extortion rackets based on telecommunications and pornographyrelated fraud are also dishing up new schemes. In May 2018, Anhui Province uncovered a case that used a robocalling app to conduct continuously malicious calls with the purpose of harassing users for ransom. The app generated 28 million calls before it was shut down by the police.

Pornographic content is usually closely linked with telecom and online fraud cases. According to a report released by the Guardian Plan, among the four most notable fraud cases in 2017, two were sexrelated. Sexual content primarily targets male online users. Data shows that over half of malicious Web addresses are porn sites, and approximately one third of smartphone viruses are infected via clicking on or browsing pornographic content online, which hackers use as bait for online scams to illegally acquire personal information, bank account details, social network usernames and passwords.

In recent years, people involved in the underground fraud chain are getting smarter and more savvy in their technological skills. Most of them target cloud services and mobile apps. The whole chain can be divided into the upper, middle and downstream sections. The upstream section develops basic technologies, such as verification codes and automation software, registering false and invalid accounts, and stealing other peoples accounts. The middle stream collects promotion information from various sellers, while the downstream section is where fake accounts and malicious Trojan horses are used for online fraud, theft and phishing for profi ts.

Coping in alliance

Traditional security products, such as firewalls, intrusion detection and antivirus software, are incapable of solving the problem, said Wu Haisang, Vice President of Product at Zshield Inc., pointing out that companies need to get rid of the old idea that once bugs are fixed, their cybersecurity is guaranteed. Instead, in the era of cloud-based services, a new automatic and intelligent security system should be established based on an identity and access database. At the same time, new technologies such as big data analysis, artificial intelligence and machine learning should be applied to foresee fraudulent practices, control the situation and immediately rectify the bugs.

“Large companies may land on their feet from these fraudulent practices, but many startups that are eager to increase their registered users through marketing activities, may end up in bankruptcy due to the losses caused by econnoisseurs,” Chen Zhuojian, a 360-ADLab security expert told China Securities Journal.

A lot of manpower and resources are needed to deal with these fraudulent prac- tices. Even if a threat is predicted, the lack of data prevents the company from forming an effective coping strategy. In addition, the anti-fraud ability of companies varies due to their different sizes and technological skills.

As a response, on March 22, the Shanghai Information Security Trade Association, in collaboration with LinkSure Network, Ping An Technology and SF Express, established a threat data sharing alliance consisting of companies across many industries, including the Internet, fi nance and technology industries.

Ni Guangnan, an academician with the Chinese Academy of Engineering, said the advancement of the 5G network and the growing mobile broadband require ever better security protection, thus an alliance is very much needed to fi ght against cyberattacks.

“The alliance is an attempt to create a new security solution for the industry,”said Gong Wei, Chief Security Officer of LinkSure Network, adding that it seeks to bring together companies from various industries in Shanghai to solve some online security problems.

The alliance will focus on sharing knowledge and information on cyberthreats and accumulate the best solutions to deal with these threats.

“Many business groups now have their own subsidiaries, forming relatively independent and closed security ecosystems,”Gong said. The security industry should be more open and more communicative in its exploration of new security applications and innovation.

Many other companies such as Suning. com, Vipshop, Zhongtong Express and Lufax, the Internet fi nancial arm of Ping An Insurance (Group) Co., have also joined the alliance.

In the future, the alliance will invite more companies to share cyberthreat intelligence, technology, knowledge and experience. Through online and offline communication and cooperation, it hopes to achieve complementary advantages and resource sharing in the information security fi eld.

主站蜘蛛池模板: 亚洲免费毛片| 亚洲欧美成aⅴ人在线观看| 亚洲婷婷丁香| 欧美日韩精品一区二区在线线| 伊人丁香五月天久久综合| 亚洲欧美日韩动漫| 亚洲精品无码抽插日韩| 日韩在线网址| av在线无码浏览| 97影院午夜在线观看视频| 国产国模一区二区三区四区| 国产一级做美女做受视频| 国产成人高精品免费视频| 亚洲视频免费在线看| 国产一区二区视频在线| 亚洲精品综合一二三区在线| 亚洲国产精品美女| 青草国产在线视频| 5555国产在线观看| 亚洲天堂首页| 香蕉eeww99国产在线观看| 中文国产成人精品久久一| 久久精品66| 免费国产在线精品一区| 亚洲最新地址| 91精品人妻互换| 人妻精品久久无码区| 欧美特级AAAAAA视频免费观看| 午夜福利在线观看成人| 精品福利网| 欧美激情首页| 亚洲精品免费网站| 亚洲天堂成人在线观看| 国产精品永久不卡免费视频| 亚洲天堂.com| 永久免费精品视频| 青青青伊人色综合久久| 波多野结衣无码视频在线观看| 精品国产免费第一区二区三区日韩| 黄色免费在线网址| 国产一区二区三区免费观看| 久久久久人妻一区精品色奶水| 黄色网址手机国内免费在线观看| 久久黄色一级视频| 成年看免费观看视频拍拍| 国产成人精品男人的天堂下载| 国产精品久线在线观看| 麻豆精品视频在线原创| 欧美日韩免费观看| 又污又黄又无遮挡网站| 日本亚洲欧美在线| 美女高潮全身流白浆福利区| 久久国产精品麻豆系列| 99热国产这里只有精品无卡顿"| 精品久久综合1区2区3区激情| 国产无遮挡猛进猛出免费软件| 青青青视频免费一区二区| 国产剧情国内精品原创| 亚洲AV成人一区国产精品| 日本爱爱精品一区二区| 国产91丝袜在线播放动漫 | 亚洲最新网址| 亚洲人成电影在线播放| 欧美五月婷婷| 日韩亚洲综合在线| 亚洲一级毛片在线观| 国产肉感大码AV无码| 色婷婷综合在线| 国产高颜值露脸在线观看| 精品少妇人妻av无码久久| 欧美一级在线播放| 福利视频久久| 久操线在视频在线观看| 2022国产91精品久久久久久| 亚洲欧美在线综合图区| 国产剧情无码视频在线观看| 高h视频在线| 成人午夜天| 国产精品人人做人人爽人人添| 国产一区二区三区免费| 91午夜福利在线观看| 亚洲一本大道在线|