Workflow
网络安全
icon
Search documents
从杭州刑警到阿里资深合伙人,邵晓锋如何成为马云最信任的“左膀右臂”?
Sou Hu Cai Jing· 2025-12-09 02:11
Core Insights - Jack Ma, despite retiring, remains a significant figure in the Chinese e-commerce landscape, with his actions closely monitored by the public [2] - Shao Xiaofeng, a long-time partner of Ma, has played a crucial role in Alibaba's development, transitioning from a police career to a key executive position [2][3] Background of Shao Xiaofeng - Shao Xiaofeng and Jack Ma met in 1984 while preparing for college entrance exams, forming a lasting friendship [3] - Shao had a successful career in law enforcement, earning multiple commendations, including one first-class merit and three third-class merits [4][12] Transition to Alibaba - In 2005, Shao Xiaofeng joined Alibaba as the head of the network security department, recognizing the importance of cybersecurity in e-commerce [15] - His work significantly improved the security of online transactions, contributing to the growth of Taobao and its competition against eBay's eBay China [15] Role in Alibaba's Management - Shao served in various capacities, including CEO assistant, vice president of Taobao, and president of Alipay, eventually becoming Alibaba's first Secretary-General [17][18] - He established a risk assessment and response mechanism within Alibaba, addressing various operational risks [18] Contributions and Achievements - Shao played a pivotal role in improving Alibaba's reputation, successfully removing Taobao from a negative list of markets [19] - He was instrumental in the development of Alibaba's internal culture and employee engagement, leading to a high percentage of outstanding employees among party members [19] Legacy and Recognition - Shao Xiaofeng's career has been marked by a commitment to Alibaba's mission, earning him a place among the top successful managers in China, with a net worth of 13.5 billion yuan [26] - His approach emphasizes the importance of achieving a sense of accomplishment through work, aligning personal values with the company's vision [26]
警惕!这种Wi-Fi不能连!你的手机可能会被远程操控
Huan Qiu Wang Zi Xun· 2025-12-09 00:35
Core Viewpoint - The article emphasizes the risks associated with connecting to public Wi-Fi networks, highlighting potential data theft and network attacks, and provides safety tips to mitigate these risks [1][2][3]. Group 1: Risks of Public Wi-Fi - Public Wi-Fi networks can be exploited by malicious actors, including foreign intelligence agencies, to monitor sensitive information from connected devices [1]. - Users connecting to insecure public Wi-Fi may unknowingly have malware installed on their devices, leading to remote control and threats to personal and public safety [2]. - Personal data such as browsing history and location information can be collected and analyzed by malicious entities, potentially undermining social stability and mainstream values [3]. Group 2: Prevention Measures - Users are advised to disable the "auto-connect" feature on their devices to prevent automatic connections to malicious networks [5]. - It is recommended to avoid sensitive operations, such as logging into private accounts or conducting financial transactions, while connected to public Wi-Fi [6]. - Installing and regularly updating protective software can help prevent malware attacks, and using virtual private networks (VPNs) can encrypt data transmission [7]. Group 3: Personal Information Safety - Users should be cautious about sharing personal information on social media, as seemingly innocuous posts can reveal sensitive details [8][9][10][11][12][13][14][15]. - Users should be wary of scams that offer "free benefits" through links or QR codes, as these can lead to malicious app installations that compromise personal data [17][18]. - It is important to manage app permissions to prevent unauthorized access to personal data, such as microphone and contact information [19][20][21]. Group 4: Response to Data Breaches - In the event of a suspected data breach, users should immediately disconnect from the compromised device and freeze affected accounts [22]. - Changing passwords for all related accounts and retaining evidence of the breach are crucial steps in addressing the situation [22]. - Users are encouraged to report violations to relevant platforms and authorities, and to consider legal action if financial loss occurs due to the breach [22].
传华硕1TB资料被盗 官方回应称供应商系统受到影响
Xi Niu Cai Jing· 2025-12-08 07:55
事件曝光后,华硕发布声明称,此次数据泄露并非华硕内部系统被攻破,根源在于一家外部供应商的系统遭受网络入侵。泄露数据仅涉及部分用于华硕智能 手机的相机相关源代码,但未波及华硕核心产品体系、内部运营系统及用户个人数据,终端产品安全运行不受直接影响。 针对此事,华硕表示已启动应急响应机制,正协同第三方专业安全团队开展深入调查,并全面推进风险评估与防护机制升级。此外,华硕还承诺将强化供应 链安全,并继续遵守网络安全标准。 公开资料显示,Everest惯常采用"先窃取后谈判"的攻击策略,通过盗取企业核心技术知识产权和开发档案作为勒索筹码,即便目标企业具备数据备份能力, 仍可能因知识产权外泄陷入被动。 据多家媒体报道,国际勒索软件组织Everest于暗网公布消息,声称已入侵相关系统并窃取华硕超过1TB容量的资料。 ...
“磐石行动”三连冠 陆控构筑数字金融安全底座
Bei Jing Shang Bao· 2025-12-08 06:06
Core Insights - The integration of "Artificial Intelligence +" is driving a paradigm shift in the information security industry, necessitating a transition from traditional decentralized defenses to systematic, intelligent, and practical security capabilities [1][10] - The "Rock Solid Action" initiative in Shanghai has become a benchmark for assessing the cybersecurity capabilities of enterprises, with the 2025 event expanding to include 58 top attack teams and 187 defense teams, totaling nearly 4,000 participants [1][3] Group 1: Industry Developments - The 2025 "Rock Solid Action" event introduced advanced attack scenarios such as AI deep forgery and supply chain penetration, attracting hundreds of cross-industry companies and nearly 4,000 technical experts [4] - The "Iron Triangle" of Shanghai's information security, consisting of Lujin Technology, Hehe Information, and Shizhi Information, has achieved three consecutive years of excellence in the "Blue Team" category, reflecting a robust defense system aligned with industry needs [4][10] Group 2: Company Performance - Lujin Technology's performance in the "Rock Solid Action" highlights its ability to adapt financial-grade defense capabilities to general security scenarios, evolving from basic vulnerability defense in 2023 to addressing AI deep forgery attacks in 2025 [4][5] - The company has also excelled in other competitions, such as the "Guan An Cup" ISG competition and the ninth CTF competition organized by Ping An Group, demonstrating its commitment to practical security training [5] Group 3: AI and Security Innovations - Lujin Technology is implementing an AI-driven dynamic defense system that transitions from passive defense to proactive warning, utilizing deep learning algorithms to identify hidden attack chains in real-time [9] - The company has developed an automated security operations platform that enhances incident response efficiency, achieving an average response time of just 2 minutes for over 5,598 attacks, significantly reducing manpower requirements [9] Group 4: Strategic Vision - The rise of the "Iron Triangle" in Shanghai's fintech security sector is attributed to long-term accumulation and precise planning, establishing a benchmark for local fintech companies and providing a replicable model for national digital economic development [10] - Lujin Technology's focus on AI technology, compliance, and practical defense experience positions it as a key player in safeguarding data security and financial stability in the evolving digital economy [10]
一道语音指令让从未接入互联网的机器人破防,于是它开始了攻击……
Di Yi Cai Jing Zi Xun· 2025-12-08 04:15
Group 1 - The core issue highlighted is the increasing vulnerability of security systems in the face of AI-driven attacks, with the average time to successfully execute an attack decreasing from 9 days in 2021 to just 25 minutes in 2023 [1] - The GEEKCON competition showcased a significant security flaw in a humanoid robot, allowing attackers to remotely control it through a voice command, which raises concerns about systemic risks in future robotic clusters [2] - There is a pressing need for security mechanisms to be integrated from the design phase, rather than relying on post-incident patches, as many companies currently focus on compliance rather than effective security measures [3] Group 2 - The current approach to security, characterized by fragmented defenses and reactive measures, is ineffective against AI-driven threats, as attackers can now simulate legitimate behavior to bypass security systems [4] - The introduction of AI in security operations has the potential to drastically improve efficiency, with AI systems capable of processing significantly more data compared to manual methods, thus enhancing risk monitoring [6] - New security architectures are emerging, such as those proposed by companies like Palo Alto Networks and Fortinet, which aim to create adaptive and self-evolving security systems [6] Group 3 - The concept of pricing security based on effectiveness rather than compliance is gaining traction, with calls for the promotion of cybersecurity insurance to alleviate user anxiety and assess the true capabilities of security vendors [7] - Recent initiatives by the Chinese government to promote cybersecurity insurance indicate a shift towards integrating financial services with cybersecurity, aiming to enhance corporate risk management capabilities [7][8] - The future of cybersecurity may depend on the establishment of verifiable and sustainable operational mechanisms, as insurance models could incentivize companies to improve their defensive capabilities [8]
金山软件申请风险处理方法、装置、系统及计算设备专利,提升风险处理的时效性和容错性
Jin Rong Jie· 2025-12-08 03:43
北京金山软件有限公司,成立于1994年,位于北京市,是一家以从事软件和信息技术服务业为主的企 业。企业注册资本1000万人民币。通过天眼查大数据分析,北京金山软件有限公司参与招投标项目20 次,财产线索方面有商标信息63条,专利信息120条,此外企业还拥有行政许可13个。 声明:市场有风险,投资需谨慎。本文为AI基于第三方数据生成,仅供参考,不构成个人投资建议。 国家知识产权局信息显示,珠海金山软件有限公司、北京金山软件有限公司申请一项名为"风险处理方 法、风险处理装置、网络安全系统及计算设备"的专利,公开号CN121077698A,申请日期为2025年7 月。专利摘要显示,本说明书实施例提供风险处理方法、风险处理装置、网络安全系统及计算设备,其 中所述风险处理方法应用于网络安全平台,网络安全平台对接不同类型的安全设备,基于存在访问风险 的风险终端的访问信息,识别出风险终端的风险访问类型,自动向风险访问类型对应的目标安全设备下 发携带访问信息的风险处理指令,指示目标安全设备基于访问信息对风险终端进行对应的风险处理,提 升了风险处理的时效性和容错性,保证了网络系统的安全性,并且使用网络安全平台对接不同类型的安 ...
国安部披露:有境外间谍在机关周边设置恶意Wi-Fi
Xin Lang Cai Jing· 2025-12-07 01:14
——恶意Wi-Fi窃密。个别境外间谍情报机关会在特定区域(如政府机关周边、涉密单位附近)设置恶 意Wi-Fi,一旦公职人员、特别是涉密人员不慎连接,其设备内的敏感信息、通讯录、邮件往来等可能 会被全程监控,甚至造成国家秘密泄露。 ——网络攻击跳板。不安全的公共Wi-Fi是黑客攻击的重要渠道。用户设备在连接此类Wi-Fi后,可能被 暗中植入恶意程序,在不知情情况下被远程操控,给个人财产和社会公共安全带来威胁。 ——认知操纵画像。连接不安全公共Wi-Fi时产生的浏览记录、位置信息、输入内容等个人数据,容易 被别有用心者非法收集分析,用于构建用户画像、识别群体倾向,攻击者可借此精准投放虚假信息、煽 动对立情绪,长期侵蚀社会共识与主流价值观,对社会稳定和意识形态安全构成潜在威胁。 公共Wi-Fi,如同数字生活中的便捷桥梁,让我们能随时随地接入网络世界,处理公务、联络亲友、休 闲娱乐。然而这座看似平坦的桥梁之下,却可能暗藏着数据窃取与网络攻击的汹涌暗流。 为何公共Wi-Fi不能随意连接 ——避免进行敏感操作。在公共Wi-Fi环境下,不要登录隐私敏感账号,请勿进行网上转账、输入银行 卡密码等高风险操作。尽量避免使用公共W ...
中国驻加拿大使馆发言人就加方炒作所谓“中国网络攻击”答问
Zhong Guo Xin Wen Wang· 2025-12-06 04:41
来源:中国新闻网 编辑:董文博 广告等商务合作,请点击这里 中国驻加拿大使馆发言人就加方炒作所谓"中国网络攻击"答问 中新网12月6日电 据中国驻加拿大使馆微信公众号消息,驻加拿大使馆发言人就加方炒作所谓"中国网 络攻击"答记者问。 有记者问:日前,加拿大网络安全中心与美国网络安全与基础设施安全局和国家安全局联合发布分析报 告称,中国政府支持的网络威胁行为者使用Brickstorm恶意软件入侵政府服务机构、设施以及信息技术 行业组织系统。请问中方有何评论? 发言人称,众所周知,美国才是名副其实的"黑客帝国",是网路攻击的集大成者和全球网络安全的最大 威胁。所谓分析报告对美国肆无忌惮的网络攻击行为视而不见,却对中国进行无端栽赃抹黑,纯属贼喊 捉贼、别有用心,中方对此坚决反对。 发言人指出,中国是网络攻击的主要受害国之一,一贯坚决反对并依法打击一切形式的网络攻击行为, 坚定致力于维护网络安全。中方敦促加方立即停止随美起舞,停止把网络安全问题政治化、污名化,停 止利用网络安全问题抹黑中国。 本文为转载内容,授权事宜请联系原著作权人 中新经纬版权所有,未经书面授权,任何单位及个人不得转载、摘编或以其它方式使用。 关注 ...
苹果向84个国家和地区的用户发送新一轮网络威胁通知
Xin Lang Cai Jing· 2025-12-05 14:34
苹果公司周五表示,已向84个国家和地区的用户发出新一轮网络威胁通知,宣布其最新举措,以保护客 户免受监视威胁。 苹果公司周五表示,已向84个国家和地区的用户发出新一轮网络威胁通知,宣布其最新举措,以保护客 户免受监视威胁。 苹果在认定用户可能成为黑客攻击目标时,会定期向用户发出警告。苹果在12月2日发布的声明中表 示,这些警告并未提供关于所谓监视行动的更多细节,也没有回答有关受害用户数量或监视者身份的问 题。 此前的几波警告曾引发媒体关注,并促使包括欧盟在内的政府机构展开调查,欧盟的高级官员此前曾成 为间谍软件攻击的目标。 苹果在声明中表示,"迄今为止,我们已向全球超过150个国家/地区的向用户发出通知。" 责任编辑:李桐 苹果在认定用户可能成为黑客攻击目标时,会定期向用户发出警告。苹果在12月2日发布的声明中表 示,这些警告并未提供关于所谓监视行动的更多细节,也没有回答有关受害用户数量或监视者身份的问 题。 此前的几波警告曾引发媒体关注,并促使包括欧盟在内的政府机构展开调查,欧盟的高级官员此前曾成 为间谍软件攻击的目标。 苹果在声明中表示,"迄今为止,我们已向全球超过150个国家/地区的向用户发出通知。" ...
数码视讯涨0.73%,成交额1.33亿元,近3日主力净流入-659.10万
Xin Lang Cai Jing· 2025-12-05 07:22
来源:新浪证券-红岸工作室 12月5日,数码视讯涨0.73%,成交额1.33亿元,换手率1.89%,总市值79.14亿元。 异动分析 数据确权+区块链+云计算+网络安全+互联网金融 1、2021年年报显示:子公司快视听致力于利用区块链技术赋能行业,拓展公司相关技术在元宇宙发展 中的应用。旗下洞壹元典平台通过发行数字藏品,充分发挥区块链底层技术防篡改、可验证的属性,面 向文化艺术、音乐、时尚潮玩、零售等领域,为数字内容提供新的确权和版权证明。并通过数字藏品这 一载体,创造全新的数字内容销售、传播、品牌营销的模式。进一步在数字艺术品收藏、粉丝经济、元 宇宙数字资产等核心业务场景中发挥确权价值。 (免责声明:分析内容来源于互联网,不构成投资建议,请投资者根据不同行情独立判断) 资金分析 今日主力净流入-815.24万,占比0.08%,行业排名104/132,该股当前无连续增减仓现象,主力趋势不明 显;所属行业主力净流入-7.62亿,连续3日被主力资金减仓。 区间今日近3日近5日近10日近20日主力净流入-599.17万-659.10万-1909.83万-5397.93万-1.06亿 2、2018年年报披露:数码科技 ...