网络安全
Search documents
捷豹路虎英国工厂全面恢复生产
Zhong Guo Xin Wen Wang· 2025-11-15 00:15
捷豹路虎英国工厂全面恢复生产 来源:中国新闻网 编辑:付健青 广告等商务合作,请点击这里 本文为转载内容,授权事宜请联系原著作权人 中新经纬版权所有,未经书面授权,任何单位及个人不得转载、摘编或以其它方式使用。 关注中新经纬微信公众号(微信搜索"中新经纬"或"jwview"),看更多精彩财经资讯。 中新社伦敦11月14日电 (欧阳开宇 刘施岑)捷豹路虎14日宣布,其英国三家工厂在遭遇网络攻击导致停 产后,生产运营已全面恢复正常。此次事件不仅给企业造成巨额损失,还对英国第三季度经济增长产生 显著拖累。 捷豹路虎英国工厂此次停产始于8月底,黑客组织利用第三方软件安全漏洞侵入系统,迫使捷豹路虎紧 急关闭全球IT基础设施以遏制风险。受此影响,位于索利哈尔、哈利伍德和沃尔弗汉普顿的三家工厂全 面停摆,涉及3.3万名员工休假,日均约1000辆的产能完全中断。 此次捷豹路虎停产引发连锁反应。数据显示,9月英国汽车产量暴跌28.6%,创下2020年4月以来最大单 月跌幅。受此冲击,英国2025年第三季度GDP环比仅增长0.1%,较上一季度明显放缓,9月单月经济更 是出现萎缩。 对捷豹路虎自身而言,停产期间,约5万辆汽车的生产 ...
聚力协同创新,2025年普陀区网络安全产业生态大会召开
Guo Ji Jin Rong Bao· 2025-11-14 08:26
11月13日,2025年普陀区网络安全产业生态大会正式召开。 中共上海市普陀区委常委、统战部部长魏静,以及上海市通信管理局、上海市公安局网络安全保卫总队、中共上海市委网络安全和信息化委员会办公室 等市级相关部门领导出席大会,为产业发展凝聚共识、擘画"十五五"发展方向。 上海市经济和信息化委员会总工程师裘薇在致辞中指出,普陀区作为上海市网络安全产业核心承载区,在区域产业布局与创新发展中发挥关键作用,其 产业集聚效应与示范价值已得到行业广泛认可。 她强调,上海市将进一步整合资源要素,打造更高能级的网络安全产业创业发展环境,通过持续开放应用场景、优化产业生态体系、强化跨领域协同联 动,推动全市网络安全产业形成"融合发展、优势互补"的新格局,为国家网络安全事业贡献上海力量。 "揭榜挂帅"机制作为破解产业发展痛点、链接市场需求与技术供给的核心抓手,在本次大会中深度推进。2025年,普陀区联合中国建材集团、红星美凯 龙家居集团、上海市园林设计研究院等行业龙头企业,面向社会发布十大网络安全应用场景需求,为网络安全企业拓展市场空间、实现技术落地提供全新赛 道。现场,两项"揭榜挂帅"合作项目完成签约,标志着需求与技术的精准匹配 ...
意法半导体启动扩建马耳他智能工厂,创马史上最大单笔投资纪录
Shang Wu Bu Wang Zhan· 2025-11-13 03:21
Group 1 - The core point of the article is the announcement by STMicroelectronics to expand its smart factory in Malta, marking the largest single investment in Malta's history, which will enhance Malta's position in the European semiconductor supply chain [1] - The "Malta Semiconductor Capability Center" will be established with a joint funding of €8 million from the EU Chips Joint Plan, in collaboration with the University of Malta and IMEC, to provide training and advanced equipment for researchers and students [1] - Malta's Minister of Economy, Silvio Schembri, emphasized the commitment to investing in talent, research, and technology to promote sustainable development in the semiconductor sector [1] Group 2 - The conference showcased STMicroelectronics' first humanoid robot designed for semiconductor manufacturing, indicating significant advancements in automation and precision manufacturing at its Malta packaging and testing facility [1] - Malta Enterprise CEO George Gregory highlighted Malta's scale advantages, positioning it as an ideal testing ground for semiconductor technology innovation in Europe [1]
映翰通跌2.02%,成交额5186.26万元,主力资金净流出194.67万元
Xin Lang Cai Jing· 2025-11-12 05:30
Core Viewpoint - The stock price of Yinghantong has experienced fluctuations, with a year-to-date increase of 51.59% but a recent decline in the last five and twenty trading days [2]. Group 1: Stock Performance - As of November 12, Yinghantong's stock price decreased by 2.02%, trading at 49.60 CNY per share, with a total market capitalization of 3.653 billion CNY [1]. - Year-to-date, the stock has risen by 51.59%, while it has dropped by 1.43% in the last five trading days and 4.10% in the last twenty trading days [2]. - The stock has been on the "龙虎榜" (a list of stocks with significant trading activity) once this year, with the last appearance on February 10 [2]. Group 2: Company Overview - Yinghantong, established on May 29, 2001, and listed on February 12, 2020, is based in Beijing and specializes in the research and application of industrial IoT technology [2]. - The company's main revenue sources include industrial IoT products (52.00%), smart vending control systems (16.17%), digital power distribution products (15.15%), enterprise network products (13.96%), and technical services (2.72%) [2]. - Yinghantong belongs to the communication equipment sector and is associated with concepts such as DeepSeek, artificial intelligence, edge computing, network security, and robotics [2]. Group 3: Financial Performance - For the period from January to September 2025, Yinghantong reported a revenue of 550 million CNY, reflecting a year-on-year growth of 34.61%, and a net profit attributable to shareholders of 103 million CNY, up by 23.00% [2]. - The company has distributed a total of 60.8295 million CNY in dividends since its A-share listing, with 34.6151 million CNY distributed over the past three years [3]. - As of September 30, 2025, the number of shareholders increased by 44.72% to 9,819, while the average circulating shares per person decreased by 31.08% to 7,501 shares [2].
某单位用办公室电话当密码,驻军分布等近2000份文件被窃取
Xin Lang Cai Jing· 2025-11-12 01:24
Core Points - A significant theft occurred at the Louvre Museum, where 9 pieces of Napoleon-era royal jewelry were stolen in just 7 minutes, resulting in an estimated economic loss of €88 million [1][3] - The security vulnerabilities of the Louvre have come under scrutiny, with reports indicating that the museum's systems had weak passwords and outdated software, including Windows 2000 and Windows Server 2003 [3] - French President Macron announced plans to completely restructure the Louvre's security system in response to the incident [3] Security Vulnerabilities - The thieves disguised themselves as workers and used a ladder to access the museum, highlighting a severe lapse in security measures [3] - An audit by the French National Cybersecurity Agency (ANSSI) revealed that simple passwords could grant full control over the Louvre's main server and core monitoring systems [3] - Despite warnings from cybersecurity officials, the Louvre failed to address these vulnerabilities in subsequent audits conducted in 2015 and 2017 [3] Broader Implications - The incident raises concerns about weak password practices not only in high-profile institutions like the Louvre but also in everyday life, where individuals often use easily guessable passwords [4][5] - The importance of strong password creation and management is emphasized, suggesting methods such as using memorable phrases and ensuring distinct passwords for different accounts [7][9] - The need for enhanced security measures, including antivirus software and regular system updates, is highlighted to prevent unauthorized access [8]
警惕“过保”网络设备成境外间谍“帮凶” 国家安全机关提示
Yang Shi Xin Wen· 2025-11-11 22:58
Core Insights - The article highlights the security risks associated with outdated electronic devices that have surpassed their manufacturer's support period, leading to unpatched vulnerabilities and increased exposure to cyber threats [1][2]. Group 1: Security Risks of Outdated Devices - Devices that are no longer supported by manufacturers become vulnerable due to unaddressed security flaws, making them easy targets for hackers [2]. - Once compromised, these devices can be used as tools for further attacks, allowing intruders to conduct operations undetected and access sensitive information [4]. Group 2: Escalation of Threats - A single vulnerability can lead to exponential threats as attackers exploit it to access sensitive data and network permissions, potentially affecting interconnected systems and critical infrastructure [6]. - The initial isolated technical flaw can escalate into complex security incidents, resulting in data breaches, service disruptions, and systemic risks [6]. Group 3: Recommendations for Mitigation - Users are advised to regularly check the lifecycle of their devices and replace those that are outdated to eliminate potential security risks [8]. - Implementing strict access controls and minimizing network exposure can help prevent compromised devices from being used as attack vectors [8]. - Continuous monitoring for firmware updates and security patches is essential to protect devices that are still within their support lifecycle [8].
国安部:你的设备还在“保质期”吗?
Guan Cha Zhe Wang· 2025-11-11 22:54
Core Viewpoint - The article highlights the security risks associated with outdated electronic devices that have surpassed their manufacturer's support period, leading to unpatched vulnerabilities and potential exploitation by hackers [1][2]. Group 1: Security Risks of Outdated Devices - Devices that are no longer supported by manufacturers become vulnerable due to unpatched security flaws, making them easy targets for hackers [2]. - Once compromised, these devices can be used as tools for further attacks, allowing intruders to access sensitive information and launch additional cyber operations [3]. Group 2: Escalation of Threats - A single vulnerability can lead to exponential threats as attackers exploit it to access sensitive data and expand their reach within the network, potentially affecting interconnected systems and critical infrastructure [4]. - The initial isolated technical flaw can evolve into complex security incidents, resulting in data breaches, service disruptions, and systemic risks [4]. Group 3: Recommendations from National Security Authorities - Users are advised to regularly check the lifecycle of their devices and replace outdated equipment to eliminate potential security threats [5]. - Implementing strict access controls and minimizing network exposure can help prevent compromised devices from being used as attack vectors [5]. - Continuous monitoring for firmware updates and security patches is essential to protect devices still within their support lifecycle [5].
双11下单忙,警惕藏在购物车后的诈骗方
第一财经· 2025-11-11 15:48
Core Viewpoint - The article highlights the increasing prevalence of online shopping fraud during the Double 11 shopping festival, emphasizing the need for consumer vigilance against various scams targeting online shoppers [3][10]. Group 1: Types of Scams - The article outlines several types of scams prevalent during the Double 11 shopping festival, including refund and compensation scams, where fraudsters lure victims into transferring money under the guise of refunds or compensation for faulty products [5][10]. - Another common scam involves impersonating customer service representatives, claiming issues with purchased items and prompting victims to share personal information or download malicious apps [10][11]. - The article also mentions phishing scams that exploit promotional messages to direct consumers to fake websites, leading to potential theft of personal information and funds [10]. Group 2: Fraud Prevention Measures - Authorities recommend that consumers adhere to the "four no principles" to protect themselves: do not engage in private communication outside official platforms, do not trust high compensation promises, avoid downloading unknown software, and do not transfer money to unfamiliar accounts [6][10]. - The article emphasizes the importance of consumer awareness and vigilance, urging individuals not to download any software based on unsolicited prompts and to safeguard their personal information [11][12]. - The article notes that the fraud industry has become increasingly sophisticated, operating in a "puzzle-like" manner where different teams handle various aspects of the scam, making it challenging to combat [10].
双11下单忙,警惕藏在购物车后的诈骗方
Di Yi Cai Jing· 2025-11-11 12:39
Core Viewpoint - The article emphasizes the increasing prevalence of online shopping fraud during the Double 11 shopping festival, highlighting the need for consumers to remain vigilant against scams that impersonate e-commerce platforms and lure individuals into downloading fraudulent applications or sharing personal information [1][6]. Group 1: Fraud Types and Tactics - Various types of scams have been identified, including refund and compensation fraud, where scammers set up fake online stores, send defective products, and then manipulate consumers into transferring money under the guise of compensation [4][6]. - Scammers are increasingly using tactics such as screen sharing and remote control of victims' devices to access sensitive banking information, leading to significant financial losses [5][6]. - The fraud schemes have evolved into a "puzzle-like" operational model, with different teams handling various aspects of the scam, making it difficult to dismantle the entire operation [6][7]. Group 2: Consumer Warnings and Recommendations - Authorities have issued warnings advising consumers to avoid private communications outside official platforms, refrain from adding unknown contacts on social media, and not to download unofficial software [1][4]. - The "Four No Principles" for consumer protection include not engaging in private conversations outside official platforms, not trusting high compensation promises, avoiding unknown software downloads, and not transferring money to unfamiliar accounts [4][6]. - The National Anti-Fraud Center has compiled a "Fraud Prevention Handbook" for Double 11, detailing common scams such as pre-sale fraud, impersonation of customer service, and fake prize notifications [6][7].
刷脸认证还安全吗?新型AI换脸盗号案细节曝光
Huan Qiu Wang Zi Xun· 2025-11-11 10:40
Core Viewpoint - The article highlights the alarming rise of AI face-swapping technology being exploited for identity theft and unauthorized access to e-commerce accounts, posing significant risks to personal information security [1][3][9]. Group 1: Incident Overview - In June 2024, police in Hangzhou discovered a suspicious advertisement promoting AI face-swapping technology that could bypass platform verification using just a user's facial photo [1]. - The technology allows criminals to gain unauthorized access to user accounts, potentially compromising sensitive information such as chat records [1][3]. - Two victims, Mr. Liu and Ms. Zhang, experienced unauthorized transfers of their e-commerce accounts, with Ms. Zhang losing her account shortly after purchasing it [5][9]. Group 2: Criminal Network and Arrests - Police identified a network of 150 abnormal e-commerce accounts linked to a criminal group utilizing AI face-swapping technology [10]. - The investigation led to the arrest of Zhang, who was found to be advertising the technology on foreign platforms, and subsequently, two accomplices, Wu and Wang, were also apprehended [12][14]. - The trio established a cooperative scheme where they charged fees for accessing personal information and facilitating account transfers, with profits exceeding 100,000 yuan [14]. Group 3: Legal Consequences - The court sentenced Zhang to three years and two months in prison, while Wu and Wang received three years and a suspended sentence of four years, respectively, for illegally obtaining computer information [14].