网络安全
Search documents
微软Windows再次被指暗藏后门,区别对待中国用户
Guan Cha Zhe Wang· 2025-09-18 12:45
Core Viewpoint - The article discusses allegations against Microsoft regarding its Windows system's differential treatment of users in Europe and Asia, particularly China, raising concerns about privacy violations and national data security [2][3]. Group 1: Allegations Against Microsoft - A network security technician named "Xuandao" claims that Microsoft uses its monopoly position to hide encrypted data and dynamically release unknown programs to collect user data through the UCPD.sys driver [2][3]. - UCPD.sys is alleged to contain mechanisms that specifically target Chinese software vendors, employing blacklists to restrict competition and maintain Microsoft's market dominance [2][4]. - Legal experts suggest that if these allegations are true, Microsoft may be violating personal privacy laws and engaging in unfair competition practices [2][3][15]. Group 2: Technical Analysis of UCPD.sys - UCPD.sys, which is designed to protect user default application settings, has been found to operate in a way that undermines user control, automatically reverting settings to Microsoft applications after user attempts to change them [3][6]. - The driver is reported to have a "remote loading and execution" capability, allowing it to monitor and modify system settings without user awareness, which experts have labeled as an "invisible backdoor" [3][7]. - The driver includes a blacklist of numerous Chinese software products, indicating a systematic effort to limit their functionality and market presence [4][6]. Group 3: Regional Disparities in User Experience - UCPD.sys reportedly has built-in regional detection logic, leading to significant differences in user experience between Chinese and European users, with the latter enjoying more freedom to modify default applications [8][10]. - In Europe, users can easily switch default applications without interference from the system, while in China, the system enforces data collection and restricts user choices [10][11]. Group 4: Implications for User Security and Market Competition - The restrictions imposed by UCPD.sys on Chinese security software weaken user defenses, exposing them to higher security risks as these applications are unable to function effectively [7][15]. - The article highlights a broader concern that such practices may facilitate foreign attacks on critical information infrastructure in China, posing risks to personal privacy and corporate secrets [15][16].
网络安全周 | 当网络陷阱出现时,我们该如何保护自己?
中泰证券资管· 2025-09-18 11:33
Core Viewpoint - The article emphasizes the importance of cybersecurity in the digital age, highlighting the various risks associated with online activities and the need for robust protective measures to safeguard personal information and assets [3][11]. Group 1: Ubiquitous Network Threats - The article outlines common network threats such as malware, which can infiltrate devices to steal personal information or damage system files [5]. - Account hijacking is increasingly prevalent, especially when users employ the same credentials across multiple platforms, leading to potential fraud and reputational damage [5]. - Various forms of online scams are discussed, including traditional lottery scams and emerging online lending frauds, which exploit personal data for malicious purposes [6]. Group 2: Building a Cybersecurity Defense Network - Establishing device security is fundamental, including installing reliable security software and regularly updating operating systems and applications to patch vulnerabilities [8]. - Password management is crucial; using strong, unique passwords for different accounts can significantly reduce the risk of unauthorized access [8]. - Developing safe online habits is essential, such as being cautious with public Wi-Fi and scrutinizing links or files from unknown sources [8]. Group 3: Practical Strategies for Information Protection - Personal information should be meticulously protected, including shredding sensitive documents and being cautious about sharing location data on social media [10]. - Managing app permissions is vital; users should only grant necessary permissions and regularly review existing app settings [10]. - In case of a security breach, immediate actions should include checking financial statements for anomalies, ceasing contact with suspicious parties, and reporting incidents to authorities [10].
聚焦2025国家网络安全周:鸿蒙隐私安全多重守护为用户数字生活护航
Huan Qiu Wang· 2025-09-18 08:06
Core Viewpoint - The National Cybersecurity Awareness Week, themed "Cybersecurity for the People, Cybersecurity by the People," was officially opened in Kunming, showcasing Huawei's advanced cybersecurity solutions and products, particularly the HarmonyOS privacy security solutions [1] Group 1: Huawei's Cybersecurity Initiatives - Huawei's HarmonyOS 5 has seen over 14 million devices equipped, indicating strong market and user recognition of its new security concepts and practices [1] - The new self-developed Star Shield security architecture in HarmonyOS 5.0 has restructured the security system, reducing malicious app installations by 16 million monthly and intercepting over 8.6 billion unreasonable permission requests [1] - The HarmonyOS 6 developer Beta version upgrades the Star Shield security architecture, incorporating AI capabilities for intelligent recognition and proactive protection against scenarios like peeping and fraud [1] Group 2: Huawei's Product Innovations - Huawei introduced the first commercial HarmonyOS laptop, the Qingtian HM940, which features an AI assistant and enterprise-level security solutions, marking a new era in commercial productivity [3] - The HarmonyOS computer series emphasizes comprehensive privacy and security protection, including chip-level full-disk encryption and a super privacy mode for user control [4] - The Huawei Qingtian brand encompasses a range of commercial products and solutions, focusing on reliable quality, independent innovation, and user-centric design [5] Group 3: Industry Collaboration and Future Outlook - Huawei's Qingtian brand collaborates with partners to create industry solutions across sectors like government, finance, education, and energy, enhancing the integration of hardware and software [5] - The theme of cybersecurity emphasizes the role of the public as both the object of protection and a participant in safeguarding digital security, reflecting Huawei's commitment to a secure and intelligent digital future [5]
安博通股价跌5.03%,广发基金旗下1只基金重仓,持有6.89万股浮亏损失33.95万元
Xin Lang Cai Jing· 2025-09-18 06:18
Company Overview - Anbotong Technology Co., Ltd. is located in Haidian District, Beijing, and was established on May 25, 2007. The company went public on September 6, 2019. Its main business involves the research, development, sales of core software products for cybersecurity, and related technical services, positioning itself as a provider of cybersecurity system platforms and services [1]. Business Segmentation - The revenue composition of Anbotong is as follows: Security Gateway accounts for 39.47%, Security Artificial Intelligence 35.21%, Security Management 18.05%, Security Services 7.15%, and Others 0.12% [1]. Stock Performance - On September 18, Anbotong's stock price fell by 5.03%, closing at 93.11 CNY per share, with a trading volume of 317 million CNY and a turnover rate of 4.25%. The total market capitalization is 7.156 billion CNY [1]. Fund Holdings - According to data, one fund under GF Fund Management holds a significant position in Anbotong. The GF Reform Mixed Fund (001468) held 68,900 shares in the second quarter, unchanged from the previous period, representing 2.48% of the fund's net asset value, making it the fourth-largest holding. The estimated floating loss today is approximately 339,500 CNY [2]. Fund Performance - The GF Reform Mixed Fund (001468) was established on July 27, 2015, with a current size of 197 million CNY. Year-to-date, it has returned 29.7%, ranking 3028 out of 8172 in its category. Over the past year, it has achieved a return of 46.72%, ranking 3682 out of 7980. Since inception, the fund has returned 11.8% [2]. Fund Management - The fund manager of GF Reform Mixed Fund (001468) is Chen Shaoping, who has a cumulative tenure of 18 years and 297 days. The total asset size of the fund is 197 million CNY, with the best return during his tenure being 76.34% and the worst being -27.18% [3].
公安部通报:某跨国公司违规向境外传输用户信息
财联社· 2025-09-18 05:36
Core Viewpoint - The article highlights the enforcement actions taken by the Ministry of Public Security in China regarding data protection violations by various companies, emphasizing the importance of compliance with personal information protection regulations and the consequences of negligence in data security practices [1][2]. Group 1: Case Summaries - A multinational fashion brand was penalized for failing to protect personal information, including not conducting necessary security assessments and not obtaining user consent for data transfer to its overseas headquarters [2]. - A government service system in Guizhou was attacked due to inadequate technical protections, resulting in over 4 million yuan in losses for the public [3]. - A messaging platform in Jiangsu was compromised, leading to the unauthorized sending of over 27,000 fraudulent messages due to a lack of security measures [4]. - A school in Henan experienced a data breach due to vulnerabilities in its smart card billing system, which lacked encryption and proper access controls [6]. - An e-commerce company in Anhui faced data leaks from its ticketing system due to weak security awareness and failure to implement necessary protective measures [8]. - A technology company in Yunnan was found responsible for a significant leak of personal information through its "contacts" app, attributed to poor internal management and lack of user verification [11].
便携式运维网关:电力系统网络安全新范式
Zhong Guo Neng Yuan Wang· 2025-09-18 03:17
Core Viewpoint - The Ulanqab Power Supply Company of Inner Mongolia Electric Power Group is enhancing network security in substation operations by implementing a new operational model that incorporates portable maintenance gateways, addressing vulnerabilities in traditional maintenance practices [1][3][4] Group 1: New Operational Model - The training focuses on promoting a new operational model that integrates "maintenance computer + portable maintenance gateway + maintained equipment," introducing a "security isolation zone" in traditional direct connection links [3] - The portable maintenance gateway features three core protective capabilities: physical isolation to block direct data interaction, two-way identity authentication for maintenance requests, and traffic filtering to intercept abnormal data transmissions [3] Group 2: Training and Implementation - During the training, participants engaged in hands-on practice, discussing real-world issues related to the gateway's compatibility with different equipment models and data transmission management [3] - The training emphasized understanding the parameters, device compatibility, and troubleshooting of the portable maintenance gateway in the context of actual substation operations [3] Group 3: Future Directions - As the digital transformation of the power grid accelerates, ensuring network security at substations is critical for reliable power supply, making the mitigation of operational risks a top priority for the team [4] - The team plans to continue integrating business needs with technological innovation and security measures to strengthen the stability of the power grid [4]
江苏联通筑牢网络安全新防线
Xin Hua Ri Bao· 2025-09-18 02:57
Core Viewpoint - The importance of cybersecurity as a critical component of national security and a key support for building a strong manufacturing and digital economy in China is emphasized by the company [1]. Group 1: Political Leadership and Governance - The company implements a three-tier responsibility system for cybersecurity governance, led by the party committee, ensuring that political advantages are transformed into effective cybersecurity governance [2]. - The company actively promotes the integration of "party building and cybersecurity," aligning with national security strategies and enhancing organizational capabilities [2]. Group 2: Technological Innovation - The company is constructing an integrated cybersecurity defense system that combines monitoring, prevention, management, and control, leveraging AI and big data for comprehensive security [3]. - The establishment of a leading Security Operations Center (SOC) enhances real-time monitoring and rapid response capabilities to various security incidents [3]. - The company has achieved significant recognition, winning a bronze award in the Digital China Innovation Competition for data security in 2025 [3]. Group 3: Anti-Fraud Initiatives - The company has developed a three-pronged anti-fraud work system that includes mechanism guarantees, technological empowerment, and comprehensive governance [4]. - The transition from decentralized control to centralized governance in anti-fraud efforts has been implemented, enhancing collaboration through a fraud prevention alliance platform [4]. - The company has reached over 5 million people through anti-fraud awareness campaigns in collaboration with various sectors, significantly increasing public outreach [4]. Group 4: Commitment to Cybersecurity Ecosystem - The company is focused on strengthening the modern cybersecurity industrial chain, aiming to build an end-to-end security protection system and promote high-quality development in the cybersecurity industry [6]. - The company has successfully completed major event security tasks, achieving zero network failures, zero website tampering, and zero data leaks [6]. - Future plans include continued emphasis on party leadership, technological innovation, and governance to enhance cybersecurity and protect public assets [6].
构建网络安全协同防御体系
Ren Min Wang· 2025-09-18 00:53
"网络安全为人民,网络安全靠人民——以高水平安全守护高质量发展",2025年国家网络安全宣传 周主题告诉我们,确保网络安全,需要凝聚起全社会的力量,构建网络安全协同防御体系。 当今世界,信息技术日新月异,网络深度融入经济社会发展和人们日常生活的方方面面。从关键信 息基础设施到个人数字生活,网络空间在带来便利与机遇的同时,也带来潜在安全风险和威胁。因此, 网络空间不存在"安全孤岛",需要全社会协同防御。 尽管网络安全法、数据安全法等法律法规的出台,为网络安全奠定了法治基础,但在实践中仍需不 断跟进形势、健全完善。当前,不法分子不断更新电信网络诈骗、网络赌博等犯罪手段,需要我们根据 新形势,不断完善法律法规和网络安全相关细则,优化多元主体之间的权责利关系,制定覆盖网络安全 技术、产品、管理和服务的共同标准,为协同防御提供有力保障。 万物互联时代,不法分子如果使用网络攻击技术,对一个局部节点进行勒索、篡改等操作,就可能 产生连锁反应,引发全局性风险,对数据持有者、服务提供者、信息生产者等利益攸关方造成伤害。此 外,系统、芯片等网络信息安全关键领域存在的一些技术缺陷,也容易被不法分子利用,带来安全风 险,亟待协同创新 ...
船舶、航空航天等领域领先 中国成为ISO参与度最高成员之一
Yang Shi Xin Wen Ke Hu Duan· 2025-09-18 00:17
Group 1 - China currently undertakes approximately 90 ISO technical committees, showcasing a significant level of participation and contribution to ISO's mission [2] - China is involved in 99% of ISO technical committees and subcommittees, indicating its high engagement in international standardization efforts [2] - The country is recognized as one of the highest participating members in ISO [2] Group 2 - China leads in various sectors such as electric vehicle batteries, solar panels, steel manufacturing, shipping, wind power, and aerospace, which is closely linked to its emphasis on standards and standardization [4] - The future development potential of China is considered immense, particularly in leading technological advancements in areas like artificial intelligence and quantum technology [4] - There is an expectation for China to play a significant role in the formulation of standards in artificial intelligence, quantum technology, and cybersecurity, with hopes for closer collaboration with relevant parties [4]
持续提升全民网络安全意识和技能
Ren Min Ri Bao· 2025-09-17 22:22
Core Viewpoint - Cybersecurity is a crucial component of national security, emphasizing the need for enhanced public awareness and skills in cybersecurity to protect the interests of the people and ensure high-quality development [1][2]. Group 1: Cybersecurity Development and Education - Since the 18th National Congress, under the guidance of Xi Jinping's thoughts on building a strong cyber nation, China's internet development and governance have made significant progress, with comprehensive strengthening of cybersecurity education and awareness [2]. - A robust legal framework has been established, including the Cybersecurity Law and Data Security Law, which outlines responsibilities and pathways for cybersecurity education and talent cultivation [2]. - The National Cybersecurity Awareness Week has been successfully held, with innovative content and expanding coverage, integrating cybersecurity education into the national education system [2][3]. Group 2: Challenges in Cybersecurity Awareness - As of June this year, China has 1.123 billion internet users, with an internet penetration rate of 79.7%, creating both a strong force for cybersecurity and a target for cyberattacks [3]. - There are significant disparities in cybersecurity awareness and skills across different demographics, including age and geographic location, necessitating a more coordinated approach to cybersecurity education [3]. - Current cybersecurity education efforts face challenges such as superficiality and outdated content, highlighting the need for more effective measures to enhance public understanding of cybersecurity risks [3]. Group 3: Collaborative Mechanisms and Targeted Education - Establishing a collaborative mechanism involving multiple departments, including education and public security, is essential for enhancing public cybersecurity awareness and skills [4]. - Targeted educational initiatives should be developed for vulnerable groups, such as the elderly and youth, to avoid one-size-fits-all approaches [4]. - Higher education institutions should provide comprehensive cybersecurity education that addresses both achievements and current threats, while also focusing on common cybersecurity issues faced by students [4]. Group 4: Innovative Promotion of Cybersecurity - Continuous innovation in promoting cybersecurity concepts and skills is necessary, utilizing events like the National Cybersecurity Awareness Week to engage the public effectively [5]. - Initiatives such as the "Chinese Youth Good Netizen" story selection and the use of new technologies like big data and AI can enhance public engagement and skill development in cybersecurity [5]. Group 5: Evaluation of Cybersecurity Education Effectiveness - Regular assessments of cybersecurity education effectiveness should be conducted, focusing on public awareness and skills related to privacy protection and information management [6]. - A collaborative framework involving government, enterprises, and society is essential for sustaining improvements in public cybersecurity awareness and skills [6].