网络安全
Search documents
晶采观察丨守护数字生活!从细节处筑牢网络安全“防火墙”
Yang Guang Wang· 2025-09-17 13:23
Group 1 - The core issue highlighted is the importance of personal information protection in the digital age, emphasizing the need for "cybersecurity awareness" among individuals [1] - The scale of internet users in China has surpassed 1.1 billion, with a particular focus on the vulnerability of the youth demographic due to their relatively weak awareness and discernment regarding online safety [1] - Recent cases of telecom fraud targeting minors have been on the rise, exploiting their naivety and lack of preventive measures, which can lead to significant financial losses for families [1] Group 2 - The theme of this year's National Cybersecurity Awareness Week is "Cybersecurity for the People, Cybersecurity Relies on the People," underscoring the collective responsibility of individuals in maintaining online safety [2] - Various themed days are scheduled during the Cybersecurity Awareness Week, including Campus Day, Telecom Day, Legal Day, Financial Day, Youth Day, and Personal Information Protection Day, aimed at raising awareness across different sectors [2] - Activities will be organized to promote cybersecurity awareness in communities, rural areas, enterprises, government agencies, schools, and households, making the education efforts more relatable and engaging for the public [2]
AI眼中的中国|熊心壮志,守护网安
Zhong Guo Xin Wen Wang· 2025-09-17 13:17
9月15日至21日,2025年国家网络安全宣传周在全国统一开展,今年的主题是"网络安全为人民,网络安全靠人民——以高水平安全守护高质量发展"。 智能生活无忧虑,安全防范要牢记。今天,有一群特别的"网安守护者"——中新网大熊猫"开开""心心"和"熊出没"人气角色"熊大""熊二""光头强",化 身"熊熊小队",用萌趣方式带你解锁网络安全新知识。 k 守 水 平 安 全 护 质 以 量 发 高 高 展 2鸽25 国家网络安全真 FE EEFF 人工智能 安全治理框架2.0 AI Safety Governance Framework 2.0 全国网络安全标准化技术委员会 National Technical Committee 260 on Cybersecurity of SAC 国家计算机网络应急技术处理协调中心 National Computer Network Emergency Response Technical Team/Coordination Center of China 2025年9月 《 人工智能安全治理框架 》 9月15日,在2025年国家网络安全宣传周主论坛上, 《人工智能安全治理框架》 ...
《AI时代网络安全产业人才发展报告(2025)》发布
Xin Hua Wang· 2025-09-17 12:42
Group 1 - The report highlights that over 70% of cybersecurity professionals are now under the age of 30, marking a significant demographic shift in the industry [1] - Cybersecurity operations positions are projected to maintain a leading share of 26.8% in job postings through 2025, indicating a strong demand for these roles [1] - The report notes that 792 universities in China have established cybersecurity programs, representing 27.1% of all higher education institutions [1] Group 2 - The report introduces a new "AI-driven cybersecurity job map," which includes seven new roles such as AI risk advisor and intelligent architecture designer, reflecting the evolving job landscape [2] - Recommendations include integrating "AI + security" talent into national security strategies and making advanced topics like large model security mandatory in university curricula [2] - The ability to apply AI technology is identified as a core competitive advantage for cybersecurity talent, with a focus on enhancing defense efficiency and threat detection capabilities [2]
2025年国家网络安全宣传周成都系列活动开幕,CCS2025精彩启程
Yang Shi Wang· 2025-09-17 12:21
Group 1 - The 2025 National Cybersecurity Awareness Week in Chengdu focuses on the theme "Cybersecurity for the People, Cybersecurity by the People," aiming to create a strong atmosphere of learning and understanding cybersecurity across the city [1] - The event includes a series of activities such as an opening ceremony, exchange activities, exhibitions, themed days, and outreach initiatives, organized by multiple local government departments [1] - The CCS2025 Chengdu Cybersecurity Technology Exchange event, part of the series, emphasizes the integration of artificial intelligence and cybersecurity, covering topics like vulnerability management and AI+ cybersecurity technologies [2] Group 2 - The CCS virtual navigator "Xiao Zhi" has been upgraded to enhance the immersive experience, showcasing the integration of AI and real-world perception in cybersecurity [3] - The fifth Geek Youth Challenge National Finals took place in Chengdu, introducing innovative formats to enhance youth cybersecurity literacy amid rising internet-related issues [4][5] - The event features three major exhibition areas, including the Chengdu "14th Five-Year" cybersecurity achievements exhibition, showcasing significant advancements in talent development, technological innovation, and industry growth [6]
网络安全周 | 警惕钓鱼邮件,这份“防钓”指南请收好
中泰证券资管· 2025-09-17 11:32
Core Viewpoint - The article emphasizes the increasing threat of phishing emails in the digital workplace, highlighting their potential to compromise personal and corporate data security [2]. Phishing Email Activity - Phishing emails are disguised as trustworthy communications, aiming to trick recipients into clicking malicious links or disclosing sensitive information. This poses risks of data breaches and financial losses for companies [2]. - According to a report from Coremail's AI lab, the total amount of spam emails received by corporate mailboxes reached 972 million in Q2 of this year, marking a year-on-year increase of 6.81% [2]. Identification of Phishing Emails - Check the domain and sender address: Phishing emails often use similar spellings of official domains or embed fake subdomains [3]. - Be cautious of urgent content and information requests: Emails with subjects like "urgent," "check," or "warning" that request passwords or verification codes should raise red flags [4]. - Verify links and attachment safety: Hover over links to check their actual destination and avoid clicking if the domain does not match the claimed organization [5]. - Cross-check internal processes: For emails impersonating colleagues or partners, confirm through secondary channels like phone or text, especially for payment requests [6]. Protective Recommendations - Implement dual-track defense: Strengthen endpoint security with legitimate antivirus software, firewalls, and email filtering gateways, and enable multi-factor authentication for critical accounts [7]. - Adhere to the "three no" principles for unfamiliar emails: Do not click links, download attachments, or disclose personal information [8]. - Verify important emails through official channels: For sensitive notifications, do not use links in emails but instead log in directly to official websites or call customer service for verification [8].
东兴证券晨报-20250917
Dongxing Securities· 2025-09-17 09:28
Core Insights - The report highlights the impact of price competition on the profitability of the company, with a significant decline in net profit in Q2 2025 compared to the previous year [6][7] - The company has adjusted its annual business volume guidance downwards due to a new economic and competitive landscape, indicating a focus on quality over quantity [6][9] - The report projects a gradual recovery in profitability in the second half of 2025 as the competitive environment stabilizes [8][9] Company Performance - In Q2 2025, the company achieved a business volume of 9.847 billion pieces, a year-on-year increase of 16.5%, but its market share decreased by 0.1 percentage points to 19.5% [6] - The adjusted net profit for Q2 2025 was 2.053 billion yuan, reflecting a year-on-year decline of 26.8% [6] - The average revenue per package decreased from 1.24 yuan to 1.18 yuan, primarily due to increased competitive pricing pressures [7][8] Cost Structure - The company's core cost per package increased by 8.6% year-on-year to 0.89 yuan, with transportation costs decreasing slightly while other costs rose significantly [7][8] - The report notes that the increase in costs is largely attributed to a higher proportion of key account (KA) customers, which also contributed to a slight increase in revenue per package [8] Future Outlook - The company expects a recovery in profitability in the second half of 2025 as it shifts its strategic focus to quality and adjusts its incentive structures [8][9] - Profit forecasts for 2025-2027 are projected at 8.85 billion, 10.22 billion, and 11.53 billion yuan, with corresponding price-to-earnings ratios of 13.0X, 11.2X, and 10.0X [9]
2025年国家网络安全宣传周鄂尔多斯市宣传活动成功举办
Nei Meng Gu Ri Bao· 2025-09-17 08:51
Group 1 - The event aimed to enhance public awareness and skills in cybersecurity, creating a safe and healthy online environment, in line with the "Grateful to the Party, Listen to the Party, Follow the Party" educational campaign [2] - The activity focused on the theme "Cybersecurity Service Delivery," utilizing an immersive market experience that included stage performances, interactive experiences, policy consultations, and legal education [4] - Various activities attracted a large number of participants, with interactive games and quizzes designed to engage the audience and teach them to recognize fraud methods [6] Group 2 - Participating units emphasized building a shared online spiritual home, using hands-on teaching, case studies, and video presentations to educate on common fraud types and prevention techniques [8] - A cybersecurity knowledge corridor was set up to display laws and guidelines, such as the Cybersecurity Law and Personal Information Protection Law, enhancing engagement and proactive learning among the rural population [9] - The event significantly improved the cybersecurity awareness and fraud prevention capabilities of the rural community, promoting a culture of collective responsibility for cybersecurity and integrating it with national unity and rural revitalization efforts [11]
AI鉴伪、黑飞无人机反制 网络安全博览会秀出数字保护利器
Zhong Guo Xin Wen Wang· 2025-09-17 08:46
Core Viewpoint - The article highlights the significance of the Cybersecurity Expo and related events in Kunming, showcasing advancements in digital security technologies and services, particularly by China Mobile, aimed at combating fraud and enhancing digital safety [1][2][3]. Group 1: Event Overview - The Cybersecurity Expo and International Promotion Conference for Cybersecurity Products and Services have made Kunming a focal point for the national cybersecurity industry [1]. - The event features various activities, including a technology summit, attracting significant public interest and participation [1]. Group 2: China Mobile's Innovations - China Mobile's "Xihua Guardian" offers three key functions: identification alerts, family protection, and insurance compensation, which have drawn considerable attention from visitors [1]. - The "Xihua Guardian" service has established a protective network for over 24 million users across the country, combining smart technology prevention with fraud insurance compensation [1]. Group 3: AI and Fraud Prevention - The "Xihua Anti-Fraud Digital Person" utilizes AI to interact with visitors, providing clear explanations of fraud-related processes and features such as one-click reporting and app risk detection [2]. - The AI system can quickly identify fraudulent apps installed on users' devices, enhancing the overall security framework [2]. Group 4: Low-altitude Security Measures - A low-altitude safety monitoring system demonstrated at the expo can autonomously detect and counteract unauthorized drones, showcasing advancements in airspace security [3]. - The "Hubble No. 1" 5G drone communication terminal allows for remote control via 5G networks, presenting new opportunities for emergency response [3]. Group 5: Addressing AI Risks - The industry faces challenges related to AI, including risks from large model dependencies, trust issues from model inaccuracies, and the need for comprehensive security evaluation systems [6]. - China Mobile's self-developed "Jiutian" model addresses these issues by implementing a dual identification mechanism to track AI-generated content and establishing a lifecycle security assessment platform [6]. - The company's AI technology can detect deepfake scams with over 95% accuracy in real-time, being integrated into various services like video calls and messaging [6].
财务凭证、各种证件被篡改有了“照妖镜”,AI图像鉴伪系统获奖
Yang Zi Wan Bao Wang· 2025-09-17 07:45
扬子晚报网讯(记者 徐晓风)伴随着AI等新技术的发展,网络安全已成为国家安全不可分割的一部分。近期,由中央宣传部、中央网信办、教育部、工 业和信息化部、公安部、中国人民银行、国家广播电视总局、全国总工会、共青团中央、全国妇联等十部门联合举办的2025年国家网络安全宣传周在云南 昆明举行。在活动现场举办的"中国网络安全创新创业大赛"上,"基于多模态一致性检验的图像智能鉴伪系统FidOK"从上百家参赛企业中脱颖而出,荣获 大赛奖项。 当前,AI加速了各行各业的发展,却也让文本、图像等信息的生成和篡改变得轻而易举。图像篡改手段层出不穷,鉴伪技术也需在迭代中跟上AI发展的 脚步。在图像安全领域,图像智能鉴伪系统创新性地提出了"多模态大语言模型方案",打造具备强泛化与鲁棒性、检测准确率高的鉴伪系统,分析图像的 视觉特征内容一致性,实现跨模态语义理解。为了提升系统"决策"的合理性,大模型还能够输出图像篡改检测判断依据,应对判别模型"黑箱"问题,实现 检测过程的透明可信。 真实的业务场景是检验技术实力的"考场"。据合合信息技术团队人员介绍,目前,基于AI图像模型和大量数据训练,TextIn通用篡改检测平台已落地应用 于银行 ...
以AI应对AI 应对网络攻击威胁更高效 | 2025年国家网络安全宣传周
Yang Shi Wang· 2025-09-17 07:15
Core Viewpoint - The rapid advancement of artificial intelligence (AI) technology is significantly enhancing the efficiency of cybersecurity measures against network attacks, necessitating discussions on AI risks, governance, and application safety [1]. Group 1: AI in Cybersecurity - AI is increasingly being integrated into various industries, including cybersecurity, to improve the response to network attacks [1]. - Traditional methods of handling network attacks relied heavily on human intervention, which was time-consuming and labor-intensive. The introduction of AI has streamlined this process by filtering alerts through different models [6]. - A mixed architecture of large and small models has been developed to filter alerts, achieving a noise reduction rate of over 98% for identifying genuine threats [7]. Group 2: Attack Types and Response - Large enterprises face a variety of network attack types, including web application attacks and more covert methods like trojan communications, which complicate defense efforts [3]. - AI models can assist in analyzing and tracing the origins of attacks, thereby accelerating the response time to network threats [5]. - After extracting attack information, analysis reports are generated and provided to law enforcement and relevant national departments for further action [9]. Group 3: Counteracting AI-Driven Attacks - There is a growing concern regarding the use of AI models by malicious actors to conduct network attacks, prompting the need for AI-driven defenses [11]. - AI can learn the characteristics of attacks initiated by large models, such as high frequency and fixed patterns, allowing for automated interception of these threats through trained models [13].