{"id":3795,"date":"2016-01-06T03:19:54","date_gmt":"2016-01-06T03:19:54","guid":{"rendered":"http:\/\/www.kaspersky.com.cn\/blog\/?p=3795"},"modified":"2017-09-24T19:01:44","modified_gmt":"2017-09-24T11:01:44","slug":"the-unconventional-list-of-top-security-events-in-2015","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/the-unconventional-list-of-top-security-events-in-2015\/3795\/","title":{"rendered":"2015\u5e74\u5341\u5927\u5b89\u5168\u4e8b\u4ef6\uff1a\u6253\u7834\u5e38\u89c4\u7684\u699c\u5355"},"content":{"rendered":"<p>\u6574\u4e2a2015\u5e74\u53d1\u751f\u7684\u4e92\u8054\u7f51\u5b89\u5168\u4e8b\u4ef6\u53ef\u8c13\u6570\u4e0d\u80dc\u6570\u3002\u8981\u4ece\u6240\u6709\u8fd9\u4e9b\u4e2d\u6311\u9009\u51fa10\u4e2a\u5f53\u5e74\u6700\u70ed\u95e8\u7684\u8bdd\u9898\u53ef\u4ee5\u8bf4\u662f\u4e00\u9879\u6781\u5176\u8270\u5de8\u7684\u4efb\u52a1\u3002\u4f46\u4e3a\u4e86\u4fdd\u6301\u5ba2\u89c2\u6027\uff0c\u6211\u51b3\u5b9a\u4eceThreatpost\u4e0a\u9009\u51fa10\u4e2a\u57282015\u5e74\u641c\u7d22\u6700\u591a\u7684\u5b89\u5168\u4e8b\u4ef6\u3002\u5f53\u7136\u4e86\uff0c\u5728IT\u6216\u5b89\u5168\u884c\u4e1a\u4e2d\u7684\u6bcf\u4e00\u540d\u4ece\u4e1a\u8005\u5fc3\u76ee\u4e2d\uff0c\u6709\u7740\u5c5e\u4e8e\u81ea\u5df1\u7684\u4e00\u4efd\u699c\u5355\uff0c\u800c\u6211\u53ea\u80fd\u5c3d\u529b\u4fdd\u6301\u516c\u5e73\u6027\u2013\u6240\u6709\u4e0a\u699c\u4e8b\u4ef6\u5747\u662f\u7531\u5e7f\u5927\u8bfb\u8005\u800c\u4e0d\u662f\u6211\u8bc4\u9009\u51fa\u7684\u3002\u7167\u65e7\u5982\u679c\u4f60\u5bf9\u699c\u5355\u6709\u5f02\u8bae\u6216\u8ba4\u4e3a\u8fd8\u6709\u54ea\u4e9b\u4e8b\u4ef6\u5e94\u8be5\u5165\u56f4\u7684\u8bdd\uff0c\u8bf7\u5728\u4e0b\u9762\u7684\u8bc4\u8bba\u680f\u7559\u4e0b\u60a8\u5b9d\u8d35\u7684\u610f\u89c1\u3002\u95f2\u8bdd\u5c11\u8bf4\uff0c\u4e0b\u9762\u5c31\u5f00\u59cb\u9010\u4e00\u63ed\u66532015\u5e74\u5341\u5927\u5b89\u5168\u4e8b\u4ef6\u699c\u5355\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Kaspersky Lab cybersecurity <a href=\"https:\/\/twitter.com\/hashtag\/predictions?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#predictions<\/a> for 2016 \u2013 <a href=\"https:\/\/t.co\/1JFA8qRBm9\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/1JFA8qRBm9<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/KL2016Prediction?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KL2016Prediction<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/netsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#netsec<\/a> <a href=\"https:\/\/t.co\/LjGxVMG7xV\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LjGxVMG7xV<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/674628086281994240?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 9, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u4eca\u5e74\u5165\u56f4\u699c\u5355\u7684\u5b89\u5168\u4e8b\u4ef6\u603b\u5171\u5206\u4e3a\u4e94\u5927\u7c7b\uff1a<\/p>\n<ul>\n<li>\u5e76\u4e0d\u5f15\u4eba\u6ce8\u76ee\u5374\u9488\u5bf9\u7ec8\u7aef\u7528\u6237\u7684\u5a01\u80c1\uff1b<\/li>\n<li>\u2018\u6700\u51fa\u4e4e\u610f\u6599\u7684\u2019\u6f0f\u6d1e\uff1a\u7269\u8054\u7f51\u3001\u5bb6\u7528\u7535\u5668\u548c\u5de5\u4e1a\u7f51\u7edc\u8bbe\u5907\u5b89\u5168\uff1b<\/li>\n<li>\u52a0\u5bc6\u95ee\u9898\uff1b<\/li>\n<li>\u5728\u4e3b\u8981\u5e73\u53f0\u5b58\u5728\u7684\u4f17\u6240\u5468\u77e5\u7684\u6f0f\u6d1e\u548c\u9ad8\u7aef\u7f51\u7edc\u5a01\u80c1\uff0c\u4ee5\u53ca\u6700\u9ad8\u7ea7\u7f51\u7edc\u653b\u51fb\u7684\u6848\u4f8b\uff1b<\/li>\n<li>\u5728\u5546\u4e1a\u8f6f\u4ef6\u5185\u5b58\u5728\u7684\u5e38\u89c1\u5371\u9669bug<\/li>\n<\/ul>\n<p><strong>\u4e0b\u9762\u5c31\u6b63\u5f0f\u5f00\u59cb\uff01<\/strong> <strong>\u7ec8\u7aef\u7528\u6237\u5a01\u80c1<\/strong><\/p>\n<p>\u7b2c10\u540d\uff1aFacebook\u5185\u5b58\u5728\u6728\u9a6c\u75c5\u6bd2\uff0c\u8fd9\u65e9\u57281\u6708\u4efd\u5c31\u5df2\u88ab\u53d1\u73b0\uff08<a href=\"https:\/\/threatpost.com\/facebook-malware-poses-as-flash-update-infects-110k-users\/110775\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u3002\u8d85\u8fc711\u4e07\u540dFacebook\u7528\u6237\u7684\u8bbe\u5907\u4e0a\u611f\u67d3\u4e86\u8fd9\u4e00\u6728\u9a6c\u75c5\u6bd2\uff0c\u53ea\u662f\u56e0\u4e3a\u5728\u793e\u4ea4\u7f51\u7ad9\u4e0a\u70b9\u51fb\u4e86\u6076\u610f\u94fe\u63a5\uff01\u54e6\u4e0d\uff01<\/p>\n<div class=\"pullquote\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2016\/01\/06151259\/se-2.gif\" alt=\"\" width=\"245\" height=\"150\"><\/div>\n<p>\u4e0d\u5e78\u7684\u662f\uff0c\u5927\u591a\u6570\u4e92\u8054\u7f51\u7528\u6237\u5f80\u5f80\u6210\u4e3a\u4e86\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4e0e\u5404\u56fd\u5b89\u5168\u673a\u6784\u548c\u516c\u53f8\u4e4b\u95f4\u2019\u7f51\u7edc\u6218\u4e89\u2019\u7684\u727a\u7272\u54c1\u3002\u4f8b\u5982\uff0c\u6709\u4e00\u79cd\u6728\u9a6c\u75c5\u6bd2\u5c06\u81ea\u8eab\u5de7\u5999\u88c5\u626e\u6210Adobe Flash\u66f4\u65b0\u7a0b\u5e8f\uff0c\u6210\u529f\u5728\u53d7\u5bb3\u4eba\u8ba1\u7b97\u673a\u4e0a\u5b89\u88c5\u952e\u76d8\u8bb0\u5f55\u5668\u3002\u5c3d\u7ba1\u6211\u4eec\u4e0d\u65ad\u5728\u8ffd\u8e2a\u6b64\u7c7b\u5b89\u5168\u4e8b\u4ef6\uff0c\u4f46\u5374\u9c9c\u6709\u5165\u56f4\u5b89\u5168\u884c\u4e1a\u4e1a\u5185\u5404\u9879\u699c\u5355\uff0c\u539f\u56e0\u5728\u4e8e\u5b89\u5168\u4e13\u5bb6\u5bf9\u8fd9\u4e9b\u2019\u5c0f\u95ee\u9898\u2019\u65e9\u5df2\u89c1\u602a\u4e0d\u602a\u4e86\u3002 \u4e0d\u5e78\u7684\u662f\uff0c\u5927\u591a\u6570\u4e92\u8054\u7f51\u7528\u6237\u5f80\u5f80\u6210\u4e3a\u4e86\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u4e0e\u5404\u56fd\u5b89\u5168\u673a\u6784\u548c\u516c\u53f8\u4e4b\u95f4\u2019\u7f51\u7edc\u6218\u4e89\u2019\u7684\u727a\u7272\u54c1\u3002\u4f8b\u5982\uff0c\u6709\u4e00\u79cd\u6728\u9a6c\u75c5\u6bd2\u5c06\u81ea\u8eab\u5de7\u5999\u88c5\u626e\u6210Adobe Flash\u66f4\u65b0\u7a0b\u5e8f\uff0c\u6210\u529f\u5728\u53d7\u5bb3\u4eba\u8ba1\u7b97\u673a\u4e0a\u5b89\u88c5\u952e\u76d8\u8bb0\u5f55\u5668\u3002\u5c3d\u7ba1\u6211\u4eec\u4e0d\u65ad\u5728\u8ffd\u8e2a\u6b64\u7c7b\u5b89\u5168\u4e8b\u4ef6\uff0c\u4f46\u5374\u9c9c\u6709\u5165\u56f4\u5b89\u5168\u884c\u4e1a\u4e1a\u5185\u5404\u9879\u699c\u5355\uff0c\u539f\u56e0\u5728\u4e8e\u5b89\u5168\u4e13\u5bb6\u5bf9\u8fd9\u4e9b\u2019\u5c0f\u95ee\u9898\u2019\u65e9\u5df2\u89c1\u602a\u4e0d\u602a\u4e86\u3002<\/p>\n<p><strong>\u9488\u5bf9\u7269\u8054\u7f51\u3001\u5bb6\u5ead\u8def\u7531\u5668\u548c\u5de5\u4e1a\u8054\u7f51\u8bbe\u5907\u7684\u653b\u51fb<\/strong><\/p>\n<p>\u8f66\u5e93\u95e8\u8fdc\u7a0b\u63a7\u5236\u5668\u548cCisco\u8054\u7f51\u8f6f\u4ef6\u4e4b\u95f4\u5230\u5e95\u6709\u4f55\u5171\u540c\u4e4b\u5904\uff1f\u7b54\u6848\u662f\uff1a\u5b89\u5168\u4fdd\u62a4\u80fd\u529b\u4e00\u6837\u8584\u5f31\u3002 \u5c3d\u7ba1\u7528\u6237\u548c\u751f\u4ea7\u5546\u5bf9\u4f20\u7edf\u8ba1\u7b97\u673a\u548c\u8bbe\u5907\u7684\u5b89\u5168\u4fdd\u62a4\u6108\u52a0\u91cd\u89c6\uff0c\u4f46\u5bf9\u8054\u7f51\u201d\u667a\u80fd\u201d\u8bbe\u5907\u7684\u5b89\u5168\u4fdd\u62a4\u5374\u5f80\u5f80\u719f\u89c6\u65e0\u7779\u3002\u4eba\u4eec\u5e38\u5e38\u4f1a\u5fd8\u4e86\u8fd9\u4e9b\u667a\u80fd\u8bbe\u5907\u540c\u6837\u4e5f\u662f\u529f\u80fd\u5f3a\u5927\u7684\u8ba1\u7b97\u673a\uff0c\u4f46\u7531\u4e8e\u7f3a\u5c11\u8db3\u591f\u7684\u5b89\u5168\u4fdd\u62a4\u63aa\u65bd\uff0c\u5f88\u5bb9\u6613\u88ab\u9ed1\u5ba2\u653b\u7834\u751a\u81f3\u5bfc\u81f4\u66f4\u4e25\u91cd\u7684\u540e\u679c\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How will the Internet of Things affect cybersecurity? \u2013 <a href=\"http:\/\/t.co\/fWScmf4QfQ\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/fWScmf4QfQ<\/a> <a href=\"http:\/\/t.co\/sAk1mcZPg5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sAk1mcZPg5<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/586174972156108800?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 9, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u5728\u9488\u5bf9\u6b64\u7c7b\u578b\u8bbe\u5907\u7684\u7f51\u7edc\u653b\u51fb\u65b9\u9762\uff0cThreatpost\u7f51\u7ad9\u4e0a\u62a5\u9053\u4e86\u4e0d\u5c11\u6709\u5173\u7684\u7cbe\u5f69\u65b0\u95fb\u3002<\/p>\n<p>\u7b2c9\u540d\uff0c\u65e9\u57282014\u5e74\uff0cCheck Point\u7684\u5b89\u5168\u7814\u7a76\u4e13\u5bb6\u5c31\u53d1\u73b0\u4e86\u5f71\u54cd1200\u4e07\u53f0\u5bb6\u5ead\u8def\u7531\u5668\u7684\u6f0f\u6d1e\uff08<a href=\"https:\/\/threatpost.com\/12-million-home-routers-vulnerable-to-takeover\/109970\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u3002\u901a\u8fc7\u4e00\u4e2a\u7cbe\u5fc3\u7f16\u5199\u7684\u6570\u636e\u5305\u5c31\u80fd\u627e\u51fa\u8def\u7531\u5668\u7684\u7f51\u9875\u754c\u9762\u3002<\/p>\n<p>\u7b2c8\u540d\uff0c\u4e4b\u540e\u5230\u4e862015\u5e746\u6708\uff0c\u5728Cisco\u7684\u5b89\u5168\u8bbe\u5907\u5185\u53d1\u73b0\u4e86\u786c\u7f16\u7801\u7684\u9ed8\u8ba4SSH\u79d8\u94a5\uff08<a href=\"https:\/\/threatpost.com\/default-ssh-key-found-in-many-cisco-security-appliances\/113480\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u3002\u5728\u7f51\u7edc\u5bb6\u7535\u548c\u8f6f\u4ef6\u5185\u53d1\u73b0\u8fd9\u7c7bbug\u7684\u6848\u4f8b\u53ef\u8c13\u679a\u4e0d\u80dc\u4e3e\uff0c\u800c\u8fd9\u53ea\u662f\u5176\u4e2d\u4e00\u4e2a\u800c\u5df2\u3002<\/p>\n<p>\u7b2c7\u540d\uff0c\u540c\u4e00\u65f6\u95f4\uff0c\u77e5\u540d\u5b89\u5168\u7814\u7a76\u4e13\u5bb6Samy Kamkar\u53d1\u73b0\u8fdc\u7a0b\u8f66\u5e93\u95e8\u63a7\u5236\u5668\uff08\u5728\u82f1\u56fd\u5341\u5206\u5e38\u7528\uff09\u7684\u5b89\u5168\u4fdd\u62a4\u80fd\u529b\u76f8\u5f53\u8584\u5f31\uff08<a href=\"https:\/\/threatpost.com\/using-a-toy-to-open-a-fixed-code-garage-door-in-10-seconds\/113146\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u3002\u4ed6\u53ea\u82b1\u4e8630\u5206\u949f\u65f6\u95f4\u5c31\u6210\u529f\u66b4\u529b\u7834\u89e3\u5bc6\u94a5\uff0c\u800c\u8f6f\u4ef6\u5185\u7684\u4e00\u7cfb\u5217bug\u4f7f\u5f97Kamkar\u53ea\u9700\u77ed\u77ed\u768410\u79d2\u5c31\u80fd\u6210\u529f\u7834\u89e3\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Using a Toy to Open a Fixed-Code Garage Door in 10 Seconds \u2013 <a href=\"http:\/\/t.co\/NvNR1vhOnG\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/NvNR1vhOnG<\/a><\/p>\n<p>\u2014 Threatpost (@threatpost) <a href=\"https:\/\/twitter.com\/threatpost\/status\/606473243051106304?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 4, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u81f3\u5c11\u6211\u4eec\u8fd8\u672a\u9057\u5fd8\u5b58\u5728\u4e8e\u6c7d\u8f66\u7cfb\u7edf\u5185\u7684\u4e25\u91cd\u6f0f\u6d1e\u3002\u4eca\u5e74\u590f\u5929\uff0c\u4f34\u968f\u7740Charlie Miller\u548cChris Valasek\u7684\u7a81\u7834\u6027\u7814\u7a76\uff0c\u83f2\u4e9a\u7279-\u514b\u83b1\u65af\u52d2\u53d1\u5e03\u4e86\u6709\u53f2\u4ee5\u6765\u7b2c\u4e00\u4e2a\u9488\u5bf9\u6c7d\u8f66\u7684\u5b89\u5168\u8865\u4e01\uff1a\u8be5\u6f0f\u6d1e<a href=\"https:\/\/threatpost.com\/car-hacking-gets-the-attention-of-detroit-and-washington\/113878\/\" target=\"_blank\" rel=\"noopener nofollow\">\u80fd\u901a\u8fc7<\/a>\u591a\u5a92\u4f53\u4eea\u8868\u76d8\u88ab\u7528\u6765\u8fdc\u7a0b\u9ed1\u5ba2\u5165\u4fb5\u6c7d\u8f66\u7ba1\u7406\u7cfb\u7edf\uff0c\u6700\u7ec8\u751a\u81f3\u8f66\u5185\u8f6c\u5411\u7cfb\u7edf\u4e5f\u53ef\u80fd\u906d\u52ab\u6301\u3002\u8bf4\u5b9e\u5728\u7684\uff0c\u65e2\u7136\u8f6f\u4ef6\u548c\u8ba1\u7b97\u673a\u8bbe\u5907\u5b58\u5728\u5982\u6b64\u4f17\u591a\u7684bug\uff0c\u6c7d\u8f66\u600e\u53ef\u80fd\u5e78\u514d\u5462\uff1f\u5728\u8fd9\u91cc\u6211\u4e0d\u5f97\u4e0d\u5f15\u7528\u63a8\u7279\u4e0a\u4e00\u6bb5\u8457\u540d\u7684\u8bdd\uff08\u73b0\u88ab\u5220\u9664\uff09\uff1a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2016\/01\/06151258\/security-year-tweet.png\" alt=\"\" width=\"892\" height=\"516\"><\/p>\n<p>\u5728\u4f7f\u7528\u8ba1\u7b97\u673a\u5b8c\u6210\u5404\u79cd\u5de5\u4f5c\u65f6\uff0c\u8ba1\u7b97\u673a\u51e0\u4e4e\u4ece\u4e0d\u72af\u9519\u4e5f\u4e0d\u4f1a\u7ed9\u4eba\u7c7b\u5e73\u6dfb\u70e6\u607c\u3002\u4f46\u6bd5\u7adf\u7f16\u5199\u8ba1\u7b97\u673a\u7a0b\u5e8f\u7684\u662f\u4eba\uff0c\u4eba\u90fd\u96be\u514d\u4f1a\u72af\u9519\u8bef\uff0c\u540c\u65f6\u6267\u884c\u8bb8\u591a\u5173\u952e\u4efb\u52a1\u5fc5\u987b\u8981\u7528\u5230\u8ba1\u7b97\u673a\u7cfb\u7edf\uff0c\u4ece\u6838\u7535\u7ad9\u7ba1\u7406\u5230\u57ce\u5e02\u4ea4\u901a\u63a7\u5236\u51e0\u4e4e\u65e0\u6240\u4e0d\u5305\u3002\u8bf7\u6b22\u8fce\u6765\u5230\u52c7\u6562\u65b0\u4e16\u754c\uff01<\/p>\n<p><strong>\u52a0\u5bc6<\/strong> \u6beb\u65e0\u7591\u95ee\uff0c\u52a0\u5bc6\u65b9\u6cd5\u771f\u6b63\u53d8\u5f97\u8d8a\u6765\u8d8a\u590d\u6742\u3002\u76ee\u524d\uff0c\u53ea\u6709\u771f\u6b63\u7684\u79d1\u5b66\u7814\u7a76\u4e13\u5bb6\u624d\u6709\u80fd\u529b\u5bf9\u5404\u79cd\u52a0\u5bc6\u65b9\u6cd5\u7684\u6548\u7387\u8fdb\u884c\u8bc4\u4f30\u3002\u6709\u4e2a\u5f88\u597d\u7684\u4f8b\u5b50\u80fd\u8bc1\u660e\u8fd9\u4e00\u70b9\uff1a\u4e00\u79cd\u6d41\u884c\u7684\u6563\u5217\u7b97\u6cd5SHA-1\u57285\u5e74\u524d\u4f9d\u7136\u88ab\u8ba4\u4e3a\u6781\u5ea6\u53ef\u9760\uff0c\u4f462015\u5e74\u5374<a href=\"https:\/\/threatpost.com\/practical-sha-1-collision-months-not-years-away\/114979\/\" target=\"_blank\" rel=\"noopener nofollow\">\u88ab\u53d1\u73b0<\/a>\u53ef\u80fd\u5b58\u5728\u7406\u8bba\u4e0a\u7684\u6f0f\u6d1e\u3002 NSA\uff08\u7f8e\u56fd\u56fd\u5bb6\u5b89\u5168\u5c40\uff09\u5df2\u5bf9\u692d\u5706\u66f2\u7ebf\u52a0\u5bc6\u7b97\u6cd5\u5f39\u6027\u4ea7\u751f\u4e86\u8d28\u7591\uff0c\u5e76\u6b63\u5728<a href=\"https:\/\/threatpost.com\/nsas-divorce-from-ecc-causing-crypto-hand-wringing\/115150\/\" target=\"_blank\" rel=\"noopener nofollow\">\u8003\u8651<\/a>\uff08\u6216\u8bbe\u60f3\uff09\u65b0\u7684\u52a0\u5bc6\u6280\u672f\uff0c\u5373\u4fbf\u7528\u91cf\u5b50\u8ba1\u7b97\u673a\u4e5f\u65e0\u6cd5\u7834\u89e3\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Quantum computers: what does it mean for you today? <a href=\"https:\/\/t.co\/E3Fwee3j2W\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/E3Fwee3j2W<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/futuretech?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#futuretech<\/a> <a href=\"https:\/\/t.co\/mBSnlpoVtV\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mBSnlpoVtV<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/674253247528501248?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 8, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u7b2c6\u540d\uff0c\u8fd9\u5e76\u975e\u662f\u52a0\u5bc6\u5b58\u5728\u7684\u552f\u4e00\u95ee\u9898\u3002\u8584\u5f31\u7684\u52a0\u5bc6\u4f1a\u5bf9\u516c\u5f00\u667a\u80fd\u7f51\u683c\u534f\u8bae\u9020\u6210\u4e25\u91cd\u5a01\u80c1\uff08<a href=\"https:\/\/threatpost.com\/weak-homegrown-crypto-dooms-open-smart-grid-protocol\/112680\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u3002OSGP\uff08\u5f00\u653e\u5f0f\u667a\u80fd\u7535\u7f51\u534f\u8bae\uff09\u662f\u4e00\u79cd\u90e8\u7f72\u4e86\u7269\u8054\u7f51\u7684\u7535\u7f51\uff0c\u76ee\u7684\u662f\u60f3\u5c06\u6240\u6709\u4eea\u8868\u548c\u7ba1\u7406\u7cfb\u7edf\u6574\u5408\u5230\u5355\u4e2a\u7f51\u7edc\u5185\u3002\u8fd9\u610f\u5473\u7740\uff0c\u6f5c\u5728\u7684\u5b89\u5168\u95ee\u9898\u53ef\u80fd\u4f1a\u5bf9\u4f9b\u7535\u9020\u6210\u5371\u5bb3\u3002\u7f51\u7edc\u7684\u590d\u6742\u6027\u4f7f\u5f97\u8bc4\u4f30\u52a0\u5bc6\u5f39\u6027\u7684\u5173\u952e\u6807\u51c6\u6210\u4e3a\u4e86\u2019\u4fe1\u4efb\u2019\u3002 \u57282014\u5e74\uff0cTrueCrypt\u5f00\u53d1\u8005\u4eec\u51b3\u5b9a\u505c\u6b62\u4ed6\u4eec\u6b63\u5728\u5f00\u53d1\u7684\u9879\u76ee-\u4e00\u6b3e\u6d41\u884c\u7684\u52a8\u6001\u52a0\u5bc6\u5b9e\u7528\u5de5\u5177\u3002<\/p>\n<p>\u7b2c4\u540d\uff0c\u6211\u4eec\u5148\u540e\u89c1\u8bc1\u4e86\u591a\u4e2a\u72ec\u7acb\u6e90\u4ee3\u7801\u5ba1\u6838\u53ca\u4ee4\u4eba\u597d\u5947\u7684TrueCrypt\u5206\u652f\uff1aVeraCrypt\u548cCipherShed\uff08\u65b0\u95fb\u6545\u4e8b\uff09\u3002\u6700\u8fd1Junipe\u8def\u7531\u5668<a href=\"https:\/\/threatpost.com\/juniper-finds-backdoor-that-decrypts-vpn-traffic\/115663\/\" target=\"_blank\" rel=\"noopener nofollow\">\u88ab\u53d1\u73b0<\/a>\u5b58\u5728\u540e\u95e8\uff0c\u6b64\u6b21\u5b89\u5168\u4e8b\u4ef6\u4e2d\u52a0\u5bc6\u95ee\u9898\u4f9d\u7136\u662f\u91cd\u4e2d\u4e4b\u91cd\u3002<\/p>\n<p><strong>\u4e25\u91cd\u7684\u6f0f\u6d1e\u548c\u7f51\u7edc\u653b\u51fb<\/strong><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">1 Billion <a href=\"https:\/\/twitter.com\/hashtag\/Android?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Android<\/a> devices vulnerable to <a href=\"https:\/\/twitter.com\/hashtag\/NEW?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#NEW<\/a> Stagefright flaws\u2026 <a href=\"https:\/\/twitter.com\/hashtag\/nopatches?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#nopatches<\/a> <a href=\"https:\/\/t.co\/1Wt8iqOY2b\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/1Wt8iqOY2b<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"http:\/\/t.co\/LJUuODPDra\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/LJUuODPDra<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/649575239999950848?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 1, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>\u7b2c5\u540d\uff0c\u5c3d\u7ba1\u53bb\u5e74\u6700\u4e25\u91cd\u7684\u6f0f\u6d1e\u975e<a href=\"https:\/\/threatpost.com\/major-bash-vulnerability-affects-linux-unix-mac-os-x\/108521\/\" target=\"_blank\" rel=\"noopener nofollow\">Shellshock<\/a>\u548c<a href=\"https:\/\/threatpost.com\/openssl-fixes-tls-vulnerability\/105300\/\" target=\"_blank\" rel=\"noopener nofollow\">Heartbleed<\/a>\u83ab\u5c5e\uff0c\u800c\u4eca\u5e74\u5b89\u5353\u7cfb\u7edf\u5185\u53d1\u73b0\u7684Stagefright\u6f0f\u6d1e\uff08<a href=\"https:\/\/threatpost.com\/android-stagefright-flaws-put-950-million-devices-at-risk\/113960\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u548c\uff08\u7b2c3\u540d\uff09Linux\u7cfb\u7edf\u6807\u51c6GLIBC\u5e93\u51fd\u6570\u5185\u7684bug\uff08<a href=\"https:\/\/threatpost.com\/ghost-glibc-remote-code-execution-vulnerability-affects-all-linux-systems\/110679\/\" target=\"_blank\" rel=\"noopener nofollow\">\u65b0\u95fb\u6545\u4e8b<\/a>\uff09\u5219\u6210\u4e3a\u4eca\u5e74\u7684\u2019\u6700\u5927\u8d62\u5bb6\u2019\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2016\/01\/06151256\/security-year-2015-2.jpg\" alt=\"\" width=\"1280\" height=\"853\"><\/p>\n<p>Linux\u64cd\u4f5c\u7cfb\u7edfbug\u641c\u5bfb\u5668\u3002\u6781\u5177\u827a\u672f\u6027\u7684\u8be0\u91ca \u6bcf\u4e00\u79cd\u5df2\u77e5\u6f0f\u6d1e\u7684\u53d1\u73b0\u65e0\u5916\u4e4e\u662f\u5728\u5b9e\u9645\u5e94\u7528\u4e2d\u627e\u51fa\uff0c\u6216\u901a\u8fc7\u2019\u7406\u8bba\u2019\u63a8\u7b97\u800c\u5f97\u3002\u6709\u4e9b\u60c5\u51b5\u4e0b\uff0c\u7814\u7a76\u4eba\u5458\u4f1a\u9996\u5148\u8fdb\u884c\u6982\u5ff5\u9a8c\u8bc1\u653b\u51fb\uff0c\u4f46\u6709\u65f6\u53ea\u6709\u5728\u4e92\u8054\u7f51\u4e0a\u906d\u53d7\u653b\u51fb\u540e\u624d\u4f1a\u53d1\u73b0\u65b0\u7684bug\u3002 \u5c31\u5b9e\u9645\u7f51\u7edc\u653b\u51fb\u800c\u8a00\uff0c\u5361\u5df4\u65af\u57fa\u5b9e\u9a8c\u5ba4\u53d1\u73b0\u4e86\u4e24\u4e2a\u91cd\u5927\u7f51\u7edc\u653b\u51fb\u6d3b\u52a8\uff0c\u5b83\u4eec\u5206\u522b\u662f\uff1a<a href=\"https:\/\/threatpost.com\/carbanak-ring-steals-1-billion-from-banks\/111054\/\" target=\"_blank\" rel=\"noopener nofollow\">Carbanak<\/a>\u548c<a href=\"https:\/\/securelist.com\/blog\/research\/68750\/equation-the-death-star-of-malware-galaxy\/\" target=\"_blank\" rel=\"noopener\">The Equation<\/a>\u3002\u5c3d\u7ba1\u524d\u8005\u5728\u6301\u7eed\u635f\u5931\u65b9\u9762\uff08\u544a\u8bc9\u4f60\u603b\u5171\u8fbe\u523010\u4ebf\u7f8e\u5143\uff09\u4ee4\u4eba\u5370\u8c61\u6df1\u523b\uff0c\u4f46\u540e\u8005\u56e0\u91c7\u7528\u4e86\u5404\u79cd\u9ad8\u7ea7\u548c\u590d\u6742\u7684\u5de5\u5177\u4e5f\u540c\u6837\u8ba9\u4eba\u5927\u611f\u9707\u60ca\uff0c\u8fd9\u4e9b\u5de5\u5177\u5305\u62ec\uff1a\u901a\u8fc7\u4f7f\u7528\u4fee\u6539\u540e\u7684HDD\u56fa\u4ef6\u6062\u590d\u5bf9\u53d7\u5bb3\u4ebaPC\u7535\u8111\u63a7\u5236\u80fd\u529b\u7684\u65b9\u6cd5\uff0c\u4e14\u653b\u51fb\u7684\u65f6\u95f4\u8de8\u5ea6-\u957f\u8fbe\u6570\u5341\u5e74\u4e4b\u4e45\u3002<\/p>\n<p><strong>\u5546\u4e1a\u8f6f\u4ef6\u4e2d\u7684\u5e38\u89c1\u6f0f\u6d1e<\/strong><\/p>\n<p>Adobe Flash\u662f\u8fd9\u4e00\u7c7b\u578b\u8f6f\u4ef6\u7684\u6700\u597d\u8bf4\u660e\uff1a1\u6708<a href=\"https:\/\/threatpost.com\/adobe-patches-nine-vulnerabilities-in-flash\/110386\/\" target=\"_blank\" rel=\"noopener nofollow\">14\u65e5<\/a>\u3001<a href=\"https:\/\/threatpost.com\/adobe-begins-auto-update-patching-of-second-flash-player-zero-day\/110640\/\" target=\"_blank\" rel=\"noopener nofollow\">24\u65e5<\/a>\u548c<a href=\"https:\/\/threatpost.com\/adobe-begins-auto-update-patching-of-second-flash-player-zero-day\/110640\/\" target=\"_blank\" rel=\"noopener nofollow\">28\u65e5<\/a>\uff0c<a href=\"https:\/\/threatpost.com\/adobe-patches-11-critical-vulnerabilities-in-flash-player\/111619\/\" target=\"_blank\" rel=\"noopener nofollow\">3\u6708<\/a>\u3001<a href=\"https:\/\/threatpost.com\/emergency-adobe-flash-patch-fixes-zero-day-under-attack\/113434\/\" target=\"_blank\" rel=\"noopener nofollow\">6\u6708<\/a>\u3001<a href=\"https:\/\/threatpost.com\/adobe-to-patch-hacking-team-zero-day-in-flash\/113658\/\" target=\"_blank\" rel=\"noopener nofollow\">7\u6708<\/a>\u3001<a href=\"https:\/\/threatpost.com\/adobe-patches-23-critical-vulnerabilities-in-flash-player\/114740\/\" target=\"_blank\" rel=\"noopener nofollow\">9\u6708<\/a>\u548c<a href=\"https:\/\/threatpost.com\/massive-adobe-flash-update-patches-79-vulnerabilities\/115598\/\" target=\"_blank\" rel=\"noopener nofollow\">12\u6708<\/a>\u3002\u574f\u6d88\u606f\u662fAdobe Flash\u8f6f\u4ef6\u4ecd\u7136\u5b58\u5728\u6f0f\u6d1e\uff0c\u5c3d\u7ba1\u8fd9\u6709\u4e9b\u8ba9\u4eba\u96be\u4ee5\u7f6e\u4fe1\u3002\u597d\u6d88\u606f\u662fAdobe Flash\u8f6f\u4ef6\u5f00\u53d1\u5546\u53d1\u5e03\u4e86\u5927\u91cf\u5b89\u5168\u8865\u4e01\uff08\u81f3\u5c11\u662f\u9488\u5bf9Adobe\u7684\uff09\uff0c\u4f7f\u5f97\u539f\u5148\u4f17\u591abug\u5728\u7ecf\u8fc7\u6b64\u6b21\u66f4\u65b0\u540e\u5168\u90e8\u5f97\u5230\u4fee\u590d\u3002\u5c3d\u7ba1\u8fd9\u5e76\u4e0d\u610f\u5473\u8f6f\u4ef6\u5df2\u53d8\u5f97\u66f4\u5b89\u5168\uff0c\u4f46\u81f3\u5c11\u8fd9\u4e00\u5e74\u7684\u6574\u4f53\u8d8b\u52bf\u662f\u79ef\u6781\u5411\u4e0a\uff1aAdobe Flash\u8f6f\u4ef6\u5f00\u53d1\u8005\u4eec\u5df2\u5f00\u59cb\u8ba4\u771f\u5bf9\u5f85\u5b89\u5168\u95ee\u9898\u3002<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Massive <a href=\"https:\/\/twitter.com\/hashtag\/Adobe?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Adobe<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Flash?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Flash<\/a> Update Patches 79 <a href=\"https:\/\/twitter.com\/hashtag\/Vulnerabilities?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Vulnerabilities<\/a>: <a href=\"https:\/\/t.co\/oU8R0QSm1l\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/oU8R0QSm1l<\/a> <a href=\"https:\/\/t.co\/2iLqfcKWpJ\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/2iLqfcKWpJ<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/674315442845036544?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 8, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Adobe Flash\u8f6f\u4ef6\u53ef\u5b89\u88c5\u5728\u5305\u62ec\u7f51\u9875\u6d4f\u89c8\u5668\u5728\u5185\u7684\u4f17\u591a\u7cfb\u7edf\u4e2d\uff0c\u56e0\u6b64\u4e5f\u5f97\u5230\u4e86\u5e7f\u6cdb\u7684\u5173\u6ce8\u3002\u800c\u6d4f\u89c8\u5668\u5f00\u53d1\u8005\u5219\u88ab\u8feb\u4e00\u8fb9\u76d1\u7763\u81ea\u5df1\u8f6f\u4ef6\u7684\u8fd0\u884c\u72b6\u51b5\uff0c\u540c\u65f6\u8fd8\u8981\u4fdd\u62a4\u7528\u6237\u514d\u906d\u7f51\u7ad9\u7684\u5a01\u80c1\uff08\u6709\u65f6\u53ea\u80fd\u9650\u5236\u67d0\u4e9b\u7279\u5b9a\u529f\u80fd\uff0c\u5c31\u6bd4\u5982<a href=\"https:\/\/nakedsecurity.sophos.com\/2015\/08\/31\/google-chrome-will-block-flash-from-tomorrow-well-sort-of\/\" target=\"_blank\" rel=\"noopener nofollow\">Chrome\u6d4f\u89c8\u5668\u5185Flash\u63d2\u4ef6<\/a>\u7684\u95ee\u9898\uff09\u3002<\/p>\n<p>\u7b2c2\u540d\uff0c\u53c2\u52a03\u6708\u4efd\u4e3e\u529e\u7684pwn2own\u9ed1\u5ba2\u9a6c\u62c9\u677e\u6bd4\u8d5b\u7684\u53c2\u8d5b\u8005\u4eec\u88ab\u8981\u6c42\u9ed1\u5ba2\u5165\u4fb5\u76ee\u524d\u6240\u6709\u4e3b\u6d41\u6d4f\u89c8\u5668\uff1a\u9996\u5148\u662f\u706b\u72d0\u548cIE\u6d4f\u89c8\u5668\uff0c\u7136\u540e\u518d\u662f<a href=\"https:\/\/threatpost.com\/all-major-browsers-fall-at-pwn2own-day-2\/111731\/\" target=\"_blank\" rel=\"noopener nofollow\">Chrome\u548cSafari<\/a>\uff08\u65b0\u95fb\u6545\u4e8b\uff09\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2016\/01\/06151256\/se-5.jpg\" alt=\"\" width=\"680\" height=\"400\"><\/p>\n<p>\u5728\u2019pwn2own\u2019\u9ed1\u5ba2\u5927\u8d5b\u4e0a\u6210\u529f\u9ed1\u5ba2\u5165\u8bf7\u6d4f\u89c8\u5668\u540e\u7684\u2019\u767d\u5e3d\u2019\u9ed1\u5ba2\u4eec<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"in\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Google<\/a> Shuts Off NPAPI in <a href=\"https:\/\/twitter.com\/hashtag\/Chrome?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Chrome<\/a> \u2013 <a href=\"https:\/\/t.co\/Ii6aVP6cvu\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Ii6aVP6cvu<\/a><\/p>\n<p>\u2014 Threatpost (@threatpost) <a href=\"https:\/\/twitter.com\/threatpost\/status\/588725744014073856?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 16, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/threatpost.com\/google-shuts-off-npapi-in-chrome\/112295\/\" target=\"_blank\" rel=\"noopener nofollow\">\u7b2c1\u540d\uff0c\u65e9\u5df2\u8fc7\u65f6\u7684NPAPI\u6269\u5c55\u5728Chrome\u6d4f\u89c8\u5668\u4e2d\u906d\u7981\u7528\uff08<\/a>\u65b0\u95fb\u6545\u4e8b\uff09\u3002NPAPI\u57284\u6708\u4efd\u88ab\u7981\u7528\uff0c\u76f4\u63a5\u5bfc\u81f4\u4f17\u591a\u63d2\u4ef6\uff08\u4eceJava\u5230Sliverlight\uff09\u65e0\u6cd5\u4f7f\u7528\uff0c\u4e5f\u8ba9\u5f00\u53d1\u8005\u4f24\u900f\u8111\u7b4b\u3002\u9010\u6b65\u6dd8\u6c70\u9057\u7559\u4ee3\u7801\u5df2\u6210\u4e3a\u6700\u8fd1\u4e1a\u5185\u7684\u4e00\u4e2a\u4e3b\u8981\u8d8b\u52bf\u3002 \u00a0 \u6211\u9884\u6d4b2016\u5e74\u5b89\u5168\u95ee\u9898\u5c06\u6709\u6240\u7f13\u548c\u3002\u540c\u65f6\u6211\u59cb\u7ec8\u575a\u4fe1\uff0c\u5bf9\u6297\u7f51\u7edc\u5a01\u80c1\u7684\u65b0\u65b9\u6cd5\u7ec8\u5c06\u51fa\u73b0\u3002\u660e\u5e74\u6211\u4eec\u7edd\u5bf9\u8fd8\u662f\u4f1a\u62e5\u6709\u8bb8\u591a\u4e92\u8054\u7f51\u5b89\u5168\u65b9\u9762\u7684\u8bdd\u9898\u53ef\u4ee5\u8ba8\u8bba\u3002\u8981\u60f3\u4e86\u89e3\u672c\u6587\u7684\u76f8\u5173\u80cc\u666f\uff0c\u6211\u5efa\u8bae\u9605\u8bfb\u7531\u5361\u5df4\u65af\u57fa\u5b9e\u9a8c\u5ba4\u4e13\u5bb6\u4eec\u7f16\u5199\u7684<a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72886\/kaspersky-security-bulletin-2015-top-security-stories\/\" target=\"_blank\" rel=\"noopener\">2015\u5e74\u7f51\u7edc\u5a01\u80c1\u6982\u8981<\/a>\uff0c\u5176\u4e2d\u4e0d\u4ec5\u5bf9\u9488\u5bf9\u4f01\u4e1a\u7528\u6237\u7684\u4f17\u591a\u7f51\u7edc\u5a01\u80c1\u4e13\u95e8\u8fdb\u884c\u4e86\u5206\u6790\uff0c\u540c\u65f6\u4e5f\u5c312016\u5e74\u5b89\u5168\u884c\u4e1a\u505a\u4e86\u8bb8\u591a<a href=\"https:\/\/securelist.com\/analysis\/kaspersky-security-bulletin\/72771\/kaspersky-security-bulletin-2016-predictions\/\" target=\"_blank\" rel=\"noopener\">\u9884\u6d4b<\/a>\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6574\u4e2a2015\u5e74\u53d1\u751f\u7684\u4e92\u8054\u7f51\u5b89\u5168\u4e8b\u4ef6\u53ef\u8c13\u6570\u4e0d\u80dc\u6570\u3002\u8981\u4ece\u6240\u6709\u8fd9\u4e9b\u4e2d\u6311\u9009\u51fa10\u4e2a\u5f53\u5e74\u6700\u70ed\u95e8\u7684\u8bdd\u9898\u53ef\u4ee5\u8bf4\u662f\u4e00\u9879\u6781\u5176\u8270\u5de8\u7684\u4efb\u52a1\u3002\u7167\u65e7\u5982\u679c\u4f60\u5bf9\u699c\u5355\u6709\u5f02\u8bae\u6216\u8ba4\u4e3a\u8fd8\u6709\u54ea\u4e9b\u4e8b\u4ef6\u5e94\u8be5\u5165\u56f4\u7684\u8bdd\uff0c\u8bf7\u5728\u4e0b\u9762\u7684\u8bc4\u8bba\u680f\u7559\u4e0b\u60a8\u5b9d\u8d35\u7684\u610f\u89c1\u3002\u95f2\u8bdd\u5c11\u8bf4\uff0c\u4e0b\u9762\u5c31\u5f00\u59cb\u9010\u4e00\u63ed\u66532015\u5e74\u5341\u5927\u5b89\u5168\u4e8b\u4ef6\u699c\u5355\u3002<\/p>\n","protected":false},"author":53,"featured_media":3806,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1506,1450,1308],"tags":[991,993,29,994,860,987,992,995],"class_list":{"0":"post-3795","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-news","9":"category-privacy","10":"tag-adobe","11":"tag-cisco","12":"tag-facebook","13":"tag-flash","14":"tag-860","15":"tag-987","16":"tag-992","17":"tag-995"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/the-unconventional-list-of-top-security-events-in-2015\/3795\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/adobe\/","name":"Adobe"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=3795"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3795\/revisions"}],"predecessor-version":[{"id":6608,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/3795\/revisions\/6608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/3806"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=3795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=3795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=3795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}