Smart security exposes new problems: it may involve 2billion
smart is a device that connects and interconnects in real time, updates and stores a large amount of private data from time to time, and it is easy to become the object of hacker attacks. A recent report on Wall Street introduced the research results of researchers in technology. This result may actually strengthen people's vigilance, because it may affect 2billion intelligence in the world. China mechanical and electrical products trading news may have never experienced a large-scale attack. It seems that the security problem of intelligence has never been seriously raised to the level of public awareness, at least relative to the security problem of PC
but intelligence is obviously easier to expose security problems. Intelligence is a device that connects and interconnects in real time, updates irregularly, and stores a large amount of private data. It is easy to become the object of hacker attacks
of course, this is only a theoretical level. However, a recent report on Wall Street introduced the research results of researchers in technology. This result may actually strengthen people's vigilance, because it may affect 2billion intelligence in the world
Mathew Solnik, a researcher of ant, said that he could unknowingly invade an intelligent device from another 30 feet away, including invading its calls, browsing contacts, and even reading text messages
solnik said that they have probably figured out a way to disguise as a wireless operator through the loopholes in smart radio, and use a virtual signal tower less than $1000 and the size of a laptop to upload malicious code within 30 feet
Then check whether the amplifier unit is normal.it is reported that Solnik can run on blackberry and Android operating systems and an earlier version of IOS system. However, Solnik stressed that the vulnerability discovered by accuvant is unlikely to pose a threat to public users at present, because only a few mobile communication experts in the world master this technology. However, once the technical details are released, the security risks will spread all over the world
Reuters reported that researchers at blunebox, another security company, also found a security vulnerability fakeid, which is said to affect any application on Android that relies on the verification signature chain. At present, Google has said that there is no evidence that someone uses fake ID to hack, and the company will release vulnerability patches as soon as possible
the upgrade of vulnerability patches is obviously a thorny problem. It depends not only on whether the system developer sends it, but also on whether the user terminal can be upgraded and whether it can be upgraded. If IOS devices can be upgraded safely relatively uniformly, then Android is obviously a trouble. Google is difficult to update the software of the fragmented Android version in the market. It relies more on third-party manufacturers, and those Android models that stay in the old version will become a huge hidden danger. It is reported that this fake ID vulnerability can be traced back to Android 2.1 system released in January 2010
next week, intelligent security will be discussed as an important topic at the blackhat conference in Las Vegas. Solnik and other researchers will demonstrate intelligent hacker technology respectively, hoping to push intelligence to a new position of network security in this way