香港新浪網 MySinaBlog
« 上一篇 | 下一篇 »
Clinton | 29 September, 2014 | 一般 | (6 Reads)

Beijing on March 14, from China's famous "white hat" team continuously break Apple, Microsoft desktop operating system, held in Vancouver, Canada, the world's leading security event Pwn2Own contest champion, became the first team to Pwn2Own contest desktop operating systems and mobile operating systems are all broken world-class security research team, is the only team to participate in the history of China and the two have won Pwn2Own professional security research team. 

Chinese security experts, vice president of Tencent 丁珂 believe that this shows that China in the field of offensive and defensive vulnerability has been obvious in the world's most sophisticated level. "This is a major event in China's Internet security." 

Get this achievement, Acer shock from Shanghai Technology Co., Ltd. of China cloud computing renowned security research team "Keen Team". They successfully break was Apple's latest mobile operating system iOS 7.0.3 in Tokyo, Japan last year, Pwn2Own Mobile 2013 game, shocked the world. Because Apple has been that its operating system is the most perfect, but in China, "white hat" before but defeated. This year the contest, "Keen Team" turn the PC operating system to break, which shocked the world once again attracted the field of Internet security, many foreign media have reported on this lot. 

"Pwn2Own" contest, is the most famous worldwide, but also the highest degree of difficulty of the competition, its biggest feature is the "no problem", which gives the "white hat" essay brings great difficulty requirements. This attracted the world's most top "white hat" team to play, and become the world's "white hat" an event. 

The tournament is still sponsored by Microsoft, Google, Apple, Zero Day Initiative and other world-renowned software vendors and security solutions provider, to provide the latest and most secure mainstream desktop operating systems, browsers and desktop applications as an attack target, while creating record for winning teams to provide a total of over one million dollars in prize money. 

In the game, as this researcher Keen Team Liang spiker with a time of 15 seconds to break the MacOS X Mavericks 10.9.2,20 seconds to break Windows 8.1. Among them MacOS, because the industry uses a lot like Microsoft, Google and other companies the latest advanced security protection technology, Pwn2Own contest held in consecutive years since 2011 to break from unmanned, professionals in the industry has been hailed as "Everest." 

"Keen Team" team, is a country not yet well-known, but there are considerable influence on the "white hat" team in the world. Most key members of the team from Microsoft, to the great cause of China's Internet security, the formation of the company, set up "Keen Team" team. In China, its main job is the world's most famous discovery sophisticated operating system vulnerabilities. In the past five years, the team to Microsoft, Apple, Google and other world-renowned manufacturers submitted hundreds of "serious" level of security vulnerabilities have been evaluated by Forbes magazine as "Apple discovered vulnerabilities is Apple's entire security team more than twice. "

For non-insiders, the people on the "white hat" there is no deep understanding. Tencent Computer Wu Bo, general manager, said the housekeeper, "white hat hacker description is positive that he can identify a computer system or network security vulnerabilities, but does not malicious to use, but announced its vulnerabilities. Way, the system will be used by other people before (for example, black hat) use to patch holes. "

"Keen Team" team technical core, Acer earthquake cloud computing Miss Stone, chief scientist, said the company's core philosophy is: "unknown attack, how can we know defense." That in order to lay the vulnerability of attack and defense, must be a prophet vulnerability is how it happened, so that could truly take preventive measures in the face of vulnerability to attack, with the fastest time to fix vulnerabilities. And that is what the global Internet security, will spare no effort to carry out vulnerability contest to improve global vulnerabilities offensive and defensive capabilities. 

According to Wu Shijie Shao, Keen Team's computer system vulnerabilities mining capacity has been achieved across systems and cross-platform application, currently for the global mainstream desktop and mobile operating systems and applications have built a mature senior research platform that can be loopholes sustainable and efficient mining and exploit research, to ultimately develop the most secure protection mechanism to protect the security of desktop and mobile systems, making government and business users' computers and intelligent terminals can be from advanced persistent threats APT attacks. 

Wu Shi further revealed that, at present, "Keen Team" with Microsoft, Google, Android customization Father CM (CyanogenMod), as well as China's Tencent and other software and Internet companies are to discuss security cooperation in a wider range. "The role of 'Keen Team' offensive and defensive aspects of vulnerability in the global scope will be fully reflected." 

Pwn2Own organizer ZDI revealed that this competition each team used the technical details of security vulnerabilities and attacks will be timely feedback to the appropriate responsible manufacturers, vendors in each method before posting bug fixes, race organizers and teams are not announced details related technologies, systems and applications to ensure the safety of users around the world can be protected.

Where can i download office 2013 online website http://www.softwares2013.com.au/ 

 

Visit the Best Buy Download Microsoft Windows 8 today 109usd hot sale. Click: http://www.freesoft2010.co.uk/download-windows-8-en-20.html