To see how hackers get rid of macOS system in 5 seconds on Black Hat 2016, "stimulating" ATM machine | Home Weekly

1. Black Hat 2016 Special Report

Chinese hackers kill macOS system for 5 seconds, the first global attack method

The user clicked on a link on the Apple computer. In his eyes, everything was so calm. However, he did not know that with the click of a whisper, countless data rushed into the computer. During the five seconds of the second hand, Apple’s top programmers were destroyed by the layered defense system built by the code, and the God of cyberspace quietly changed hands. Between the electric light and the Flint, the hacker seized all the rights of the computer.

This incident really happened in the "Hacker Games" - Pwn2Own 2016. It was the hackers from the Tencent Cohen Lab that made this gorgeous attack. The heinous thing is that they also used another gesture, again causing the macOS world to crash.

It is this astounding hacker aesthetic that helped them succeed in the title of "Master of the World".

Since March of this year, the whole world has been waiting for the "masters" to reveal the secret attack method. Five months later, Cohen's hackers finally decided to restore the technical details of the attack. The stage they chose was BlackHat USA, the highest event in the hacker community.

Android system security has been saved? Chinese hackers come up with artifacts  

Android system is safe.

This is the biggest joke in the eyes of hackers.

Exaggerating, even a script kid can easily find a solution on the Internet and break your cell phone defense. The reason for this result is not that Google does not act in terms of system security, but that most Android phones that exist in the human world have become "lost lambs." Due to the fragmentation of the system and the cumbersome process of vendor updates, these mobile phones simply cannot find the door to upgrade. They can only be left alone in the wilderness of the wolf and tiger leopard.

Baidu’s chief security scientist, Wei Wei, calls it “ecological security breach” and “leukemia of the Android system”.

Incredibly, on top of BlackHat USA, the top hacking gathering, the hacker has been calling for Android system security for three consecutive years. Just today, he once again climbed the top stage of this global hacker. This time, he resorted to an "artifact."

At the end of the speech, Lei Feng network had an exclusive interview with Wei Wei, let us tell him about what this "artifact" is.

Dangerous, hackers suddenly turn a high-speed car

Imagine driving through the azure beach and wondering if you have the opportunity to swim here. Suddenly, your car's steering wheel suddenly spins and it's too late to react. Your dream of swimming at Blue Ocean has been realized with the car.

This is not because you bought a car that would "read". You are very likely to provoke a car hack.

There are more than two of the world's most famous car hackers: Charlie Miller & Chris Wallacek.

At BlackHat USA, the world's top hacking party in 2015, they staged a car break show that shocked the world. In that presentation, they demonstrated the remote intrusion into the Jeep on-board system, which remotely controlled various functions on the startup vehicle, including deceleration, shutting down the engine, braking or letting the brakes fail. This world-famous game has caught the world in shock.

Hackers “emerge” ATM machines on the spot, and can inject 50,000 US dollars in 15 minutes

At the world's top hacking party BlackHat, there is no shortage of local tyrants. Everyone who stands to share on the stage can use his own technology to make a lot of money. However, just as BlackHat came to a close, a real embarrassment arose. Because he can make any ATM machine spit out 50,000 US dollars, if the uncle also agreed.

Visually examining Weston Hecker (Weston Hacker), the surnamed "hacker" created the highest share of BlackHat's attendance at this time. Because there are more than one person and Lei Fengwang editor, is to witness the ATM machine "banknote" and came to the scene.

Weston Hecker told the “thought thirsty” audience that he could not “hypnotic” the ATM machine out of thin air, but instead created a gadget that had to be inserted into the bank card entrance in advance. In this way, when the unclear people use the ATM, the gadget will record the interaction data between his bank card and the ATM, such as bank card number and password.

2. The world's largest hacking party, ten cold knowledge of "DEFCON"  

If you are not satisfied with certain things in the world, and decided to use all possible ways to achieve your goals. Congratulations, you are becoming a hacker.

The hackers who dare to confront the impossible middle finger all over the world will gather in Las Vegas every year to participate in a grand party called DEFCON.

Technology, hacking, geeks, strange coffee, and alcohol, DEFCON appears in the memory and media description of the world with its unfathomable image. However, this defiant attitude has made DEFCON a lot of spirits including Chinese hackers. temple. As the saying goes, "If you are born, why not get rid of the shackles."

The United States local time on August 4, 2016 (Beijing time on August 5), this hacker Party started in 1993 is about to usher in the 24th reunion. To learn about the gathering of the global hackers No1, let’s take a look at the ten cold knowledge about it.

3. Depth | Bai Wuhui Zhao Wu: Creating a corporate threat awareness artifact in the name of Andersen

It is an ideal for each start-up company to turn from an unapproved “ugly duckling” to a “white swan” that is envied by everyone. Helping these start-ups solve security problems and achieve their dreams of better transformation is also the main service goal of the White Hat Andersen platform. Zhao Wu said, “Taking Andersen's name not only fits the difficulties of starting a business, but it is easy to remember because of the good intentions of the future.”

The LOGO of Andersen's platform also used the image of a duckling.

Andersen’s full name is Andersen’s corporate threat perception platform. The SANS Institute defines threat intelligence as a set of data for security threats, threaters, exploits, malware, vulnerabilities, and hazard metrics, collected applications for evaluation. White Hat Lodge simply defines threat intelligence as:

Whoever wants to engage you, who gets you, and wants to do it, threatens intelligence that threatens corporate security.

Zhao Wu told Lei Fengwang (search for "Lei Feng Net" public concern) that companies are usually unfamiliar with their own assets. This will lead to the discovery of vulnerabilities and the repair efficiency is very low.

There was once a giant company that used a patch for three days because of insufficient knowledge of its own assets.

To timely and accurately find corporate security threat intelligence, Andersen’s platform will first sort out the company’s assets and put it on a fingerprint.

4. Secret: How does Hillary rely on technology to “left and right” elections?

WikiLeaks made the American Democrats bored.

On July 22, 2016, WikiLeaks disclosed nearly 20,000 emails sent by the Democratic National Committee (DNC). This incident has become the largest political scandal in the history of the United States except the Watergate incident. On July 28, WikiLeaks continued to publish 19 DNC high-level telephone recordings.

Hillary's campaign advantage is therefore greatly reduced. Most spectators think that this is a failure of Clinton's technical team. However, DNC was invaded, not the Hillary team. The Hillary team has only one program that is running on the DNC system and is intruding. It is unclear how big the problem is. "Mail Doors" In the final analysis, DNC ignored the consequences of cybersecurity assessment warnings.

In fact, many people, along with Republican opponents, are not aware of Hillary’s truly terrible election machine—a super team of “tech geniuses” from Silicon Valley. They did set a great deal for Hillary’s campaign.

This is the most scientific and digital election in history. Before George W. Bush, the Internet was still just an ATM for the presidential campaign team. They didn't know that the Internet had to do a system to allow voters to fill out cheques and to do more than just donate money. As of July 2016, Clinton’s technology team already has more than 50 people, which is equivalent to a small-scale Silicon Valley technology startup.

The core product they developed was Hillary Clinton himself. This team of science and technology has so far brought about $240 million in funding for Hillary.

Universal Stylus Pen

Product categories of Universal Stylus Pen, We are Specialized Stylus Pen manufacturers from China, The Universal Stylus Pen can be worked on android phones / apple phones and all brands capacitive touch screens. We have perfect after-sale service and technical support. Looking forward to your cooperation.

Phone Stylus Pen,Touchscreen Stylus Pen,Stylus Pen For Android,Tablet Stylus Pen

Shenzhen Ruidian Technology CO., Ltd , https://www.szwisonen.com