国产热热热精品,亚洲视频久久】日韩,三级婷婷在线久久,99人妻精品视频,精品九热人人肉肉在线,AV东京热一区二区,91po在线视频观看,久久激情宗合,青青草黄色手机视频

Global EditionASIA 中文雙語Fran?ais
Opinion
Home / Opinion / Opinion Line

Ghostbusters required to prevent future stealth software data theft

China Daily | Updated: 2018-08-24 07:28
Share
Share - WeChat
[Photo/IC]

Police in Shaoxing, East China's Zhejiang province, recently uncovered a case in which a listed technology company based in Beijing stole more than 3 billion pieces of personal information from 96 internet enterprises nationwide, including big names such as Baidu, Alibaba and Tencent. Beijing News comments:

This is the largest personal information theft on record. Unlike other data thieves who take advantage of software loopholes to pilfer data from the IT enterprises, this company had obtained people's login details thanks to its cooperation with the network operators that enabled it to stealthily install software that directly grabs personal data.

When the network users logged in to access their social media, online banking, email and e-commerce accounts, their passwords or secret keys would be directly transferred to the company's servers through the software.

According to the Shaoxing police, the whole industrial chain was fairly developed. The data buyers subscribe some apps or other internet services for the network users, receiving payments from the app operators or online service providers, which are eager to expand their subscriptions in a short time.

This is done in batch operations and can even realize the accurate matching between the network users and the apps and internet services in light of big data calculation results. As a result, the victims were not surprised when their social media accounts subscribed to an app or service that they were interested in but had never subscribed to themselves.

According to the company's financial report, its revenue in 2016, when its illegal operation boomed, was 30.28 million yuan ($4.41 million), among which 10.53 million yuan was net profit. The exorbitant profit explains its instiable appetite and audacity.

But the network operators, as the basic service providers and, more important, the first gatekeepers of personal information security, can hardly absolve themselves from blame.

That the company's dirty business model has been operating for more than a year without being noticed lays bare either the network operators' lax vigilance or their collusion, as the company's ghost software was not that difficult to spot by professional eyes.

Most Viewed in 24 Hours
Top
BACK TO THE TOP
English
Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
靖西县| 平湖市| 石狮市| 衡阳县| 邵阳市| 长乐市| 芮城县| 乌鲁木齐县| 壤塘县| 图木舒克市| 白银市| 米易县| 金溪县| 长治市| 马关县| 临颍县| 定州市| 宝兴县| 泰顺县| 曲松县| 东明县| 隆德县| 安仁县| 繁峙县| 新化县| 呼和浩特市| 蒙自县| 内黄县| 温泉县| 松溪县| 拉孜县| 黄山市| 江口县| 卓资县| 秭归县| 措美县| 呼伦贝尔市| 遂溪县| 呼图壁县| 长宁区| 汕尾市|