Advance with the times and advance with the times of cybercrime technology

In the era of artificial intelligence, cybercriminals continue to renovate their attack methods, and malicious mining and ransomware have surfaced. A few days ago, Tencent Security released the "Research Report on Internet Black Production in the First Half of 2018", disclosing for the first time new malicious programs on the Internet such as mobile phone application distribution, APP brushing promotion, ransomware decryption, and broiler mining control.

Malicious deduction of fees by Trojan horses depleting user fees

The "Report" pointed out that there are dozens of types of mobile phone viruses in the first half of 2018, and most of the viruses are concentrated in three types: tariff consumption, malicious deduction and privacy acquisition, of which tariff consumption accounted for 32.26%, and malicious deductions And privacy acquisition category accounted for 28.29% and 20.40% respectively. The functions of mobile phone viruses are becoming increasingly complex. In early April of this year, Tencent’s TRP-AI anti-virus engine captured a malicious Trojan called "Bank Holiday ATM" and disguised it as a normal payment plug-in. Without the user’s knowledge, it sent an order message and uploaded it at the same time. User's mobile phone firmware information and privacy, resulting in loss of user charges and privacy leakage.

According to the monitoring of Tencent Security Anti-Fraud Laboratory, the mobile terminal is most typical of secret deductions for telephone charges, malicious mobile advertisements, mobile application distribution, and App promotion, which can be called "Nuggets Machines". Take secret deduction of phone bills and black production as an example. About 2,750 new virus variants are added daily on the Internet, which are spread through mobile applications such as various pornographic games, chat and dating.

Advance with the times The advancement of cybercrime technology with the times

Mining Trojan becomes the latest malicious program

On the PC side, malicious programs such as ransomware, control of broiler mining and DDoS attacks are active. Affected by the huge popularity of the blockchain industry in 2018, cybercrime activities triggered by encrypted digital currencies have risen unprecedentedly, and mining Trojans have become the most widespread malicious program in 2018.

In order to control as many broiler computers as possible to form a botnet for mining, the black product has turned its target to highly configured "chicken-eating" players and Internet cafe computers to build mining clusters. On April 11 this year, with the support of the Tencent Computer Butler Team and the Guardian Program, the police cracked down on a large mining Trojan horse company in Dalian, Liaoning. The company implanted malicious programs into the "plug-in" of eating chicken to spread, build a Trojan horse platform, mine various digital currencies, and make illegal profits.

In addition to forming a botnet for mining profit, controlling broiler computers to execute DDoS attacks is also one of the long-established black production profit models, and new DDoS technologies are still evolving.

Artificial intelligence becomes a breakthrough in the fight against viruses

In response to the increasingly rampant illegal mining activities, Tencent Computer Manager also launched the "anti-mining protection" function, which can fully intercept all kinds of mining Trojans. In addition, in order to minimize the probability of computers being invaded by Trojan horse viruses, Tencent Computer Manager, in addition to providing regular update patches to fix vulnerabilities, also introduced "Nuwa Stone" defense technology, even if the computer encounters a sudden outbreak of 0day vulnerabilities (not Patch vulnerability) attacks can also be effectively intercepted.

In the continuous changes of the network security environment and situation, it is essential to form an efficient and coordinated active protection capability. The Tencent security team stated that there will be a period of time (such as the collection of samples) for traditional antivirus engines from virus discovery to detection. Security researchers can generalize their rich manual experience into a universal virus detection model through deep learning technology to improve the ability to detect unknown viruses.

Interactive Flat Panel Displays

The Flat Panel Displays active panel not only has the functions of a tablet and a computer, interactive panel,activpanel screen share,activpanel,interactive flat panel,interactive flat panel but also has the Touch Screen writing function of an Interactive Whiteboard. interactive flat panel is equipped with an Android system and has 3G of running memory and 32G of storage memory. the interactive panel adopts OPS plug-in design scheme, built-in computer host, and can be configured with windows system. At the same time, activpanel also has a smart TV function, one-key switching of functions such as meeting, office, and TV entertainment.

Flat Panel Displays,Interactive Panel,Activpanel,Interactive flat panel,smart interactive flat panel

Jumei Video(Shenzhen)Co.,Ltd , https://www.jmsxdisplay.com