Of Uber hacker acclimatized skills user wallet by 10 000 damage

Lei feng’s network: fenggou founder author cloud. Lei feng’s network (search for “Lei feng’s network”, public interest) cloud articles are issued by authorised by the author, reproduced please be sure to indicate the source and author, content must not be modified.

When science fiction stories, authors like as a grumpy neighbor Mars, a word not to DESTINATION. But when Earth will be pulled down the key moments, Martian planking in bulk due to not agreeing with bacterial infection by Earth, eventually became the people’s Octopus sweet end of the looting were scattered on the ground. These routines to impress me, especially those resulting from the “acclimatized” unexpected turn of events even more fascinating.

Text before you start to see a recent very hot security events.

Facebook is for various playing not open and is famous for its domestic of social website, its CEO Mark Zuckerberg is one Internet legend characters, much hacker concern:) one for “OurMine Team” of Twitter account at small tied said they do has a security test, success make to has he of Twitter, account password, requirements followers night long chat ~ small tied reply: pulled down’s you only didn’t got, edge cool to… Then “OurMine Team” anger, log in directly to a small pierced acts account flags: well, we find your Linkedin database of commonly used passwords “dadada”!

Twitter VIP floor cleaning services immediately, this is another story (the whole event feel pre-arranged bright). Hackers use people use the same password used with “dadada” website attempts to log on to the small bar account, with the result that it was the famous CEO planted in this pit, domestic users have expressed condolences to-_- Jack Spade iPhone 5 Case

When it comes to passwords at home is a loser. Password is stored in clear text in the early (better or simply hash), this large base, the economic value of the cloud migration, many willing to pay Black’s demand side, together creating a domestic “/off hit” hot situation. Data not only commodities, but also the shape of revenue-generating tool, black data produced in droves. Most of the overseas enterprise data breaches or security incidents are, wherever possible, to share user details to deal with, while domestic business after data stolen were found in cover to avoid accountability, so difficult for users to realize that they have at risk.

Pulling away, chat Twitter to see our lives very close to foreign influence case. Uber is not entering China’s Wu Yunjun impressed after simple UI, quality of service, but the worrying way of deductions (currently also support from secret payments to the last drop). Interaction without user confirmation, service finished the drivers directly on the button the money go, limited the payment process hard adding a risk level. Hackers don’t need to break the complex payment limit, just won the Uber user account can avoid credit card and payment services strict risk control mechanisms.

Clouds white hat submitted multiple Uber of security report, like Uber excellent step client interface design improper can led to hit library attack, and I is how attempts to landing others of uber of, found Uber lack on China local of hit library culture for consider, this is many ocean enterprises of problems: Twitter push special landing interface can hit library, led to of consequences on as small tied as was hacker pattern abuse! Because the account number is the phone number of the Uber, Uber hit and blast up just like a duck.



Figure for the phone number through blasting results, login unlocked Uber account, you can see their historical record of success, explore almost every activity routes, good work overtime every day late.

Of course, what else can you would say it? Don’t know if some Uber users experienced their own account consumption was inexplicable, black actually had already worked out money-laundering–Uber this is a great experience. His model is through letters or QQ online communication, you will pay a very low price (typically 20~30, casual ride), tell him where you are, where to go, and contact phone numbers, meeting place, get off never mind patting anything to leave.



You should know that, in fact, this call is to control a lot of Uber accounts, through the generation of money washing out of the way to the Uber, but not equivalent, because passengers can get so cheap so called service is very hot. Mature shop, QQ Group, or even to the public has been overwhelming. Chengdu business newspaper has Uber users bound payments were fraudulent in their way do some multi-faceted investigation decryption “Uber” black industrial chain. Jack Spade iPhone 5 Case



Uber fraudulent situation in the country is really bad, where was no better overseas. Wu Yunjun topic on Twitter #UberAccountHacked also found a lot of foreign friends ridicule account was fraudulent, were consumed in China much better ran long distance. Precisely because of the internationalization of this gene, resulting in pieces of successful use of resources abroad …

Jack Spade iPhone 5 Case

Now Wu Yunjun has feedback on localization of these security issues to the Uber, enterprise feedback to confirm problems will be fixed as soon as possible. Too much evidence that future security challenges are not purely technical vulnerabilities, malicious use of the business, we are behind the black I do not know 1:30. Due to outbreak of the business problem, so users become experts to protect themselves is impossible! User property with the data to enterprise storage, enterprise should be in Active confrontation with the black side, not too clear division of responsibilities.

For enterprises, on its account mechanism should be doing proactive preventive considerations, such as:

Client login error pop-up verification code many times, prevent the machine logon attempts;

Block IP to log exception threshold is exceeded;

Tighten and fragments unified login;

Unusual login account sufficient safety tips;

……

Can also see Microsoft make unyielding attitude in the user’s security and means to get off Microsoft drivers a five star as well ~

Microsoft leak password prevents the user from using the library of commonly used passwords

1.17 million LinkedIn users ‘ passwords leaked, Microsoft announced the Microsoft Account and Azure AD the system will dynamically shielding commonly used passwords.

Microsoft says that when there is a large library of password leak, its security team and security experts to analyze the most common passwords, commonly used passwords are then added to the blocked list, preventing the user from using.

Microsoft Account systems have enabled the dynamic masking system, Azure AD system to be launched in the coming months.

Xinjiang Matrice 100 open flying platforms

1548 votes

Xinjiang Matrice 100 open flying platforms

DJI Matrice 100 open flying platform is designed to provide innovative application developers in the field of UAV development platform, it is not for ordinary consumers. Matrice is equipped with several communication interfaces, power supplies, and extension, users can install various types of equipment on the platform and to obtain flight data and control mechanisms, loading 1kg 20 minutes flying time, carry extra batteries can be increased to 40 minutes.

View details of the voting >>

Leave a comment