Home > Àüü±â»ç

[±Û·Î¹ú ´º½º ºê¸®ÇÎ] ¡°µ¥¾î¸® Äý, ´ë±Ô¸ð °í°´Á¤º¸ À¯Ãâ »ç°Ç¡± èâ

ÀÔ·Â : 2014-10-14 09:01
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

ÇÑ ¹ø¿¡ ¸ð¾Æº¸´Â ÇØ¿Ü ´º½º Çìµå¶óÀÎ

¿À´ÃÀÇ Å°¿öµå´Â ¸ÞÀÌÇð, µ¥¾î¸® Äý, ½º³Àê, ÀÎÅÍ³Ý °Ë¿­


[º¸¾È´º½º ¹®°¡¿ë] Ä«Ä«¿ÀÅå »ç°ÇÀÌ °£¹ã¿¡ ÀϾ´ø ÁÖ¿ä ±¹³» ´º½º¿´±â ¶§¹®ÀÎÁö ÀüÀÚÀç´ÜÀÇ ¡®°Ë¿­°ú ½Î¿ì°Ú´Ù¡¯´Â »çÀÌÆ® °³¼³ ¼Ò½ÄÀÌ ÀÖ¾ú´Ù. ¶Ç ÇØ¿Ü¿¡¼­´Â µ¥¾î¸® Äý, ÄÉÀ̸¶Æ®, ½º³ÀêÀÌ ÇÑâ ¸ö»ìÀ» ¾Î°í ÀÖ´Ù. ÀÌ¹Ì ¸ö»ìÀ» °ÞÀº JP¸ð°Ç üÀ̽º´Â ÀÌÁ¦ º¸¾È ÅõÀÚ±ÝÀ» µÎ ¹è·Î È®´ëÇÑ´Ù°í ÇÏ°í, ¿öµåÇÁ·¹½º´Â ÁøÁïºÎÅÍ »ó´çÇÑ °ø°Ý¿¡ ½Ã´Þ·Á¿Ô´Ù´Â »ç½ÇÀÌ °ø°³µÇ¾ú´Ù. ±× ¿ÍÁß¿¡ ¸Á¸íÇÑ ³²ÀÚÄ£±¸¸¦ ã¾Æ À̱¹¶¥À¸·Î ¶°³­ ÇÑ ¿©ÀÎÀÇ ÈÆÈÆÇÑ ¼Ò½ÄÀÌ ¸À±ò½º·± °í¸íó·³ ´«¿¡ ¶è´Ù.


1. ¸®´ª½º º¿³Ý ¡®¸ÞÀÌÇð(Mayhem)¡¯¿¡¼­ ½©¼îÅ© ÀͽºÇ÷ÎÀÕ ¹ß°ß(Security Week)

(http://www.securityweek.com/shellshock-exploits-used-expansion-mayhem-linux-botnet)


2. ¸ð½ºÄÚ¹Ù·Î ¸Á¸íÇÑ ½º³ë¿ìµç, ¿©ÀÚÄ£±¸µµ ·¯½Ã¾ÆÇà(Security Week)

(http://www.securityweek.com/love-love-snowdens-girlfriend-joins-him-russia)


3. ¹Ì±¹±¹Åä¹æÀ§ºÎ, °Å´ë Á¦Á¶»ç °íÂ÷¿ø °ø°Ý¿¡ ´çÇß´Ù°í ¹ßÇ¥ÇßÀ¸³ª À̸§Àº ¹àÈ÷Áö ¾Ê¾Æ(Security Week)

(http://www.securityweek.com/critical-manufacturing-firm-hit-sophisticated-threat-actors-dhs)


4. ÄÜÅÙÃ÷ °ü¸® ½Ã½ºÅÛ(CMS : Contents Management System) Áß °¡Àå °ø°ÝÀÌ ºó¹øÇÑ °÷Àº? ¿öµåÇÁ·¹½º(Security Week)

(http://www.securityweek.com/wordpress-most-attacked-cms-report)


5. ¹é¿ÀÇÁ ¸Ö¿þ¾î, ¹Ì±¹À» ¶°µé½â ÇÏ°Ô ÇÏ°í ÀÖ´Â µ¥¾î¸® Äý(Dairy Queen) À¯Ãâ»ç°íÀÇ ÁÖ¹üÀ¸·Î µå·¯³ª(Threat Post)

(http://threatpost.com/backoff-malware-identified-as-culprit-in-dairy-queen-breach/108811)


6. ÀüÀÚÇÁ·±Æ¼¾îÀç´Ü, °¨½Ã¹æÁö »çÀÌÆ® I Fight Surveillance Á¦ÀÛÇØ(Threat Post)

(http://threatpost.com/eff-launches-new-anti-surveillance-site/108809)


7. SnapChat À¥ ¾ÖÇø®ÄÉÀ̼ÇÀÇ °³ÀÎ »çÁø ¹× µ¿¿µ»ó ´ë·® À¯Ãâ(The Register)

(http://www.theregister.co.uk/2014/10/10/new_photo_hack_claim_200000_snapchat_photos/)


8. ¹Ì±¹ ´ëÇü ÇÒÀθ¶Æ® üÀÎ Kmart¿¡¼­ ½Å¿ëÄ«µå Á¤º¸ À¯Ãâ ÀÎÁ¤, »ç°ú¹® ¹ßÇ¥(The Register)

(http://www.theregister.co.uk/2014/10/12/kmart_cyber_attach/)


9. ´ë±Ô¸ð À¯Ãâ»ç°Ç °ÞÀº JP¸ð°Ç üÀ̽º, »çÀ̹öº¸¾È ¿¹»ê µÎ ¹è·Î ´Ã¸± ¿¹Á¤(CU Info Security)

(http://www.cuinfosecurity.com/chases-cybersecurity-budget-to-double-a-7427)


10. ¹Ì±¹ Á¤ºÎ 1³â ³» ÀüÀڹοø ½Ã½ºÅÛ¿¡ 2Áß ÀÎÁõ µµÀÔ ¿¹Á¤(CU Info Security)

(http://www.govinfosecurity.com/interviews/authentication-changes-coming-in-year-i-2471)


11. ½Ã½ºÄÚ¿¡¼­ ¿î¿µÇÏ´Â ¿Â¶óÀÎ À¥ ÄÁÆÛ·±½º ÅøÀÎ WebExÀÇ »ç¿ëÀÚ ´ëºÎºÐ ¾ÏÈ£ °ÉÁö ¾Ê¾Æ ³»ºÎ ȸÀÇ ³»¿ë »ç½Ç»ó ´ëÁß¿¡°Ô °ø°³, ½Ã½ºÄÚ »ç¿ëÀÚ¿¡°Ô °³º°ÀûÀ¸·Î ±Ç°í Áß(Krebs on Security)

(http://krebsonsecurity.com/2014/10/whos-watching-your-webex/)


12. º£¶óÅ©¸³Æ®, Ãë¾àÁ¡ ¸¹Àº Æ®·çÅ©¸³Æ®ÀÇ ´ëüÀç?(eSecurity Planet)

(http://www.esecurityplanet.com/open-source-security/veracrypt-a-worthy-truecrypt-alternative.html)

[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]


<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>

  •  
  • 1
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö À§Áîµð¿£¿¡½º 2018
¼³¹®Á¶»ç
³»³â ȸ»ç¿¡ ²À µµÀÔÇÏ°í ½ÍÀº º¸¾È ¼Ö·ç¼Ç ¶Ç´Â Ç÷§ÆûÀº ¹«¾ùÀΰ¡¿ä?
XDR
EDR
AI º¸¾È
Á¦·ÎÆ®·¯½ºÆ®
°ø±Þ¸Á º¸¾È ü°è(SBOM)
Ŭ¶ó¿ìµå º¸¾È ¼Ö·ç¼Ç
±âŸ(´ñ±Û·Î)