ÇÑ ¹ø¿¡ ¸ð¾Æº¸´Â ÇØ¿Ü ´º½º Çìµå¶óÀÎ
¿À´ÃÀÇ Å°¿öµå´Â ¸ÞÀÌÇð, µ¥¾î¸® Äý, ½º³Àê, ÀÎÅÍ³Ý °Ë¿
[º¸¾È´º½º ¹®°¡¿ë] Ä«Ä«¿ÀÅå »ç°ÇÀÌ °£¹ã¿¡ ÀϾ´ø ÁÖ¿ä ±¹³» ´º½º¿´±â ¶§¹®ÀÎÁö ÀüÀÚÀç´ÜÀÇ ¡®°Ë¿°ú ½Î¿ì°Ú´Ù¡¯´Â »çÀÌÆ® °³¼³ ¼Ò½ÄÀÌ ÀÖ¾ú´Ù. ¶Ç ÇØ¿Ü¿¡¼´Â µ¥¾î¸® Äý, ÄÉÀ̸¶Æ®, ½º³ÀêÀÌ ÇÑâ ¸ö»ìÀ» ¾Î°í ÀÖ´Ù. ÀÌ¹Ì ¸ö»ìÀ» °ÞÀº JP¸ð°Ç üÀ̽º´Â ÀÌÁ¦ º¸¾È ÅõÀÚ±ÝÀ» µÎ ¹è·Î È®´ëÇÑ´Ù°í ÇÏ°í, ¿öµåÇÁ·¹½º´Â ÁøÁïºÎÅÍ »ó´çÇÑ °ø°Ý¿¡ ½Ã´Þ·Á¿Ô´Ù´Â »ç½ÇÀÌ °ø°³µÇ¾ú´Ù. ±× ¿ÍÁß¿¡ ¸Á¸íÇÑ ³²ÀÚÄ£±¸¸¦ ã¾Æ À̱¹¶¥À¸·Î ¶°³ ÇÑ ¿©ÀÎÀÇ ÈÆÈÆÇÑ ¼Ò½ÄÀÌ ¸À±ò½º·± °í¸íó·³ ´«¿¡ ¶è´Ù.
1. ¸®´ª½º º¿³Ý ¡®¸ÞÀÌÇð(Mayhem)¡¯¿¡¼ ½©¼îÅ© ÀͽºÇ÷ÎÀÕ ¹ß°ß(Security Week)
(http://www.securityweek.com/shellshock-exploits-used-expansion-mayhem-linux-botnet)
2. ¸ð½ºÄÚ¹Ù·Î ¸Á¸íÇÑ ½º³ë¿ìµç, ¿©ÀÚÄ£±¸µµ ·¯½Ã¾ÆÇà(Security Week)
(http://www.securityweek.com/love-love-snowdens-girlfriend-joins-him-russia)
3. ¹Ì±¹±¹Åä¹æÀ§ºÎ, °Å´ë Á¦Á¶»ç °íÂ÷¿ø °ø°Ý¿¡ ´çÇß´Ù°í ¹ßÇ¥ÇßÀ¸³ª À̸§Àº ¹àÈ÷Áö ¾Ê¾Æ(Security Week)
(http://www.securityweek.com/critical-manufacturing-firm-hit-sophisticated-threat-actors-dhs)
4. ÄÜÅÙÃ÷ °ü¸® ½Ã½ºÅÛ(CMS : Contents Management System) Áß °¡Àå °ø°ÝÀÌ ºó¹øÇÑ °÷Àº? ¿öµåÇÁ·¹½º(Security Week)
(http://www.securityweek.com/wordpress-most-attacked-cms-report)
5. ¹é¿ÀÇÁ ¸Ö¿þ¾î, ¹Ì±¹À» ¶°µé½â ÇÏ°Ô ÇÏ°í ÀÖ´Â µ¥¾î¸® Äý(Dairy Queen) À¯Ãâ»ç°íÀÇ ÁÖ¹üÀ¸·Î µå·¯³ª(Threat Post)
(http://threatpost.com/backoff-malware-identified-as-culprit-in-dairy-queen-breach/108811)
6. ÀüÀÚÇÁ·±Æ¼¾îÀç´Ü, °¨½Ã¹æÁö »çÀÌÆ® I Fight Surveillance Á¦ÀÛÇØ(Threat Post)
(http://threatpost.com/eff-launches-new-anti-surveillance-site/108809)
7. SnapChat À¥ ¾ÖÇø®ÄÉÀ̼ÇÀÇ °³ÀÎ »çÁø ¹× µ¿¿µ»ó ´ë·® À¯Ãâ(The Register)
(http://www.theregister.co.uk/2014/10/10/new_photo_hack_claim_200000_snapchat_photos/)
8. ¹Ì±¹ ´ëÇü ÇÒÀθ¶Æ® üÀÎ Kmart¿¡¼ ½Å¿ëÄ«µå Á¤º¸ À¯Ãâ ÀÎÁ¤, »ç°ú¹® ¹ßÇ¥(The Register)
(http://www.theregister.co.uk/2014/10/12/kmart_cyber_attach/)
9. ´ë±Ô¸ð À¯Ãâ»ç°Ç °ÞÀº JP¸ð°Ç üÀ̽º, »çÀ̹öº¸¾È ¿¹»ê µÎ ¹è·Î ´Ã¸± ¿¹Á¤(CU Info Security)
(http://www.cuinfosecurity.com/chases-cybersecurity-budget-to-double-a-7427)
10. ¹Ì±¹ Á¤ºÎ 1³â ³» ÀüÀڹοø ½Ã½ºÅÛ¿¡ 2Áß ÀÎÁõ µµÀÔ ¿¹Á¤(CU Info Security)
(http://www.govinfosecurity.com/interviews/authentication-changes-coming-in-year-i-2471)
11. ½Ã½ºÄÚ¿¡¼ ¿î¿µÇÏ´Â ¿Â¶óÀÎ À¥ ÄÁÆÛ·±½º ÅøÀÎ WebExÀÇ »ç¿ëÀÚ ´ëºÎºÐ ¾ÏÈ£ °ÉÁö ¾Ê¾Æ ³»ºÎ ȸÀÇ ³»¿ë »ç½Ç»ó ´ëÁß¿¡°Ô °ø°³, ½Ã½ºÄÚ »ç¿ëÀÚ¿¡°Ô °³º°ÀûÀ¸·Î ±Ç°í Áß(Krebs on Security)
(http://krebsonsecurity.com/2014/10/whos-watching-your-webex/)
12. º£¶óÅ©¸³Æ®, Ãë¾àÁ¡ ¸¹Àº Æ®·çÅ©¸³Æ®ÀÇ ´ëüÀç?(eSecurity Planet)
(http://www.esecurityplanet.com/open-source-security/veracrypt-a-worthy-truecrypt-alternative.html)
[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>