¿À´ÃÀÇ Å°¿öµå : ¹Ì±¹ ÀÚÀ¯¹ý, Áß±¹ ¶Ç Â÷´Ü, ¸Ö¿þ¾î¿Í º¿³Ý ¹ßÀü
³»³â¿£ ÀÇ·á°è ÁÖ¸ñÇØ¾ß ÇÒ µíÇÏ°í ÀÚÀ¯¹ý Åë°ú´Â ¿ä¿øÇÏ°í
¸ð¹ÙÀÏ È¯°æÀÌ PCȯ°æÀ» ¡®³ª»Û °Í¡¯ºÎÅÍ µû¶óÀâ°í ÀÖ¾î
[º¸¾È´º½º ¹®°¡¿ë] ¹Ì±¹ ÀÚÀ¯¹ýÀº °á±¹ Åë°úµÇÁö ¸øÇß½À´Ï´Ù. Å×·¯¸®½ºÆ®°¡ ¹Ý´ëÀÇ ÁÖ ÀÌÀ¯¿´´Ù°í ÇÏ´Ï °øÆ÷ÀÇ ÈûÀº »ó´çÈ÷ Å«°¡ º¾´Ï´Ù. Áß±¹Àº ÀÚÀ¯ÁÖÀÇ Áø¿µ¿¡¼ ¿À´Â ¹°°áÀ» µÎ·Á¿öÇØ ÄÜÅÙÃ÷ ³×Æ®¿öÅ©¸¦ Â÷´ÜÇÏ´õ´Ï ±Þ±â¾ß ¼¼°è¿¡¼ µÎ ¹ø°·Î Å« ÀºÇà »çÀÌÆ®¿¡µµ Á¢¼ÓÇÏÁö ¸øÇÏ°Ô Á¶Ä¡¸¦ ÃëÇß½À´Ï´Ù. ¼¼°è 2À§ °æÁ¦±¹°¡ÀÇ À§¾öÀϱî¿ä.
¡ã °øºÎ´Â ³¡ÀÌ ¾øÁö.
ÇÑÆí ¸Ö¿þ¾î Á¦ÀÛÀÚµéÀº ÀüºÎ ½Ã»ç Àü¹®°¡ °°½À´Ï´Ù. Àü ¼¼°èÀûÀ¸·Î ÀÏ°í ÀÖ´Â ÇÁ¶óÀ̹ö½Ã ¿ËÈ£ ¹°°áÀ» ÆľÇÇØ ¾ÏÈ£È ÆÄÀÏ ¾È¿¡ ¸Ö¿þ¾î¸¦ ¼û°Ü¼ ÆÛÆ®¸®°í ÀÖ°í, ¶Ç PC Áß½ÉÀÇ È¯°æ¿¡¼ ¸ð¹ÙÀÏ Áß½ÉÀÇ È¯°æÀ¸·Î º¯ÇØ°¡´Â ¿ì¸®ÀÇ »ýÈ°»ó±îÁö ¾Ë¾Æä°í ¸ð¹ÙÀÏ ¸Ö¿þ¾î ¹× º¿³Ý ȯ°æµµ ºü¸£°Ô ¹ßÀü½ÃÅ°°í ÀÖ´Â °É º¸¸é ¸»ÀÌÁÒ. À̵鸸 ÂÑ¾Æ´Ù´Ï¸é ½Ã»ç°æÁ¦ ºü»èÇÏ°Ô µÉ µí ÇÕ´Ï´Ù. ³×, ºñ²¿´Â °Å ¸Â½À´Ï´Ù.
1. 2015³âÀÇ ÁÖ¿ä ÇØÅ· ´ë»óÀº ÀÇ»ç?(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/websense-warns-doctors-to-be-on/
2015³âÀº »ç¹°ÀÎÅÍ³Ý ½Ã´ë°¡ º»°ÝÈ µÊ¿¡ µû¶ó ¾ÆÁ÷ »ç¹°ÀÎÅÍ³Ý ±â±â·Î¼ º¸¾È¼ºÀÌ Ãë¾àÇÑ ÀÇ·á»ê¾÷¿¡ °ø°ÝÀÌ ¸¹ÀÌ ¸ô¸± °ÍÀ̶ó´Â ¿¹ÃøÀÌ ÀÖ¾ú½À´Ï´Ù. ¶ÇÇÑ ¾÷¹« °µµ°¡ ³ôÀº Æí¿¡ ¼ÓÇÏ¸é¼ °³ÀÎÀÇ ¹Î°¨ÇÑ Á¤º¸¸¦ ¼öÁýÇÒ ¼ö¹Û¿¡ ¾ø´Â ÀÇ·á »ê¾÷ÀÇ ¡®Æ¯¼º »ó ¸ÔÀ» °Ô ¸¹Àº µ¥ ¶Õ±âµµ ¾î·ÆÁö ¾ÊÀº¡¯ ÇØÄ¿ÀÇ ³îÀÌÅÍ°¡ µÉ ¼ö¹Û¿¡ ¾ø´Ù´Â °ÍÀÔ´Ï´Ù. º¸¾È ¹æºñ°¡ ½Ã±ÞÇÑ ¿µ¿ªÀ̱ä ÇÕ´Ï´Ù.
2. Áß±¹, À̹ø¿£ HSBC ÀºÇàÀ» ¿øõ Â÷´Ü(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/great-firewall-blocks-access-hsbc/
ÀÎÅÍ³Ý °Ë¿·Î´Â ÃÖ°´ë±¹¿¡ ¼ÓÇÏ´Â Áß±¹ÀÌ À̹ø¿¡´Â HSBC ÀºÇàÀÇ Á¢¼ÓÀ» ¸·¾Ò½À´Ï´Ù. Áß±¹ ³×ƼÁðµé Áß ÇØ¿Ü¿¡¼ ÁøÃâÇÑ »ç¾÷°¡µéÀÌ Æ¯È÷ ÀÌ °©ÀÛ½º·± Á¶Ä¡¿¡ ´çȲÇÏ°í ÀÖ´Ù°í ÇÕ´Ï´Ù. ¾ÆÁ÷ Á¤È®ÇÑ ÀÌÀ¯´Â ¹àÇôÁöÁö ¾Ê°í Àִµ¥¿ä, Áß±¹ÀÌ ¹Ù·Î ¾îÁ¦ ¾ÆÄ«¸¶ÀÌÀÇ ÄÜÅÙÃ÷ Àü¼Û ³×Æ®¿öÅ©¸¦ Â÷´ÜÇÑ °Í°ú ¿¬°üÀÌ ¾øÁö ¾ÊÀ» °ÍÀ̶ó°í º¸°í ÀÖ½À´Ï´Ù. ¼¼°è 2À§ÀÇ °æÁ¦ ±Ô¸ð¸¦ °¡Áø ³ª¶ó¶ó¼ ÀÌ·¸°Ô Çصµ º° ¹®Á¦°¡ ¾øÀ» °ÍÀ̶ó°í º¸´Â °É±î¿ä?
3. ¸Ö¿þ¾î Á¦ÀÛÀÚµé, ¾ÏÈ£È ¹°°á¸¶Àú ¾Ç¿ë(Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/malware-authors-making-a-payday/
ÀÎÅÍ³Ý »ó¿¡¼ ÇÁ¶óÀ̹ö½Ã ¹®Á¦°¡ ºÒ°ÅÁö¸é¼ ¾ÏȣȰ¡ »õ·Ó°Ô ºÎ°¢µÇ°í ÀÖ½À´Ï´Ù. ´©±º°¡ÀÇ °¨½Ã¸¦ ¸·À» ¼ö ÀÖ´Â °¡Àå È¿°úÀûÀÌ°í °£ÆíÇÑ Á¶Ä¡°¡ ¾Ïȣȶó°í ³ª¸§ °á·ÐÀÌ ³ª´Â µíÇÕ´Ï´Ù. ±×·±µ¥ ¹üÁËÀڵ鿡°Ô ÀÌ·± ºÐÀ§±â°¡ ´õ À¯¸®ÇÏ°Ô ÀÛ¿ëÇÏ°í ÀÖ´Ù´Â ¼Ò½ÄÀÔ´Ï´Ù. ¾ÏÈ£ÈµÈ ÆÄÀÏ ¼Ó¿¡ ¸Ö¿þ¾î µîÀ» ¼û±â´Â °Ô ´õ ¿ëÀÌÇØÁ³´Ù³ª¿ä.
4. ¾Èµå·ÎÀÌµå ·Ñ¸®ÆË 5.0¿¡¼´Â º¸¾È ¹ö±× ¼öÁ¤µÅ(Threat Post)
http://threatpost.com/nasty-security-bug-fixed-in-android-lollipop-5-0/109476
¾Èµå·ÎÀ̵å 5.0 ÀÌÇÏ ¹öÀü¿¡¼ ¹ß°ßµÈ java,io.ObjectinputStreamÀÇ Ãë¾àÁ¡Àº °ø°ÝÀÚµéÀÌ ASLRÀ» ¿ìȸÇØ ÀڱⰡ ¸¸µç Äڵ带 ½ÇÇà½ÃÅ°´Â °É °¡´ÉÇÏ°Ô Çß½À´Ï´Ù. ±× ¹ö±×°¡ À̹ø ÁÖÃÊ¿¡ ¹ßÇ¥µÈ ·Ñ¸®ÆË¿¡¼´Â ¿Ïº®ÇÏ°Ô °³¼±µÇ¾ú´Ù°í ÇÕ´Ï´Ù. ¾Èµå·ÎÀÌµå »ç¿ëÀںеéÀº ¾÷µ¥ÀÌÆ®¸¦ ²À ÇÏ¼Å¾ß ÇÏ°Ú½À´Ï´Ù.
5. ¹Ì±¹ ÀÚÀ¯¹ý, ±¹È¸ Åë°ú ¸øÇØ(Threat Post)
http://threatpost.com/freedom-act-rejection-should-keep-encrypt-everything-bandwagon-rolling/109482
¹Ì±¹ »ó¿ø, Á¤ºÎ °¨½Ã °³Çõ¾È ¸·¾Æ(Security Week)
http://www.securityweek.com/us-senate-blocks-government-surveillance-reform-bill
NSA°¡ °³ÇõµÉ Áöµµ ¸ð¸£´Â À§±â¿¡¼ °£½ÅÈ÷ ¹þ¾î³µ½À´Ï´Ù. ¹Ì±¹ ÀÚÀ¯¹ýÀÌ ¿¹»ó ¿Ü·Î Åë°úµÇÁö ¸øÇ߱⠶§¹®ÀÔ´Ï´Ù. ½º³ë¿ìµç »çÅ ÀÌÈÄ·Î °úµµÇÑ Á¤º¸¼öÁý ÇàÀ§ ¶§¹®¿¡ ÁúŸ¸¦ ¹Þ´ø NSA ¹× Á¤ºÎÀÇ °¨½Ã ÇàÀ§°¡ ´çºÐ°£ °ø½Ä Á¦Á¦ ¾øÀÌ °è¼ÓµÉ µí ÇÕ´Ï´Ù. ¹Ý´ëÆÄÀÇ ÀÇ°ßÀº ÇÑ °á °°¾Ò½À´Ï´Ù. Å×·¯¸®½ºÆ®¿¡°Ô ´õ Å« È°µ¿ ¹üÀ§¸¦ Á¦°øÇØÁÖ´Â ²ÃÀÌ µÉ °Å¶ó´Â ÀÇ°ßÀ̾ú´Âµ¥¿ä, ¸¶Ä¡ ¿ì¸®³ª¶ó »ç¶÷µéÀ» ¾çºÐÇÏ°í ÀÖ´Â ºÏÇÑÀ̶õ Á¸Àç°¡ ¶°¿À¸¨´Ï´Ù.
6. NATO, ÃÖ´ë ±Ô¸ðÀÇ »çÀ̹ö ÈÆ·Ã ½Ç½Ã(SC Magazine)
http://www.scmagazine.com/nato-launches-largest-cyber-exercise-to-test-its-network-security/article/384278/
ÃÖ±Ù ¹Ì±¹ Á¤ºÎ ±â°üÀÌ ¿©·¯ Â÷·Ê °ø°ÝÀ» ¹Þ°í NATO ½º½º·Îµµ ÇØÄ¿µé¿¡°Ô ¶Õ¸®¸é¼ ±×¿¡ ´ëÇÑ ¹æ¾î ÈÆ·ÃÀ» NATO°¡ ½Ç½ÃÇß½À´Ï´Ù. ÃÖ´ë ±Ô¸ð¶ó°í ÇÏ´Â À̹ø ÈÆ·ÃÀº Cyber Coalition 2014¶ó´Â À̸§À¸·Î °ÅÇàµÇ¾úÀ¸¸ç 400¸í ÀÌ»óÀÇ Àü¹®°¡µéÀÌ Âü¿©Çß´Ù°í ÇÕ´Ï´Ù. ÁÖ·Î »óȲ ´ëó ¹× Á¤º¸ °øÀ¯¿¡ °É¸®´Â ½Ã°£ÀÌ ¾ó¸¶³ª °É¸®´Â Áö ÃøÁ¤Çß°í, ¸¹Àº »ê¾÷ ¹× ÇаèÀÇ Àü¹®°¡µéÀÌ À̸¦ Âü°üÇß´Ù°í ÇÕ´Ï´Ù.
7. ½ÅÁ¾ ¸ð¹ÙÀÏ º¿³Ý È®»ê Áß(The Register)
http://www.theregister.co.uk/2014/11/19/android_botnet_notcompatible/
°¡Àå ¼±ÁøÈµÈ ¸ð¹ÙÀÏ º¿³Ý ¶°¿À¸£°í ÀÖ¾î(Dark Reading)
http://www.darkreading.com/cloud/the-rise-of-the-resilient-mobile-botnet/d/d-id/1317593?
PC¿¡¸¸ º¿³ÝÀÌ ÀÖ´Â °Ô ¾Æ´Õ´Ï´Ù. ¸ð¹ÙÀÏ ¼¼°è¿¡µµ ÀÖ½À´Ï´Ù. ¹°·Ð ±× ±â´ÉÀÌ ÈξÀ ¶³¾îÁö±ä ÇÏÁÒ. ÇÏÁö¸¸ ±×°Íµµ ¿¾¸»ÀÌ µÇ·Á³ª º¾´Ï´Ù. PCÀÇ º¿³Ý¸¸Å ¹ß´ÞµÈ ¸ð¹ÙÀÏ º¿³ÝÀÌ µîÀåÇß´Ù´Â ¼Ò½ÄÀÌ ÀÖ½À´Ï´Ù. À̸§Àº ³´ÄÄÆÐÅͺí(NotCompatible)À̶ó°í ÇÏ°í, ÀÌ´Â °ð º¿³Ý »Ó ¾Æ´Ï¶ó ¸ð¹ÙÀÏ °èÅëÀÇ ¸Ö¿þ¾îÀÇ Áøȵµ ¶æÇÏ´Â °ÍÀ̱⵵ ÇÕ´Ï´Ù. ¸ð¹ÙÀÏ »ç¿ë¿¡ ´õ ÁÖÀǸ¦ ±â¿ï¿©¾ß ÇÏ°Ú½À´Ï´Ù. ¸çÄ¥ Àü ÇÚµåÆùÀ» ÀÒ¾î¹ö·Á¼ º¿³Ý°ú´Â »ó°ü ¾ø´Âµ¥µµ ±²ÀåÈ÷ ¿Í ´ê´Â ¼Ò½ÄÀÔ´Ï´Ù.
[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]
<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>