Coinhive pool
세 51032; 49345;
발 54616;
although the code itself does no harm, your computer will run wildly, and the CPU may reach 100%, causing the computer to jam and waste power.
WiFi Internet access may leak Internet access records
1. CCTV programs expose the security risks of free Wi Fi procts.
recently, CCTV's "news studio" column has exposed the case of how the "Internet artifact" under the banner of free Wi Fi, such as Wi Fi master key, divulges the personal privacy of wi fi users
just when she couldn't figure it out, the technician asked Xiaoshang to recall whether she had any friends who had installed such procts and connected to her home's Wi Fi. Then she remembered that when she was helping her aunt cook with Wi Fi, she saw her aunt installed a Wi Fi master key
this means that as long as you have installed procts like Wi Fi master key, it will automatically share your password when you connect to Wi Fi. What's more worrying is that if hackers use such procts to connect users' Wi Fi, they can monitor, attack and intercept users' bank card information at will, which poses a great threat to users' privacy
Not only that, if hackers attack enterprise Wi Fi, it will pose a serious threat to the business privacy of the enterprise, and cause huge economic losses to the enterprise. LBE security expert Fang Zhenyu demonstrated how to use Wi Fi master key and simple tools to enter the enterprise LAN to view enterprise privacy filesalthough procts such as Wi Fi master key have recently modified some infringement settings and functions under the pressure of public opinion, e to long-term accumulation and huge user groups, such applications still have unavoidable security problems
Google Chrome is the Royal browser of people in the currency circle. Many cryptocurrency wallets and blockchain games are implemented with the help of chrome plug-ins. But just like this, Google Chrome is targeted by criminals who steal users' digital assets by spreading malicious plug-ins
at present, Google Chrome has deleted many facesworm extensions, but users still need to be vigilant, because there are many malicious plug-ins like facesworm that steal digital assets strong>
Yes, there is a leak
in the phishing WiFi environment, if a netizen logs in to the microblog, the hacker can easily hijack the netizen's microblog account by using the conversation mechanism existing on the Internet, which can not only browse the netizen's private message content and encrypted photo album as the owner, but also send microblog and delete microblog
and if Internet users purchase online after accessing WiFi, hackers can also directly access their online shopping accounts to view Internet users' purchase records, personal contact information, home address, etc
extended materials:
related precautions:
1. Use WiFi hotspots in public places carefully. WiFi provided by the official organization and with verification mechanism can be used after being confirmed by the staff. Other public WiFi that can be directly connected and do not need verification or password has high risk, which may be behind the phishing trap and should not be used as far as possible
2. When using WiFi hotspots in public places, online shopping and online banking should be avoided as far as possible to avoid the disclosure of important personal sensitive information or even bank transfer by hackers
open this function, you can limit the pop-up software