The Security Weakness of Smart Buildings: KNX and Zigbee Networks

The Security Weakness of Smart Buildings: KNX and Zigbee Networks

For more global cybersecurity news, visit E-Security’s official website at www.easyaq.com E-Security reports on April 1st that people are increasingly living and working in “smart” buildings, relying on automated processes to control heating, ventilation, air conditioning, lighting, security, and other operational systems. Are these systems capable of withstanding cyber attack threats? A research team from … Read more

Severe Vulnerability Found in Wi-Fi Encryption System, 50% of Android Systems Particularly Vulnerable

Severe Vulnerability Found in Wi-Fi Encryption System, 50% of Android Systems Particularly Vulnerable

Annual subscribers can join the Technology English Learning Community, with weekly live classes on technology English. For details, see “Read the original text”. This Monday, a paper published by researchers Mathy Vanhoef and Frank Piessens from KU Leuven in Belgium regarding a security vulnerability in WPA2 (Wi-Fi Protected Access II) caused a seismic shock in … Read more

Core Technology is the National Treasure: The Development of the Cybersecurity Industry Relies on Self-Control

Core Technology is the National Treasure: The Development of the Cybersecurity Industry Relies on Self-Control

Global Technology Map Innovation | Frontier | Science Popularization | Information In recent years, the Central Committee of the Party and President Xi have placed great importance on the construction and development of self-controlled cybersecurity. The ZTE incident has also shown that self-control is the path for the development of China’s cybersecurity industry, and core … Read more

Analysis of ADDP Protocol and Its Potential for DDoS Reflection Attacks

Executive SummaryIn recent years, an increasing number of protocols capable of causing UDP reflection attacks have come to the forefront, such as CoAP[1], Ubiquiti[2], WS-Discovery[3], OpenVPN[4], and a certain DVR protocol[5]. These attack methods differ from the well-known reflection attack types like DNS, SSDP, NTP, and Memcached, posing certain challenges for DDoS attack protection. In … Read more

A Brief Analysis of Hyperjacking Attacks in Virtualized Environments

A Brief Analysis of Hyperjacking Attacks in Virtualized Environments

In September 2022, security researchers discovered a rare new type of attack method known as Hyperjacking. Attackers deployed an infection implant within VMware virtualization software to control the infected virtual machine systems and evade detection. It is important to emphasize that the danger of this attack lies not in exploiting external remote code execution vulnerabilities, … Read more

Exploring Business Security Automation Penetration Testing Frameworks

Exploring Business Security Automation Penetration Testing Frameworks

Author / Senior Information Technology Expert at China Postal Savings Bank Software Development Center, Pan Hua China Postal Savings Bank Software Development Center, Wang Qifeng, Li Beichuan, Zhang Guozheng In recent years, with the rapid development of technologies such as artificial intelligence, big data, and cloud computing, emerging technologies have been increasingly integrated with traditional … Read more

Breaking the Myth of Air-Gapped Network Security! Air-Gapped Networks Still Vulnerable to DNS Attacks

Breaking the Myth of Air-Gapped Network Security! Air-Gapped Networks Still Vulnerable to DNS Attacks

In May 2022, Dark Reading reported that researchers from Nozomi Networks discovered that common misconfigurations of the Domain Name System (DNS) in enterprise environments could expose air-gapped networks and their high-value assets to external attackers. A blog post by Nozomi Networks’ ICS analyst team explained that this flaw exists in all versions of the widely … Read more

Renesas’ Innovative Approach to Cabin Domain Controllers: A GGAI Perspective

Renesas' Innovative Approach to Cabin Domain Controllers: A GGAI Perspective

/* Click the bottom to read the original text and register online, deadline June 19 */ Join the Gaogong Intelligent Automotive Industry Group (Autonomous Driving Industry Group 5, Intelligent Connected Cabin Group 3, Intelligent Commercial Vehicle Industry Group) by adding WeChat: 15818636852 and showing your business card, limited to intelligent connected vehicle parts and OEM … Read more

Understanding System DNS and HTTPDNS: Principles, Features, and Applications

/ Today’s Tech News / Recently, the China Cybersecurity Association published a statement disclosing frequent security vulnerabilities in Intel CPUs, poor reliability, user monitoring, and hidden backdoors, suggesting that Intel has ignored user complaints and recommending the company to initiate a cybersecurity review. In response, Intel issued a statement emphasizing that product safety and quality … Read more

In-Depth Analysis of HTTPS Security: The Secret Weapon for Safe Web Transmission!

In-Depth Analysis of HTTPS Security: The Secret Weapon for Safe Web Transmission!

Linux | Red Hat Certified | IT Technology | Operations Engineer 👇 Join the technical exchange QQ group of 1000 people, note 【Public Account】 for faster approval 1. What is HTTPS? HTTPS is HTTP that has been encrypted and decrypted. HTTPS is also an application layer protocol that introduces an encryption layer on top of … Read more