Recently, some media reported that a 12G data packet in Jingdong was suspected to be leaking. In response, Jingdong issued a statement in the early morning of the 11th that the data originated from the security vulnerability of Struts 2 in 2013. Jingdong quickly completed the system repair after the security problem occurred. Yesterday's rumors said that Jingdong had a 12G packet leaking data, including user name, password, mailbox, QQ number, phone number, ID card and other dimensions, data up to tens of millions. Looking at the data security landscape in the past year, it can be described as turbulent, especially the second World Internet Conference, which just ended soon. It has pushed the status of data security in China to an unprecedented height. However, data security and data leakage in this year is not a long-term process. On the contrary, with the gradual advancement of information technology, data leakage incidents are growing at an alarming rate. The Internet is like the air, completely integrated into our lives. Therefore, we are increasingly used to keep more and more data online in exchange for more convenient services. However, the security incidents that followed were all shocking. Comprehensive data leakage cases throughout the year we can find: Even though there are many ways to reduce information leakage and mitigate the risk of data leakage, there is always one way to prevent leakage from the source, that is, data encryption. But... very few people really care. JD.com said in a statement that the media’s “Jingdong data suspected leak†report was based on the content of the report by Jingdong’s information security department. The data originated from the security vulnerability issue of Struts 2 in 2013. At that time, almost all Internet companies in China and a large number of Banks and government agencies have been affected, resulting in a large number of data leaks. Jingdong quickly completed the system repair after the security problem of Struts 2, and also issued a security upgrade prompt for users who may have information security risks. At that time, most users affected by this security upgrade their own accounts. . However, there are still very few users who have not upgraded their account security in time, and there are still certain risks. Jingdong expressed strong recommendation that users attach great importance to information security and privacy protection, use unique user names and login passwords in e-commerce and payment systems involving property, open mobile phone authentication and payment passwords, and set login and payment passwords high. Intensive passwords to increase account security. Interest leaked. Jingdong responded on the day before 3.15, saying that “there will be no disclosure of user information†and explained that it may be that some websites leaked private information, and did not use the means of “colliding the library†to obtain user information. According to a report by the British Broadcasting Corporation (BBC) on September 23, Yahoo confirmed that cyber hackers attacked the company and stole information from 500 million Yahoo users. The attack occurred at the end of 2014, and hackers included a large number of personally identifiable information about users and "security questions and answers without encryption." It is unclear whether the hacking attack affected Yahoo's sale and valuation. In August of this year, a cyber hacker called "Peace" apparently tried to sell information on 200 million Yahoo accounts, and news that Yahoo might have been hit by a major cyber attack surfaced. Yahoo confirmed on the 22nd that the scale of the cyberattack was much larger than originally anticipated. It advises all users that if they have not changed their password since 2014, they should change their password. The Yahoo website says the stolen information does not include any credit card data. Yahoo also added that it believes the attack is an action supported by a government. In July this year, Yahoo sold to US telecommunications giant Verizon for $4.8 billion. MicroBT is a technology company which is based on block chain and artificial intelligence. Focusing on integrated circuit chip and products development, production and sales, and provide corresponding system solutions and technical services. We adhere the ideal"ultimate,win-win,integrity"to provide high quality products and service. Now MicroBT has passed the national high-tech enterprise certification.
In addition to the current focus on the area of block chains, MicroBT is also responding to the national chip strategy. According to the company's development strategy and plan, MicroBT is planning to explore and extend its core R&D capabilities to other high-performance computing areas such as artificial intelligence through independent R&D and strategic cooperation.
MicroBT Whatsminer:MicroBT Whatsminer M50S,MicroBT Whatsminer M30S++,MicroBT Whatsminer M21,MicroBT Whatsminer D1,MicroBT Whatsminer M30S,MicroBT Whatsminer M10,MicroBT Whatsminer M31S+,MicroBT Whatsminer M20S
Microbt Whatsminer,M30S Microbt Whatsminer,Whatsminer Miner,M50 Miner,Asic Whatsminer Shenzhen YLHM Technology Co., Ltd. , https://www.hkcryptominer.com
As a chip design and produce company, completely design process and independent core technology. The core technology include algorithm,fine optimization of integrated circuit micro-structure ,low power technology, advanced chip packaging technology system level power and cooling technology. These core technologies and engineering methods have been successfully validated and applied in the mass production of our block chain server chips and products.