“security” trap behind the Qihoo 360 security products


Chinese-style Apples


December 31, 2010, after a hacker indiscriminate bombing of Qihoo 360 server, Qihoo 360 line of defense was breached, spewing out a large number of user privacy data stored on its servers, Google search crawler automatically crawl and announcementsworld. Qihoo 360 years claimed user privacy than days "lie officially debunked.

This accident leaked documents detailed records of a large number of Qihoo 360 user network access process, including browsing the Web, download applications, search keywords, and access to records linked to the unique user. Corresponds to a string in the server, each user query string, you can learn all of the user's personal information, Internet history, account passwords, such as user Baidu search keywords, Taobao shopping records, Kingdee, Chery and other enterprises internal financial network data, a government agency official mailbox user name and password and other linked data.

Upload files to Qihoo 360 cloud storage, file locally, delete, move defense technique is very vicious, even if someone decipher its behavior, and documentary evidence, but because the time of deletion, it is difficult to do the evidence real changeto die without a check against solitary card.

Set so difficult obstacles must be a master of the industry.It can be concluded that, the Qihoo 360 internal certainly domestic top-class master hacker.Be possible to do both dark matter and do not leave any handle. It's like a Jiangyangdadao came and went without a trace, erratic, after committing the crime scene without leaving any trace, is a sophisticated design.

  • Qihoo 360: Internet "goldenrod"
  • The Qihoo 360 backdoor: kidnapping user remote control
  • Qihoo 360 backdoor Shame of security

No comments:

Post a Comment