{"id":52990,"date":"2017-11-03T09:00:00","date_gmt":"2017-11-03T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=52990"},"modified":"2017-10-24T11:35:13","modified_gmt":"2017-10-24T03:35:13","slug":"%e8%90%ac%e7%89%a9%e8%81%af%e7%b6%b2%e6%99%82%e4%bb%a3%e4%bd%a0%e8%a6%ba%e5%be%97%e5%ae%89%e5%85%a8%e5%97%8e","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=52990","title":{"rendered":"\u842c\u7269\u806f\u7db2\u6642\u4ee3,\u4f60\u89ba\u5f97\u5b89\u5168\u55ce?"},"content":{"rendered":"<p>\u79d1\u6280\u80af\u5b9a\u6539\u8b8a\u4e86\u4e16\u754c\u7684\u904b\u4f5c\u65b9\u5f0f\uff0c\u5e7e\u4e4e\u5f71\u97ff\u4e86\u73fe\u4ee3\u751f\u6d3b\u7684\u5404\u500b\u5c64\u9762\u3002\u96d6\u7136\u73fe\u4ee3\u79d1\u6280\u4e0d\u53ef\u5426\u8a8d\u5730\u5e36\u4f86\u4e86\u5404\u7a2e\u597d\u8655\uff0c\u4f46\u4e5f\u6709\u5176\u4e0d\u597d\u7684\u5730\u65b9\u3002\u5c07\u6240\u6709\u8a2d\u5099\u548c\u7cfb\u7d71\u8207\u7db2\u969b\u7db2\u8def\u806f\u7e6b\u5728\u4e00\u8d77\u4e5f\u8b93\u60e1\u610f\u529b\u91cf\u6df7\u4e86\u9032\u4f86\uff0c\u8b93\u4f7f\u7528\u8005\u548c\u4f01\u696d\u9762\u81e8\u5404\u5f0f\u5404\u6a23\u7684\u5a01\u8105\u3002\u4f60\u8a72\u5982\u4f55\u4fdd\u6301\u5b89\u5168\uff1f<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/technology.jpg\" \/><\/p>\n<h3><strong>\u6bcf\u5929\u8d77\u5e8a\u7684\u90a3\u4e00\u523b\u8d77<\/strong><\/h3>\n<p>\u4f60\u624b\u6a5f\u4e0a\u7684\u9b27\u9418\u5728\u65e9\u4e0a\u53eb\u4f60\u8d77\u5e8a\uff0c\u4f60\u99ac\u4e0a\u5c31\u67e5\u770b\u4e86\u793e\u7fa4\u7db2\u8def\u4e0a\u7684\u66f4\u65b0\u3002\u65b0\u805e\u548c\u6700\u65b0\u6d88\u606f\u5728\u904e\u53bb\u662f\u4f86\u81ea\u6668\u9593\u7684\u5831\u7d19\u6216\u662f\u96fb\u8a71\u4e2d\u7684\u4ea4\u8ac7\u3002\u7d93\u904e\u9019\u5341\u591a\u5e74\uff0c\u5df2\u7d93\u88ab\u793e\u7fa4\u5a92\u9ad4\u53d6\u4ee3\u3002<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u4fdd\u8b77\u793e\u7fa4\u5a92\u9ad4\u5e33\u865f<\/strong><\/p>\n<p>\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u53ef\u4ee5\u5f9e\u4f60\u7684\u793e\u7fa4\u5a92\u9ad4\u5e33\u865f\u5167\u6316\u6398\u500b\u4eba\u8cc7\u6599\uff0c\u5982\u679c\u4f60\u7684\u5e33\u865f\u8207\u5de5\u4f5c\u96fb\u5b50\u90f5\u4ef6\u76f8\u9023\u7d50\uff0c\u5c31\u8b93\u4ed6\u5011\u4e5f\u6709\u6a5f\u6703\u5165\u4fb5\u4f01\u696d\u7db2\u8def\u3002\u8a72\u5982\u4f55<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=50127\">\u4fdd\u8b77\u4f60\u7684\u5e33\u865f\u5b89\u5168<\/a>\uff1a<\/p>\n<ul>\n<li>\u6aa2\u67e5\u54ea\u4e9b\u61c9\u7528\u7a0b\u5f0f\u9023\u7d50\u5230\u4f60\u7684\u793e\u7fa4\u5e33\u865f\u3002<\/li>\n<li>\u9075\u884c\u826f\u597d\u7684\u5bc6\u78bc\u7fd2\u6163\u3002<\/li>\n<li>\u4fdd\u6301\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u66f4\u65b0\u3002<\/li>\n<li>\u5728\u793e\u7fa4\u5a92\u9ad4\u5e33\u6236\u4f7f\u7528\u7368\u7279\u7684\u96fb\u5b50\u90f5\u4ef6\u5730\u5740\u3002<\/li>\n<\/ul>\n<p>\u884c\u52d5\u7528\u6236\u53ef\u4ee5\u6309\u7167\u9019\u4e9b<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/best-practices-securing-your-mobile-device\">\u7c21\u55ae\u7684\u6b65\u9a5f<\/a>\u4f86\u4fdd\u8b77\u81ea\u5df1\u7684\u8a2d\u5099\u3002<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u96fb\u8996\u6a5f\u548c\u7a7a\u8abf\u7b49\u5bb6\u96fb\u73fe\u5728\u53ef\u4ee5\u5728\u624b\u6a5f\u4e0a\u900f\u904e\u61c9\u7528\u7a0b\u5f0f\u52a0\u4ee5\u63a7\u5236\uff0c\u9019\u53ea\u662f<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u7269\u806f\u7db2 IoT ,Internet of Thing\uff09<\/a>\u6280\u8853\u9032\u5165\u5e02\u5834\u7684\u4f8b\u5b50\u4e4b\u4e00\u3002Amazon\u5229\u7528\u8a9e\u97f3\u63a7\u5236\u7cfb\u7d71\u6240\u9a45\u52d5\u7684\u7121\u7dda\u5587\u53ed \u2013 <a href=\"https:\/\/www.amazon.com\/dp\/B00X4WHP5E?SubscriptionId=AKIAJM4NKIQGABP2PIRA&amp;linkCode=xm2\">Echo<\/a>\u53ef\u4ee5\u8b93\u4f7f\u7528\u8005\u4e0d\u7528\u9059\u63a7\u5668\u6216\u624b\u6a5f\u5c31\u53ef\u4ee5\u641c\u5c0b\u7db2\u8def\u3001\u7dda\u4e0a\u8cfc\u7269\u3001\u53d6\u5f97\u5929\u6c23\u5831\u544a\u548c\u63a7\u5236\u667a\u6167\u5bb6\u5c45\u7522\u54c1\u3002\u6839\u64da\u5831\u5c0e\uff0c\u5728<a href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2017\/01\/26\/alexa-google-siri-cortana-24-5m-voice-first-devices-will-ship-this-year\/#29762497237d\">2017\u5e74\u6709\u8d85\u904e 2,400\u842c\u53f0\u5177\u5099\u8a9e\u97f3\u80fd\u529b\u7684\u6a5f\u5668\u51fa\u8ca8<\/a>\uff0c\u800c\u4e14\u9019\u6a23\u7684\u6210\u9577\u9084\u6c92\u6709\u505c\u6b62\u7684\u8de1\u8c61\u3002<\/p>\n<p>\u540c\u6642\uff0c\u5176\u4ed6IoT\u8a2d\u5099\u4e5f\u88ab\u8a2d\u8a08\u6210\u6e1b\u5c11\u4e00\u822c\u7684\u8a2d\u5b9a\u3002\u667a\u6167\u6046\u6eab\u5668\u53ef\u4ee5\u81ea\u52d5\u8abf\u7bc0\u6eab\u5ea6\uff0c\u800c\u667a\u6167\u51b0\u7bb1\u53ef\u4ee5\u5728\u5b58\u91cf\u8b8a\u5c11\u6642\u901a\u77e5\u4f7f\u7528\u8005\u3002<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u4fdd\u8b77\u4f60\u7684\u5bb6\u5ead\u7db2\u8def<\/strong><\/p>\n<ul>\n<li>\u00a0\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/housecall\/home-network.html\">\u5bb6\u5eadIoT\u8a2d\u5099\u7528HouseCall<\/a>\u53ef\u4ee5\u6383\u63cf\u4f60\u7684\u5bb6\u5ead\u7db2\u8def\u8a2d\u5099\u4f86\u627e\u51fa\u6f5b\u5728\u98a8\u96aa\uff0c\u4e26\u5c0d\u5982\u4f55\u6d88\u9664\u9019\u4e9b\u98a8\u96aa\u63d0\u4f9b\u5efa\u8b70\u3002<\/li>\n<li>\u60f3\u4e86\u89e3\u5982\u4f55\u9632\u8b77\u5177\u5099\u9023\u7db2\u80fd\u529b\u7684\u8a9e\u97f3\u52a9\u624b\uff0c\u8acb\u9ede\u64ca<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/how-secure-are-your-internet-enabled-voice-assistants\">\u9019\u88e1<\/a>\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>\u524d\u5f80\u516c\u53f8\u4e0a\u73ed\u7684\u8def\u4e0a<\/strong><\/h3>\n<p>\u7576\u4f60\u96e2\u958b\u5bb6\u53bb\u5de5\u4f5c\u6642\uff0c\u60f3\u5230\u585e\u8eca\u548c\u7a7a\u6c23\u6c61\u67d3\u5c31\u5c0d\u901a\u52e4\u7522\u751f\u5bb3\u6015\u7684\u611f\u89ba\u3002\u50cfUber\u548cLyft\u9019\u6a23\u7684\u73fe\u4ee3\u904b\u8f38\u7db2\u8def\u516c\u53f8\u627e\u5230<a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-securing-smart-cities.pdf\">\u8fa6\u6cd5<\/a>\u4f86\u589e\u52a0\u6c7d\u8eca\u7684\u4eba\u5747\u6548\u7528\uff0c\u6e1b\u5c11\u585e\u8eca\u548c\u78b3\u6392\u653e\uff0c\u6e1b\u5c11\u5c0d\u505c\u8eca\u4f4d\u7684\u9700\u6c42\u3002\u4e92\u76f8\u9023\u7d50\u7684\u529b\u91cf\u66ff\u6c7d\u8eca\u5171\u4eab\u548c\u5171\u4e58\u670d\u52d9\u63d0\u4f9b\u4e00\u500b\u7dda\u4e0a\u5e73\u53f0\u4f86\u5c07\u4e58\u5ba2\u548c\u8077\u696d\u53f8\u6a5f\u9023\u7d50\u5728\u4e00\u8d77\uff0c\u8b93\u901a\u52e4\u4e0a\u73ed\u7684\u4eba\u66f4\u65b9\u4fbf\u3002<!--more--><\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u9632\u6b62\u8eab\u4efd\u7aca\u76dc<\/strong><\/p>\n<p>\u57282016\u5e74\uff0cUber\u7121\u610f\u4e2d<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/phantom-trips-after-stolen-uber-accounts-sold-in-the-dark-web\">\u66b4\u9732<\/a>\u4e8650,000\u591a\u540d\u8a3b\u518a\u61c9\u7528\u7a0b\u5f0f\u7684\u53f8\u6a5f\u8cc7\u6599\u3002<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/online-privacy\/identity-theft-and-the-value-of-your-personal-data\">\u4fdd\u8b77\u81ea\u5df1\u5c0d\u6297\u8eab\u4efd\u7aca\u76dc\u548c\u5176\u4ed6\u7db2\u8def\u5a01\u8105<\/a>\uff1a<\/p>\n<ul>\n<li>\u907f\u514d\u6253\u958b\u96fb\u5b50\u90f5\u4ef6\u9644\u4ef6\u6a94\u548c\u9ede\u5165\u60e1\u610f\u9023\u7d50\u3002<\/li>\n<li>\u4e86\u89e3\u7db2\u7ad9\u7684\u96b1\u79c1\u548c\u5b89\u5168\u653f\u7b56\u3002<\/li>\n<li>\u00a0\u5c07\u53ef\u4fe1\u7684\u7db2\u7ad9\u52a0\u5165\u66f8\u7c64\uff0c\u7279\u5225\u662f\u5e38\u88ab\u7528\u65bc\u7dda\u4e0a\u8cfc\u7269\u7684\u7db2\u7ad9\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u4e00\u4e9b\u57ce\u5e02\u5df2\u7d93\u5177\u5099\u667a\u6167\u4ea4\u901a\u7ba1\u7406\u7684\u80fd\u529b\u3002\u667a\u6167\u4ea4\u901a\u7ba1\u7406<a href=\"https:\/\/www.smartertransport.uk\/smart-traffic-management\/\">\u9700\u8981<\/a>\u4e00\u500b\u4e2d\u592e\u7cfb\u7d71\u4f86\u63a7\u5236\u4ea4\u901a\u865f\u8a8c\u548c\u5075\u6e2c\u5668\u4f86\u8abf\u7bc0\u6574\u500b\u57ce\u5e02\u7684\u4ea4\u901a\u6d41\u91cf\u548c\u6700\u4f73\u5316\uff0c\u6e1b\u5c11\u60f3\u8de8\u8d8a\u8857\u9053\u884c\u4eba\u7684\u7b49\u5f85\u6642\u9593\u3002<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u4fdd\u8b77\u667a\u6167\u57ce\u5e02<\/strong><\/p>\n<p>\u70ba\u4e86\u6307\u5c0e\u667a\u6167\u57ce\u5e02\u958b\u767c\u8005\uff0c\u9019\u88e1\u662f\u4e00\u4efd\u4ed6\u5011\u5728\u5be6\u65bd\u667a\u6167\u6280\u8853\u6642\u53ef\u4ee5\u53c3\u8003\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/securing-smart-cities\">\u7db2\u8def\u5b89\u5168\u5feb\u901f\u6e05\u55ae<\/a>\uff1a<\/p>\n<ul>\n<li>\u00a0\u9032\u884c\u54c1\u8cea\u6aa2\u6e2c\u548c\u6ef2\u900f\u6e2c\u8a66\u3002<\/li>\n<li>\u00a0\u5c07\u5b89\u5168\u6027\u653e\u5165\u6240\u6709\u4f9b\u61c9\u5546\u548c\u670d\u52d9\u5546\u7684\u670d\u52d9\u5c64\u7d1a\u5354\u8b70\uff08SLA\uff09\u91cd\u9ede\u3002<\/li>\n<li>\u00a0\u5efa\u7acb\u5e02\u653f\u5e9c\u7684\u96fb\u8166\u7dca\u6025\u61c9\u8b8a\u5c0f\u7d44\uff08CERT\uff09\u6216\u96fb\u8166\u5b89\u5168\u4e8b\u4ef6\u53cd\u61c9\u5c0f\u7d44\uff08CSIRT\uff09\u3002<\/li>\n<li>\u00a0\u52a0\u5bc6\u3001\u8a8d\u8b49\u548c\u898f\u7bc4\u516c\u5171\u901a\u8a0a\u983b\u9053\u3002<\/li>\n<li>\u59cb\u7d42\u5141\u8a31\u624b\u52d5\u63a5\u7ba1\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>\u5728\u5de5\u4f5c\u5834\u6240<\/strong><\/h3>\n<p>\u5728\u5de5\u4f5c\u5834\u6240\uff0c\u751f\u7269\u8b58\u5225\u7cfb\u7d71\uff08\u5982\u6307\u7d0b\u8fa8\u8b58\u548c\u81c9\u90e8\u8fa8\u8b58\u7cfb\u7d71\uff09\u88ab\u7528\u4f86\u9032\u884c\u54e1\u5de5\u8a8d\u8b49\u3002\u53d6\u4ee3\u5bc6\u78bc\u4f86\u5b89\u5168\u5730\u9032\u5165\u8fa6\u516c\u5ba4\u53ea\u662f\u751f\u7269\u8b58\u5225\u8a8d\u8b49\u7684\u773e\u591a\u7528\u9014\u4e4b\u4e00\u3002\u5168\u7403\u7522\u696d\u548c\u653f\u5e9c\u4e5f\u5728<a href=\"https:\/\/www.marketsandmarkets.com\/Market-Reports\/next-generation-biometric-technologies-market-697.html\">\u589e\u52a0\u63a1\u7528<\/a>\uff0c\u5305\u62ec\u6574\u5408\u667a\u6167\u578b\u624b\u6a5f\uff0c\u5728\u653f\u5e9c\u6a5f\u69cb\u63a1\u7528\u751f\u7269\u8b58\u5225\u7cfb\u7d71\uff0c\u4ee5\u53ca<a href=\"https:\/\/www.nerdwallet.com\/blog\/banking\/biometrics-when-your-bank-scans-your-voice-face-or-eyes\/\">\u91d1\u878d<\/a>\u548c<a href=\"https:\/\/nymi.com\/blog\/nymi-band-industrial-iot-device\">\u95dc\u9375\u7522\u696d<\/a>\u4f7f\u7528\u8d8a\u4f86\u8d8a\u591a\u7684\u751f\u7269\u8b58\u5225\u6280\u8853\u3002<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u4fdd\u8b77\u751f\u7269\u8b58\u5225\u7cfb\u7d71<\/strong><\/p>\n<p>\u751f\u7269\u8b58\u5225\u7cfb\u7d71\u4e26\u975e100%\u5b89\u5168\uff0c\u4ecd\u53ef\u80fd\u88ab\u653b\u7834\u6216\u88ab\u99ed\u5ba2\u5165\u4fb5\u3002\u4ee5\u4e0b\u662f<a href=\"https:\/\/www.trendmicro.com\/vinfo\/ie\/security\/news\/security-technology\/prioritizing-the-security-of-biometric-authentication\">\u4fdd\u8b77\u751f\u7269\u8b58\u5225\u7cfb\u7d71<\/a>\u7684\u5efa\u8b70\uff1a<\/p>\n<ul>\n<li>\u751f\u7269\u7279\u5fb5\u8cc7\u6599\u9032\u51fa\u5f8c\u7aef\u4f3a\u670d\u5668\u6642\u8981\u9032\u884c\u52a0\u5bc6\u3002<\/li>\n<li>\u5728\u611f\u6e2c\u88dd\u7f6e\u4e0a<a href=\"https:\/\/books.google.com.ph\/books?id=6StqCQAAQBAJ&amp;pg=PA63&amp;lpg=PA63&amp;dq=how+biometric+sample+is+converted+to+digital&amp;source=bl&amp;ots=UpUCEtC4d7&amp;sig=dK9pby__6-441w9aXHRP5xjzf6I&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwihy9rlktjVAhWETLwKHTjOCzsQ6AEISzAI#v=onepage&amp;q=how%20\">\u9032\u884c<\/a>\u5373\u6642\u5075\u6e2c\uff0c\u9632\u6b62\u7528\u5047\u751f\u7269\u8b58\u5225\u6b3a\u9a19\u611f\u6e2c\u5668\u3002<\/li>\n<li>\u901a\u904e\u5efa\u7acb\u7fa4\u7d44\u548c\u89d2\u8272\u4f86<a href=\"https:\/\/searchsecurity.techtarget.com\/answer\/How-to-store-and-protect-captured-data-on-the-back-end-of-a-biometric-application\">\u9650\u5236<\/a>\u5c0d\u4f3a\u670d\u5668\u7684\u7ba1\u7406\u5b58\u53d6\u3002<\/li>\n<li>\u907f\u514d\u4ea4\u53c9\u6bd4\u5c0d\u529f\u80fd\u4f86<a href=\"https:\/\/www.bayometric.com\/biometric-template-security\/\">\u4fdd\u8b77<\/a>\u4f7f\u7528\u8005\u96b1\u79c1\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>\u4f01\u696d\u5728\u904e\u53bb\u5e7e\u5e74\u958b\u59cb\u64c1\u62b1\u81ea\u5e36\u88dd\u7f6e\uff08BYOD\uff09\u7684\u767c\u5c55\uff0c\u5141\u8a31\u5c07\u90e8\u5206\u8cc7\u6e90\u5132\u5b58\u6216\u91cd\u5c0e\u5230\u7d44\u7e54\u7684\u5176\u4ed6\u90e8\u4f4d\u3002\u54e1\u5de5\u53ef\u4ee5\u5c07\u81ea\u5df1\u7684\u500b\u4eba\u8a2d\u5099\u5e36\u5230\u5de5\u4f5c\u5834\u6240\u4f86\u9032\u884c\u65e5\u5e38\u5de5\u4f5c\u3002\u800c\u7d44\u7e54\u4e5f\u53ef\u4ee5\u4eab\u6709\u9019\u4e9b\u8a2d\u5099\u6240\u5e36\u4f86\u7684\u6548\u7387\u548c\u751f\u7522\u529b\u800c\u7121\u9700\u4ed8\u51fa\u4ee3\u50f9\u3002<\/p>\n<p>\u53e6\u4e00\u65b9\u9762\uff0c<a href=\"https:\/\/www.trendmicro.com.ph\/vinfo\/ph\/security\/news\/internet-of-things\/rogue-robots-testing-industrial-robot-security\">\u5de5\u696d\u6a5f\u5668\u4eba<\/a>\u56e0\u70ba\u5176\u6548\u7387\u548c\u7cbe\u6e96\u6027\u800c\u5728\u4e16\u754c\u5404\u5730\u8a31\u591a\u5927\u898f\u6a21\u751f\u7522\u548c\u88fd\u9020\u6d3b\u52d5\u4e2d\u53d6\u4ee3\u4e86\u4eba\u529b\u3002\u9019\u4e9b\u6a5f\u68b0\u3001\u53ef\u7de8\u7a0b\u8a2d\u5099\u73fe\u5728\u51fa\u73fe\u5728\u5404\u500b\u5de5\u696d\u90e8\u9580\uff0c\u88fd\u9020\u6c7d\u8eca\u3001\u88fd\u9020\u98db\u6a5f\u96f6\u4ef6\u3001\u5408\u6210\u98df\u54c1\uff0c\u751a\u81f3\u63d0\u4f9b\u95dc\u9375\u516c\u5171\u670d\u52d9\u3002<\/p>\n<p>&nbsp;<\/p>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td width=\"623\"><strong>\u4fdd\u8b77\u5de5\u696d\u6a5f\u5668\u4eba<\/strong><\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7814\u7a76\u4eba\u54e1\u5df2\u7d93\u5c55\u793a\u4e86\u5de5\u696d\u6a5f\u5668\u4eba\u53ef\u4ee5\u88ab\u64cd\u5f04\u3002\u4ee5\u4e0b\u662f\u4e00\u4e9b\u80fd\u5920\u4fdd\u8b77\u5b83\u5011\u7684<a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-industrial-robot-security.pdf\">\u5b89\u5168\u63aa\u65bd<\/a>\uff1a<\/p>\n<ul>\n<li>\u5fc5\u9808\u843d\u5be6\u5b89\u5168\u6a5f\u5236\u4f86\u78ba\u4fdd\u4eba\u985e\u64cd\u4f5c\u54e1\u53ef\u4ee5\u5b89\u5168\u5730\u63a5\u624b\u975e\u9810\u671f\u6216\u4e0d\u597d\u7684\u6a5f\u5668\u4eba\u884c\u70ba\u3002<\/li>\n<li>\u00a0\u9700\u8981\u6709\u6548\u548c\u6613\u65bc\u61c9\u7528\u7684\u653b\u64ca\u5075\u6e2c\u65b9\u6cd5\u4f86\u70ba\u89e3\u6c7a\u5a01\u8105\u63d0\u4f9b\u77ed\u671f\u81f3\u4e2d\u671f\u7684\u89e3\u6c7a\u65b9\u6848\u3002<\/li>\n<li>\u00a0\u7814\u7a76\u548c\u7522\u696d\u90e8\u9580\u61c9\u8a72\u8981\u63d0\u4f9b\u77ed\u671f\u89e3\u6c7a\u65b9\u6848\u4f86\u6e1b\u8f15\u6f0f\u6d1e\u9020\u6210\u7684\u5f71\u97ff\u3002<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u4e0a\u8ff0\u4f8b\u5b50\u53ea\u662f\u63a1\u7528\u6216\u5c07\u65b0\u6280\u8853\u878d\u5165\u65e5\u5e38\u751f\u6d3b\u4e2d\u7684\u4e00\u4e9b\u4f8b\u5b50\u3002\u7576\u6211\u5011\u7372\u5f97\u79d1\u6280\u6240\u5e36\u4f86\u7684\u597d\u8655\u548c\u4fbf\u5229\u6027\u7684\u540c\u6642\uff0c\u6211\u5011\u4e5f\u61c9\u8a72\u8981\u4e86\u89e3\u5a01\u8105\u4e5f\u8ddf\u79d1\u6280\u4e00\u6a23\u7e3d\u662f\u5728\u9032\u5316\u8457\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/security-risks-in-a-technology-driven-world\">Security Risks in a Technology-Driven World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u79d1\u6280\u80af\u5b9a\u6539\u8b8a\u4e86\u4e16\u754c\u7684\u904b\u4f5c\u65b9\u5f0f\uff0c\u5e7e\u4e4e\u5f71\u97ff\u4e86\u73fe\u4ee3\u751f\u6d3b\u7684\u5404\u500b\u5c64\u9762\u3002\u96d6\u7136\u73fe\u4ee3\u79d1\u6280\u4e0d\u53ef\u5426\u8a8d\u5730\u5e36\u4f86\u4e86\u5404\u7a2e\u597d\u8655\uff0c\u4f46\u4e5f\u6709\u5176\u4e0d\u597d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1335],"tags":[1519],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/52990"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=52990"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/52990\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=52990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=52990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=52990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}