{"id":6413,"date":"2013-10-15T09:00:16","date_gmt":"2013-10-15T01:00:16","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=6413"},"modified":"2014-03-26T14:43:15","modified_gmt":"2014-03-26T06:43:15","slug":"%e5%a0%b1%e5%91%8a%e9%ab%98%e9%a2%a8%e9%9a%aa%e6%89%8b%e6%a9%9f%e6%87%89%e7%94%a8%e7%a8%8b%e5%bc%8f%e5%85%ad%e6%88%90%e6%9c%83%e6%94%b6%e9%9b%86%e4%bd%9c%e6%a5%ad%e7%b3%bb%e7%b5%b1%e8%b3%87%e8%a8%8a","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=6413","title":{"rendered":"\u7db2\u8def\u5371\u6a5f~\u5831\u544a:\u9ad8\u98a8\u96aa\u624b\u6a5f\u61c9\u7528\u7a0b\u5f0f,\u516d\u6210\u6703\u6536\u96c6\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u7b49\u8cc7\u8a0a"},"content":{"rendered":"<p>\u96d6\u7136\u4eca\u5e74\u9084\u6709\u4e09\u500b\u6708\u624d\u7d50\u675f\uff0c\u4f46\u662f<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u5c0d\u65bc\u884c\u52d5\u5a01\u8105\u7684<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/predictions-for-2013\/\">\u9810\u6e2c<\/a>\uff0c\u7279\u5225\u662f\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u6703\u9054\u5230100\u842c\u5927\u95dc\u9019\u9ede\u5df2\u7d93\u6210\u771f\u4e86\u3002<\/p>\n<p><strong>\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u7834\u767e\u842c<\/strong><\/p>\n<p>\u5728<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u4eca\u5e74<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mobile-threats-in-full-throttle\/\">\u7b2c\u4e8c\u5b63\u7684\u5b89\u5168\u7d9c\u5408\u5831\u544a<\/a>\u88e1\uff0c\u6211\u5011\u63d0\u5230\u6709\u8d85\u904e70\u842c\u7684\u60e1\u610f\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u6d41\u7ac4\u5728\u5916\u3002\u9019\u662f\u500b\u4ee4\u4eba\u9a5a\u8a1d\u7684\u6578\u5b57\uff0c\u52a0\u4e0a\u9019\u5e73\u53f0\u7684\u4f7f\u7528\u8005\u6578\u91cf\u8d8a\u4f86\u8d8a\u591a\uff0c\u8b93\u6211\u5011\u9810\u6e2c2013\u5e74\u5c07\u6703\u662fAndroid\u60e1\u610f\u8edf\u9ad4\u9054\u5230100\u842c\u7684\u4e00\u5e74\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc \u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f,\u516d\u6210\u6703\u6536\u96c6\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u8cc7\u8a0a\u7b49\u5ee3\u544a\u8edf\u9ad4\u548c\u8cc7\u6599\u7aca\u53d6\u7a0b\u5f0f\" alt=\"\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc \u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f,\u516d\u6210\u6703\u6536\u96c6\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u8cc7\u8a0a\u7b49\u5ee3\u544a\u8edf\u9ad4\u548c\u8cc7\u6599\u7aca\u53d6\u7a0b\u5f0f\" src=\" https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2013\/10\/Android-App-Growth-Comparison-02.jpg\" width=\"550\" height=\"330\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><i>\u5716\u4e00\u3001Android\u60e1\u610f\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u7684\u6210\u9577<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>\u6839\u64da\u6211\u5011<a href=\"https:\/\/www.trendmicro.com\/us\/home\/products\/mobile-solutions\/android-security\/index.html\">\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u4fe1\u8b7d\u8a55\u6bd4\u670d\u52d9<\/a>\u7684\u8cc7\u6599\uff0c\u73fe\u5728\u5df2\u7d93\u6709<b>100\u842c\u7684\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\uff08\u5982\u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\uff09\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\uff08\u6703\u7a4d\u6975\u63d0\u4f9b\u5ee3\u544a\u5c0e\u5411\u53ef\u7591\u7db2\u7ad9\u7684\u61c9\u7528\u7a0b\u5f0f\uff09<\/b>\u3002\u5728\u6211\u5011\u6240\u767c\u73fe\u7684\u9019100\u842c\u500b\u6709\u554f\u984c\u7684\u61c9\u7528\u7a0b\u5f0f\u4e2d\uff0c75\uff05\u662f\u5fb9\u982d\u5fb9\u5c3e\u7684\u60e1\u610f\u7a0b\u5f0f\uff0c25 \uff05\u5247\u8868\u73fe\u51fa\u53ef\u7591\u884c\u70ba\uff0c\u5176\u4e2d\u5305\u62ec\u4e86\u5ee3\u544a\u7a0b\u5f0f\u3002<\/p>\n<p><b><i>\u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\u548c\u5ee3\u544a\u7a0b\u5f0f\u4f54\u64da\u884c\u52d5\u5a01\u8105\u699c\u9996<\/i><\/b><\/p>\n<p><a href=\"https:\/\/about-threats.trendmicro.com\/us\/search.aspx?p=fakeinst\">FAKEINST<\/a>\uff0834\uff05\uff09\u548c<a href=\"https:\/\/about-threats.trendmicro.com\/us\/search.aspx?p=opfake\">OPFAKE<\/a>\uff0830\uff05\uff09\u7b49\u60e1\u610f\u8edf\u9ad4\u5bb6\u65cf\u662f\u6392\u540d\u524d\u5e7e\u540d\u7684\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u3002FAKEINST\u60e1\u610f\u8edf\u9ad4\u7d93\u5e38\u6703\u507d\u88dd\u6210\u6b63\u5e38\u7684\u61c9\u7528\u7a0b\u5f0f\u3002\u5b83\u5011\u540c\u6642\u4e5f\u662f\u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\uff0c\u6703\u767c\u9001\u672a\u7d93\u6388\u6b0a\u7684\u7c21\u8a0a\u5230\u7279\u5b9a\u865f\u78bc\uff0c\u66ff\u4f7f\u7528\u8005\u8a3b\u518a\u6602\u8cb4\u7684\u670d\u52d9\u3002\u6709\u500b\u8ddfFAKEINST\u6709\u95dc\u7684\u77e5\u540d\u4e8b\u4ef6\u662f<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/malicious-developers-released-rogue-bad-piggies-versions\/\">\u60e1\u610f\u7248\u672c\u7684\u58de\u86cb\u8c6c<\/a>\uff0c\u5728\u904a\u6232\u767c\u8868\u5f8c\u5c31\u99ac\u4e0a\u88ab<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u767c\u73fe\u4e86\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\" \u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc:\u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\u548c\u5ee3\u544a\u7a0b\u5f0f\u4f54\u64da\u884c\u52d5\u5a01\u8105\u699c\u9996\" alt=\"\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc: \u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\u548c\u5ee3\u544a\u7a0b\u5f0f\u4f54\u64da\u884c\u52d5\u5a01\u8105\u699c\u9996\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2013\/09\/Top-Malware-Family-01-resized.jpg\" width=\"600\" height=\"360\" \/><\/p>\n<p><i>\u5716\u4e8c\u3001\u524d\u5e7e\u540d\u7684\u624b\u6a5f\u60e1\u610f\u8edf\u9ad4\u5bb6\u65cf<\/i><\/p>\n<p><!--more--><\/p>\n<p>OPFAKE\u60e1\u610f\u8edf\u9ad4\u548cFAKEINST\u985e\u4f3c\uff0c\u90fd\u6703\u6a21\u4eff\u6b63\u5e38\u7684\u61c9\u7528\u7a0b\u5f0f\u3002\u7136\u800c\uff0c\u4e00\u500b\u8b8a\u7a2e\uff08<a href=\"https:\/\/about-threats.trendmicro.com\/us\/malware\/ANDROIDOS_OPFAKE.CTD\">ANDROIDOS_OPFAKE.CTD<\/a>\uff09\u8868\u73fe\u51fa\u9019\u60e1\u610f\u8edf\u9ad4\u4e0d\u540c\u7684\u4e00\u9762\uff0c\u5b83\u6703\u6253\u958b\u4e00\u500bHTML\u6a94\u6848\uff0c\u8981\u6c42\u4f7f\u7528\u8005<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/spam-leads-to-multi-platform-mobile-threat\/\">\u4e0b\u8f09<\/a>\u53ef\u80fd\u7684\u60e1\u610f\u6a94\u6848\u3002\u9664\u4e86\u6703\u767c\u9001\u7c21\u8a0a\u7d66\u7279\u5b9a\u865f\u78bc\uff0c\u4e26\u66ff\u4f7f\u7528\u8005\u8a3b\u518a\u6602\u8cb4\u7684\u670d\u52d9\u5916\uff0c\u52a0\u503c\u670d\u52d9\u6feb\u7528\u7a0b\u5f0f\u4e5f\u53ef\u80fd\u6703\u5e36\u4f86\u5176\u4ed6\u7684\u98a8\u96aa\u3002<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u6700\u8fd1\u7684<a href=\"https:\/\/about-threats.trendmicro.com\/us\/infographics\/infograph\/the-high-cost-of-premium-service-abusers\">\u8cc7\u6599\u5716\u8868<\/a>\u986f\u793a\u51fa\u5b89\u88dd\u6b64\u985e\u624b\u6a5f\u60e1\u610f\u8edf\u9ad4\u5176\u4ed6\u5371\u96aa\u7684\u5730\u65b9\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u5728\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u88e1\uff0c\u7531<a href=\"https:\/\/about-threats.trendmicro.com\/us\/search.aspx?p=arpush\">ARPUSH<\/a>\u548cLEADBOLT\u4f54\u64da\u9996\u4f4d\uff0c\u5206\u5225\u4f54\u4e86\u7e3d\u6578\u768433\uff05\u548c27\uff05\u3002\u5169\u500b\u90fd\u662f\u5df2\u77e5\u7684\u5ee3\u544a\u8edf\u9ad4\u548c\u8cc7\u6599\u7aca\u53d6\u7a0b\u5f0f\uff0c\u6703\u6536\u96c6\u8a2d\u5099\u76f8\u95dc\u7684\u8cc7\u6599\uff0c\u50cf\u662f\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u8cc7\u8a0a\u3001<a href=\"https:\/\/en.wikipedia.org\/wiki\/International_Mobile_Station_Equipment_Identity\">IMEI<\/a>\u7b49\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc\uff1a\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f,\u516d\u6210\u6703\u6536\u96c6\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u8cc7\u8a0a\u7b49\u5ee3\u544a\u8edf\u9ad4\u548c\u8cc7\u6599\u7aca\u53d6\u7a0b\u5f0f\" alt=\"\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u9054\u5230\u4e00\u767e\u842c\u5927\u95dc\uff1a\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f,\u516d\u6210\u6703\u6536\u96c6\u4f5c\u696d\u7cfb\u7d71\u8cc7\u8a0a\u3001GPS\u5b9a\u4f4d\u8cc7\u8a0a\u7b49\u5ee3\u544a\u8edf\u9ad4\u548c\u8cc7\u6599\u7aca\u53d6\u7a0b\u5f0f\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2013\/09\/Top-Adware-Family-01-resized.jpg   \" width=\"600\" height=\"360\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><i>\u5716\u4e09\u3001\u524d\u5e7e\u540d\u7684\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u5bb6\u65cf<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>\u7136\u800c\uff0c\u884c\u52d5\u8a2d\u5099\u6240\u906d\u9047\u7684\u5a01\u8105\u4e26\u4e0d\u50c5\u9650\u65bc\u6d41\u6c13\u7248\u672c\u7684\u77e5\u540d\u61c9\u7528\u7a0b\u5f0f\u548c\u5ee3\u544a\u8edf\u9ad4\u3002\u5e55\u5f8c\u9ed1\u624b\u4e5f\u6703\u5c07\u76ee\u6a19\u653e\u5728\u884c\u52d5\u7528\u6236\u7684\u7db2\u8def\u9280\u884c\u4ea4\u6613\uff0c\u50cf\u662fFAKEBANK\u548cFAKETOKEN\u7b49\u60e1\u610f\u8edf\u9ad4\u5a01\u8105\u8457\u4f7f\u7528\u8005\u3002\u4f60\u53ef\u4ee5\u5728<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u6700\u8fd1\u7684\u300c<a href=\"https:\/\/about-threats.trendmicro.com\/us\/mobile\/monthly-mobile-review\/2013-08-mobile-banking-threats\">\u4e00\u77a5\u884c\u52d5\u9280\u884c\u5a01\u8105<\/a>\u300d\u5831\u544a\u88e1\u4e86\u89e3\u9019\u4e9b\u60e1\u610f\u8edf\u9ad4\u7684\u8a73\u7d30\u8cc7\u6599\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u70ba\u4e86\u4fdd\u6301\u4f60\u8a2d\u5099\u7684\u5b89\u5168\uff0c\u5f88\u91cd\u8981\u7684\u4e00\u9ede\u5c31\u662f\uff0c\u5c0d\u5f85\u884c\u52d5\u8a2d\u5099\u8981\u8ddf\u5c0d\u5f85\u500b\u4eba\u96fb\u8166\u4e00\u822c\uff0c\u7279\u5225\u662f\u7576\u8ddf\u5b89\u5168\u6709\u95dc\u7684\u6642\u5019\u3002\u8981\u5c0f\u5fc3\u6240\u4e0b\u8f09\u7684\u61c9\u7528\u7a0b\u5f0f\uff0c\u52d9\u5fc5\u5148\u6ce8\u610f\u8a55\u8ad6\u548c\u958b\u767c\u8005\u7b49\u7d30\u7bc0\u3002\u8da8\u52e2\u79d1\u6280\u6703\u900f\u904e<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2721&amp;name=20111103\"><b>\u8da8\u52e2\u79d1\u6280\u884c\u52d5\u5b89\u5168\u9632\u8b77<\/b><b>for Android<\/b><b>\u4e2d\u6587\u7248<\/b><\/a>\u4f86\u4fdd\u8b77\u4f7f\u7528\u8005\u5c0d\u6297\u884c\u52d5\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u3002<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u7684<a href=\"https:\/\/about-threats.trendmicro.com\/us\/mobile\/monthly-mobile-review\/2013-08-mobile-banking-threats\">\u884c\u52d5\u5a01\u8105\u8cc7\u6599\u7ad9<\/a>\u4e5f\u6703\u63d0\u4f9b\u7d66\u4f60\u6709\u95dc\u667a\u6167\u578b\u624b\u6a5f\u3001\u5e73\u677f\u96fb\u8166\u7b49\u96fb\u5b50\u7522\u54c1\u5728\u9762\u5c0d\u884c\u52d5\u5a01\u8105\u6642\u6709\u7528\u7684\u8cc7\u8a0a\u4ee5\u53ca\u5b89\u5168\u63d0\u793a\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><b><i>\u5206\u6790\u8cc7\u6599\u4f86\u81ea\u8da8\u52e2\u79d1\u6280\u884c\u52d5\u53cd\u61c9\u5c0f\u7d44<\/i><\/b><\/p>\n<p>&nbsp;<\/p>\n<p>\uff20\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mobile-malware-high-risk-apps-hit-1m-mark\/\">Mobile Malware, High-Risk Apps Hit 1M Mark<\/a><br \/>\n\u4f5c\u8005\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/author\/oscar-abendan\/\">Gelo Abendan<\/a><\/p>\n<p>@\u5ef6\u4f38\u95b1\u8b80<br \/>\n<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=6406\">\u00a0\u7b2c\u4e09\u5b63\u8fd1\u4e00\u534a\u7684\u884c\u52d5\u91e3\u9b5a\u7db2\u7ad9\u662f\u91dd\u5c0d\u91d1\u878d\u670d\u52d9\u7db2\u7ad9\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/goo.gl\/l6eLxj\"><img decoding=\"async\" alt=\"\u57fa\u672c CMYK\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2014\/03\/324_550x300.jpg\" \/><\/a><\/p>\n<p>\u9084\u4e0d\u662f\u8da8\u52e2\u79d1\u6280\u7c89\u7d72\u55ce?\u60f3\u4e86\u89e3\u66f4\u591a\u95dc\u65bc\u7db2\u8def\u5b89\u5168\u7684\u79d8\u8a23\u548c\u5efa\u8b70\uff0c\u53ea\u8981\u5230<a href=\"https:\/\/www.facebook.com\/trendmicrotaiwan\">\u8da8\u52e2\u79d1\u6280\u7c89\u7d72\u7db2\u9801<\/a>\u00a0\u6216\u4e0b\u9762\u7684\u6309\u9215\u6309\u8b9a\u52a0\u5165\u7c89\u7d72,\u5404\u7a2e\u7c89\u7d72\u5c08\u5c6c\u9a5a\u5947\u597d\u79ae,\u4e0d\u5b9a\u671f\u653e\u9001\u4e2d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-includes\/js\/tinymce\/themes\/advanced\/img\/trans.gif\" width=\"320\" height=\"240\" data-mce-json=\"{'video':{},'params':{'src':'https:\/\/www.facebook.com\/plugins\/like.php?href=https:\/\/domynews.blog.ithome.com.tw\/post\/1252\/127176','frameborder':'0','scrolling':'no'},'hspace':null,'vspace':null,'align':null,'bgcolor':null}\" \/><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2953&amp;name=20120918\"><img loading=\"lazy\" decoding=\"async\" alt=\"\u514d\u8cbb\u4e0b\u8f09 \u9632\u6bd2\u8edf\u9ad4 PC-cillin \u8a66\u7528\u7248\u4e0b\u8f09\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2013\/07\/PCCfans540.gif\" width=\"540\" height=\"90\" \/><\/a><\/p>\n<div>\n<div>\n<dl>\n<dt><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2951&amp;name=20120911\"><strong>PC-cillin 2013<\/strong><\/a><strong>\u96f2\u7aef\u7248<\/strong>\u8de8\u5e73\u53f0\u540c\u6642\u652f\u63f4Win\u3001Mac\u53caAndroid\u624b\u6a5f\u8207\u5e73\u677f,\u7acb\u5373<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2953&amp;name=20120918\">\u4e0b\u8f09<\/a><\/dt>\n<\/dl>\n<\/div>\n<div><strong>\u25ce\u5373\u523b\u52a0\u5165\u8da8\u52e2\u79d1\u6280\u793e\u7fa4\u7db2\u7ad9,\u7cbe\u5f69\u4e0d\u6f0f\u7db2<br \/>\n<\/strong><a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2762&amp;name=20111213\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.trendmicro.com.tw\/campaign\/tw_blog_images\/blogad\/FBICON.PNG\" \/><\/a>\u00a0<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2763&amp;name=20111213\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.trendmicro.com.tw\/campaign\/tw_blog_images\/blogad\/plurk.PNG\" \/><\/a>\u00a0<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2764&amp;name=20111213\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.trendmicro.com.tw\/campaign\/tw_blog_images\/blogad\/YOUTUBE.PNG\" \/><\/a>\u00a0<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2765&amp;name=20111213\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/www.trendmicro.com.tw\/campaign\/tw_blog_images\/blogad\/RSS.PNG\" \/><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u96d6\u7136\u4eca\u5e74\u9084\u6709\u4e09\u500b\u6708\u624d\u7d50\u675f\uff0c\u4f46\u662f\u8da8\u52e2\u79d1\u6280\u5c0d\u65bc\u884c\u52d5\u5a01\u8105\u7684\u9810\u6e2c\uff0c\u7279\u5225\u662f\u60e1\u610f\u8edf\u9ad4\u548c\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f\u6703\u9054\u5230100\u842c\u5927\u95dc\u9019\u9ede [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[17,906,97,15,1244],"tags":[2274,1241,101,153],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/6413"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6413"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/6413\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}