{"id":9202,"date":"2014-08-26T09:00:00","date_gmt":"2014-08-26T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=9202"},"modified":"2016-01-25T18:24:20","modified_gmt":"2016-01-25T10:24:20","slug":"%e3%80%8aiot-%e7%89%a9%e8%81%af%e7%b6%b2%e5%ae%89%e5%85%a8%e8%b6%a8%e5%8b%a2-%e3%80%8b%e8%a1%8c%e5%8b%95%e5%ae%89%e5%85%a8%e5%92%8c%e7%89%a9%e8%81%af%e7%b6%b2%ef%bc%9a%e6%99%ba%e6%85%a7","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=9202","title":{"rendered":"\u300a IoT \u7269\u806f\u7db2\u5b89\u5168\u8da8\u52e2 \u300b\u884c\u52d5\u5b89\u5168\u548c\u7269\u806f\u7db2\uff1a\u667a\u6167\u578b\u624b\u6a5f\u6210\u70ba\u9060\u7aef\u63a7\u5236\u4e2d\u5fc3\u7684\u554f\u984c"},"content":{"rendered":"<blockquote><p>\u4f60\u7684\u51b0\u7bb1\u6703\u5728\u4f60\u51fa\u9580\u6642\u50b3\u7c21\u8a0a\u63d0\u9192\u4f60\u86cb\u5feb\u6c92\u6709\u4e86\uff0c\u6216\u7576\u4f60\u96e2\u958b\u5bb6\u6642\u9060\u7aef\u95dc\u9589\u4f60\u7a81\u7136\u60f3\u5230\u7684\u96fb\u5668\uff0c\u9019\u4e9b\u90fd\u5f88\u5438\u5f15\u4eba\uff0c\u800c\u667a\u6167\u578b\u624b\u6a5f\u5ee0\u5546\u4e5f\u6b63\u5728\u8a66\u5716\u63d0\u4f9b\u6211\u5011\u9019\u6a23\u7684\u672a\u4f86\u3002<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/about-threats.trendmicro.com\/resources\/images\/homeautomation.jpg\" alt=\"\" width=\"500\" height=\"333\" \/><\/p><\/blockquote>\n<p>\u81ea\u5f9e\u624b\u6a5f\u71b1\u6f6e\u958b\u59cb\uff0c\u667a\u6167\u578b\u624b\u6a5f\u5df2\u7d93\u6210\u70ba\u6211\u5011\u751f\u6d3b\u4e2d\u4e0d\u53ef\u6216\u7f3a\u7684\u4e00\u90e8\u5206\uff0c\u5b83\u5011\u4e5f\u662f\u4eca\u65e5\u5feb\u7bc0\u594f\u7684\u4e16\u754c\u88e1\u4e0d\u53ef\u7f3a\u5c11\u7684\u6771\u897f\u3002\u5b83\u5011\u53ef\u4ee5\u5e6b\u6211\u5011\u7121\u6642\u7121\u523b\u5730\u9023\u7d50\u5230\u6211\u5011\u7684\u670b\u53cb\u548c\u5bb6\u4eba\uff0c\u4e5f\u8b93\u6211\u5011\u53ef\u4ee5\u9ede\u4e00\u9ede\u87a2\u5e55\u5c31\u5b8c\u6210\u6211\u5011\u7684\u65e5\u5e38\u5de5\u4f5c\u3002\u6211\u5011\u548c\u667a\u6167\u578b\u624b\u6a5f\u5df2\u7d93\u5f62\u6210\u5982\u6b64\u7262\u56fa\u7684\u95dc\u4fc2\uff0c\u4e5f\u8b93\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u5c07\u5176\u7d0d\u5165\u4ed6\u5011\u7372\u53d6\u91d1\u9322\u7684\u653b\u64ca\u76ee\u6a19\u3002\u7121\u8ad6\u662f\u597d\u662f\u58de\uff0c\u667a\u6167\u578b\u624b\u6a5f\u5df2\u7d93\u6210\u70ba\u6211\u5011\u65e5\u5e38\u751f\u6d3b\u5fc5\u5099\u5de5\u5177\u7684\u91cd\u8981\u90e8\u5206\u3002<\/p>\n<p>\u96a8\u8457\u6539\u8b8a\u4e4b\u98a8\u5439\u8d77\uff0c\u667a\u6167\u578b\u624b\u6a5f\u4f3c\u4e4e\u6703\u6210\u70ba\u6211\u5011\u751f\u6d3b\u4e2d\u66f4\u91cd\u8981\u7684\u4e00\u90e8\u5206\uff0c\u800c\u9019\u548c<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/securing-the-internet-of-everything\/\">\u7269\u806f\u7db2<\/a>\u6709\u95dc\u3002\u7576iOS 8\u63a8\u51fa\u6642\uff0cApple\u540c\u6642\u4ecb\u7d39\u4e86<a href=\"https:\/\/www.slashgear.com\/heres-how-apple-ios-8-homekit-works-04332145\/\">HomeKit<\/a>\uff0c\u9019\u662f\u4e00\u500b\u53ef\u4ee5\u5e6b\u52a9\u4f7f\u7528\u8005\u5728\u5bb6\u88e1\u7ba1\u7406\u7b2c\u4e09\u65b9\u7269\u806f\u7db2\u8a2d\u5099\u7684\u61c9\u7528\u7a0b\u5f0f\u670d\u52d9\u3002\u6709\u4e86HomeKit\uff0c\u4f7f\u7528\u8005\u53ef\u4ee5\u5c07\u5b89\u88dd\u5728\u4e00\u500b\u623f\u9593\u88e1\u7684\u8a2d\u5099\u90fd\u7fa4\u7d44\u8d77\u4f86\uff0c\u5c0d\u6bcf\u500b\u623f\u9593\u7fa4\u7d44\u90fd\u8a2d\u5b9a\u552f\u4e00\u7684\u53c3\u6578\/\u63a7\u5236\u3002\u9019\u8b93\u4f7f\u7528\u8005\u53ef\u4ee5\u65b9\u4fbf\u5730\u4fee\u6539\u8a2d\u5b9a\uff0c\u4e0d\u7ba1\u662f\u623f\u9593\u5230\u623f\u9593\u6216\u66f4\u52a0\u7d30\u5fae\u7684\u8a2d\u5b9a\u3002\u5728\u672c\u6587\u64b0\u5beb\u6642\uff0cGoogle\u9084\u6c92\u6709\u63d0\u4f9b\u5c0d\u61c9\u7684\u7522\u54c1\uff0c\u4f46\u6211\u5011\u5728\u672a\u4f86\u7684\u65e5\u5b50\u88e1\u4e00\u5b9a\u6703\u770b\u5230\u3002<\/p>\n<p>\u96a8\u8457\u9019\u6a23\u7684\u767c\u5c55\uff0c\u6211\u5011\u5df2\u7d93\u53ef\u4ee5\u9810\u671f\u5b83\u6703\u6210\u70ba\u4e0b\u4e00\u4ef6\u5927\u4e8b\u60c5\uff0c\u4e0d\u7ba1\u662f\u56e0\u70ba\u5176\u6240\u5e36\u4f86\u7684\u6574\u9ad4\u65b9\u4fbf\u6027\u6216\u662f\u9177\u7684\u7a0b\u5ea6\u3002\u5f9e\u9019\u96fb\u5b50\u73a9\u610f\u4f86\u63a7\u5236\u5bb6\u4e2d\u5e7e\u4e4e\u6240\u6709\u7684\u6771\u897f\u6642\uff0c\u4ec0\u9ebc\u662f\u6700\u4fbf\u5229\u7684\uff0c\u548c\u8001\u5be6\u8aaa \u2013 \u6700\u4ee4\u4eba\u8208\u596e\u7684\u90e8\u5206\uff1f\u50cf\u662f\u4f60\u7684\u51b0\u7bb1\u6703\u5728\u4f60\u51fa\u9580\u6642\u50b3\u7c21\u8a0a\u63d0\u9192\u4f60\u86cb\u5feb\u6c92\u6709\u4e86\uff0c\u6216\u7576\u4f60\u96e2\u958b\u5bb6\u6642\u9060\u7aef\u95dc\u9589\u4f60\u7a81\u7136\u60f3\u5230\u7684\u96fb\u5668\uff0c\u9019\u4e9b\u90fd\u5f88\u5438\u5f15\u4eba\uff0c\u800c\u667a\u6167\u578b\u624b\u6a5f\u5ee0\u5546\u4e5f\u6b63\u5728\u8a66\u5716\u63d0\u4f9b\u6211\u5011\u9019\u6a23\u7684\u672a\u4f86\u3002<\/p>\n<p>\u4f46\u9019\u53ea\u662f\u786c\u5e63\u7684\u4e00\u9762\u3002\u53e6\u4e00\u9762\uff0c\u4e0d\u5e78\u7684\uff0c\u5c07\u667a\u6167\u578b\u624b\u6a5f\u52a0\u5165\u5230\u4f60\u7684\u81ea\u52d5\u5316\u4f4f\u5bb6\u751f\u614b\u7cfb\u7d71\u53ef\u80fd\u4e0d\u662f\u6700\u5b89\u5168\u7684\u6c7a\u5b9a\u3002\u56e0\u70ba\u8a72\u5e73\u53f0\u6709\u8a31\u591a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mobile-malware-and-high-risk-apps-reach-2m-mark-go-for-firsts\/\">\u5b89\u5168\u96b1\u6182<\/a> \u2013 \u6211\u5011\u5df2\u7d93\u5728\u9019\u90e8\u843d\u683c\u8a0e\u8ad6\u4e86\u4e0d\u5c11 \u2013 \u53ef\u80fd\u6703\u5e36\u5230\u4f60\u5bb6\u4e2d\u5177\u5099\u7269\u806f\u7db2\u529f\u80fd\u7684\u8a2d\u5099\uff0c\u9032\u800c\u8b93\u4f60\u5bb9\u6613\u53d7\u5230\u7db2\u8def\u72af\u7f6a\u653b\u64ca\u3002\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u99ed\u5165\u4f60\u7684\u624b\u6a5f\u4f86\u66ff\u4f60\u8a02\u95b1\u52a0\u503c\u670d\u52d9\uff1f\u5df2\u7d93\u6709\u4e86\u3002\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u900f\u904e\u4f60\u7684\u624b\u6a5f\u99ed\u5165\u4f60\u7684\u4fdd\u5b89\u7cfb\u7d71\uff0c\u5c07\u5176\u95dc\u9589\u597d\u8b93\u4ed6\u5011\u53ef\u4ee5\u6436\u4f60\uff1f<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/is-the-internet-of-everything-under-attack\/\">\u9019\u5f88\u6709\u53ef\u80fd\u767c\u751f<\/a>\uff01<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u7269\u806f\u7db2\uff08IoT ,Internet of Things\uff09<\/a> \u662f\u9019\u7db2\u8def\u6642\u4ee3\u6240\u51fa\u73fe\u6280\u8853\u88e1\u6700\u4ee4\u4eba\u8208\u596e\u7684\u6982\u5ff5\u4e4b\u4e00\u3002\u5e36\u9818\u8457\u6211\u5011\u4e00\u6b65\u6b65\u5730\u63a5\u8fd1\u672a\u4f86\u4e16\u754c\u7684\u4f4f\u5bb6\uff0c\u5927\u591a\u6578\uff08\u5982\u679c\u4e0d\u662f\u5168\u90e8\uff09\u5bb6\u96fb\u4e0d\u50c5\u53ef\u4ee5\u9023\u5230\u7db2\u8def\u4e0a\uff0c\u4e5f\u53ef\u4ee5\u900f\u904e\u4e00\u4e2d\u592e\u63a7\u5236\u4e2d\u5fc3\u4f86\u5be6\u73fe\u5168\u9762\u7684\u63a7\u5236\u548c\u81ea\u52d5\u5316\uff0c\u7121\u8ad6\u6211\u5011\u8eab\u5728\u54ea\u88e1\uff08\u6216\u81f3\u5c11\uff0c\u53ea\u8981\u6211\u5011\u53ef\u4ee5\u9023\u7db2\u3002\uff09<\/p>\n<p>\u7136\u800c\uff0c\u4e0d\u7ba1\u5982\u4f55\u4ee4\u4eba\u8208\u596e\uff0c\u6211\u5011\u9084\u662f\u8981<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u5c0f\u5fc3\u5730\u9032\u884c<\/a>\u3002\u56e0\u70ba\u5927\u591a\u6578\u61c9\u7528\u5728\u9019\u65b0\u6642\u4ee3\u7684\u6280\u8853\u4ecd\u662f\u57fa\u65bc\u76ee\u524d\u7684\u884c\u52d5\u8a2d\u5099\u6280\u8853\uff08\u667a\u6167\u578b\u96fb\u8996\u3001\u667a\u6167\u578b\u5bb6\u96fb\u7b49\uff09\uff0c\u6709\u53ef\u80fd\u906d\u53d7\u548c\u4eca\u65e5\u884c\u52d5\u8a2d\u5099\u76f8\u540c\u7684\u5b89\u5168\u554f\u984c\u3002<\/p>\n<p>\u9084\u6709\u4e00\u500b\u4e8b\u5be6\u5c31\u662f\uff0c\u884c\u52d5\u8a2d\u5099\uff08\u5c24\u5176\u662f\u667a\u6167\u578b\u624b\u6a5f\uff09\u53ef\u80fd\u5f88\u5feb\u5c31\u6703\u6210\u70ba\u6211\u5011\u4f4f\u5bb6\u7684\u300c\u4e2d\u592e\u63a7\u5236\u4e2d\u5fc3\u300d\uff0c\u56e0\u70ba\u6211\u5011\u7528\u5b83\u4f86\u7ba1\u7406\u6211\u5011\u6240\u6709\u7684\u5bb6\u96fb\u548c\u4fdd\u5168\u7cfb\u7d71\u3002Google\u548cApple\u5df2\u7d93\u958b\u59cb\u5728\u5404\u81ea\u7684\u884c\u52d5\u5e73\u53f0\u4e0a\u5236\u5b9a\u4f4f\u5bb6\u81ea\u52d5\u5316\u7ba1\u7406\u61c9\u7528\u7a0b\u5f0f\u3002\u6bd4\u65b9\u8aaa\uff0c\u6700\u8fd1\u6240\u63a8\u51fa\u7684<a href=\"https:\/\/www.slashgear.com\/heres-how-apple-ios-8-homekit-works-04332145\/\">iOS8 Homekit<\/a>\uff0c\u5ba3\u7a31\u53ef\u4ee5\u5b8c\u5168\u63a7\u5236\u4f4f\u5bb6\u548c\u5167\u90e8\u6240\u6709\u7684\u7db2\u8def\u8a2d\u5099\uff0c\u800c\u4e14\u53ef\u4ee5\u8b93\u4f7f\u7528\u8005\u8f15\u6613\u5730\u6839\u64da\u6240\u5728\u623f\u9593\u4f86\u7fa4\u7d44\u8a2d\u5099\u3002<\/p>\n<p>\u90a3\u9ebc\u60f3\u60f3\u770b\uff0c\u9019\u5c0d<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u7269\u806f\u7db2\uff08IoT ,Internet of Things\uff09<\/a>\u6703\u6709\u4ec0\u9ebc\u6f5b\u5728\u98a8\u96aa\u3002\u5b83\u8b93\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u99ed\u5165\u5225\u4eba\u7684\u667a\u6167\u578b\u624b\u6a5f\u9032\u800c\u9032\u5165\u5225\u4eba\u5bb6\u4e2d\u4e0d\u518d\u53ea\u662f\u79d1\u5e7b\u5e7b\u60f3\uff0c\u800c\u662f\u53ef\u80fd\u767c\u751f\u7684\u73fe\u5be6\u5834\u666f\u3002\u884c\u52d5\u8a2d\u5099\u5df2\u7d93\u8d95\u4e0a\u4e86\u500b\u4eba\u96fb\u8166\uff0c\u6210\u70ba\u6700\u88ab\u91dd\u5c0d\u7684\u5e73\u53f0\u3002\u6240\u4ee5\u6beb\u7121\u7591\u554f\u7684\uff0c\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u6703\u627e\u5230\u65b9\u6cd5\u4f86\u958b\u767c\u6b64\u65b0\u9818\u57df\u7684\u8ca1\u8def\u3002<\/p>\n<p><b><i>\u53ef\u80fd\u51fa\u73fe\u7684\u98a8\u96aa<\/i><\/b><\/p>\n<p>\u4f7f\u7528\u667a\u6167\u578b\u624b\u6a5f\u4f5c\u70ba\u81ea\u52d5\u5316\u4f4f\u5bb6\u7684\u4e2d\u592e\u9059\u63a7\u5668\u610f\u5473\u8457\u9019\u5e73\u53f0\u5167\u7684\u6240\u6709\u5b89\u5168\u5a01\u8105\u90fd\u53ef\u80fd\u6703\u5f71\u97ff\u5230\u4f4f\u5bb6\u3002\u4e0b\u9762\u662f\u9019\u4e9b\u5a01\u8105\u4f8b\u5b50\u548c\u5b83\u5011\u6703\u5982\u4f55\u5f71\u97ff\u5230\u81ea\u52d5\u5316\u7684\u4f4f\u5bb6\uff1a<\/p>\n<ul>\n<li><b>\u4f5c\u696d\u7cfb\u7d71\u6f0f\u6d1e <\/b><b>\u2013<\/b> \u7db2\u8def\u72af\u7f6a\u5206\u5b50\u53ef\u4ee5\u5229\u7528\u667a\u6167\u578b\u624b\u6a5f\u4f5c\u696d\u7cfb\u7d71\u5e95\u5c64\u7684\u6f0f\u6d1e\u4f86\u63a7\u5236\u667a\u6167\u578b\u624b\u6a5f\uff0c\u9032\u800c\u53ef\u4ee5\u63a7\u5236\u81ea\u52d5\u5316\u4f4f\u5bb6\uff0c\u50cf\u662f\u95dc\u9589\u4fdd\u5168\u7cfb\u7d71\uff0c\u751a\u81f3\u76e3\u8996\u5bb6\u4eba\u6d3b\u52d5\u4f86\u9032\u800c\u52d2\u7d22\u6216\u8cc7\u6599\u7aca\u53d6\u3002<\/li>\n<li><b>\u61c9\u7528\u7a0b\u5f0f\u6f0f\u6d1e <\/b><b>\u2013<\/b> \u61c9\u7528\u7a0b\u5f0f\u6f0f\u6d1e\u53ef\u88ab\u5229\u7528\u4f86\u53d6\u5f97\u6536\u767c\u7684\u8cc7\u6599\u4ee5\u9054\u5230\u7aca\u53d6\u6216\u52d2\u7d22\u7684\u76ee\u7684\u3002\u751a\u81f3\u53ef\u4ee5\u518d\u6b21\u7528\u4f86\u63a7\u5236\u6574\u500b\u63a7\u5236\u4e2d\u5fc3\uff0c\u6216\u9632\u6b62\u60e1\u610f\u8edf\u9ad4\u88ab\u5075\u6e2c\u6216\u79fb\u9664\u3002<\/li>\n<li><b>\u884c\u52d5\u60e1\u610f\u8edf\u9ad4 <\/b><b>\u2013<\/b><b> <\/b>\u624b\u6a5f\u60e1\u610f\u8edf\u9ad4\u53ef\u4ee5\u7528\u4f86\u6514\u622a\u6216\u7aca\u53d6\u4f86\u81ea\u63a7\u5236\u4e2d\u5fc3\u548c\u8207\u5176\u9023\u63a5\u8a2d\u5099\u7684\u8cc7\u6599\u6216\u900f\u904e\u9060\u7aef\u60e1\u610f\u653b\u64ca\u4f86\u53d6\u5f97\u63a7\u5236\u4e2d\u5fc3\u7684\u63a7\u5236\u6b0a\u3002\u5b83\u4e5f\u53ef\u80fd\u6703\u611f\u67d3\u5e36\u6709\u87a2\u5e55\u7684\u96fb\u5668\u4f7f\u5176\u51fa\u73fe\u5ee3\u544a\u8edf\u9ad4\u6216\u60f1\u4eba\u7684\u5f48\u51fa\u8996\u7a97\u3002<\/li>\n<li><b>\u9ad8\u98a8\u96aa\u61c9\u7528\u7a0b\u5f0f <\/b><b>\u2013<\/b> \u9019\u61c9\u7528\u7a0b\u5f0f\u4e0d\u4e00\u5b9a\u662f\u60e1\u610f\u8edf\u9ad4\uff0c\u4f46\u88ab\u7de8\u5beb\u4f86\u6536\u96c6\u548c\u5132\u5b58\u8cc7\u6599\uff0c\u53ef\u80fd\u6703\u88ab\u4e0d\u5b89\u5168\u7684\u4f7f\u7528\u3002\u53ef\u4ee5\u88ab\u5229\u7528\u4f86\u7aca\u53d6\u5c0e\u81f4\u6ef2\u900f\u5bb6\u4e2d\u7db2\u8def\u7684\u8cc7\u6599\u3002<\/li>\n<li><b>\u5be6\u9ad4\u907a\u5931\/\u88ab\u7aca\/\u7834\u58de <\/b><b>\u2013<\/b> \u667a\u6167\u578b\u624b\u6a5f\uff08\u4e5f\u5c31\u662f\u63a7\u5236\u4e2d\u5fc3\uff09\u7684\u907a\u5931\/\u88ab\u7aca\/\u7834\u58de\u4e0d\u50c5\u6703\u8b93\u4f7f\u7528\u8005\u7121\u6cd5\u9032\u5165\u81ea\u5df1\u7684\u5bb6\u6216\u958b\u5553\/\u95dc\u9589\u5fc5\u8981\u7684\u7cfb\u7d71\uff0c\u4e5f\u8b93\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u80fd\u5920\u975e\u6cd5\u9032\u5165\u4ed6\u5bb6\u3002\u9019\u554f\u984c\u7684\u56b4\u91cd\u6027\u4e0d\u50c5\u5728\u65bc\u63a7\u5236\u4e2d\u5fc3\u7684\u5b89\u5168\u6027\uff0c\u9084\u5305\u62ec\u6574\u500b\u623f\u5b50\u3002\u63a7\u5236\u4e2d\u5fc3\u88ab\u7834\u58de\u4e5f\u610f\u5473\u8457\u8981\u91cd\u65b0\u4f48\u7dda\u548c\u5c07\u4e00\u5207\u8a2d\u5b9a\u56de\u539f\u72c0\uff0c\u9019\u90fd\u8981\u82b1\u8cbb\u5bf6\u8cb4\u7684\u6642\u9593\u548c\u8cc7\u6e90\u3002<\/li>\n<li><b>\u4e0d\u5b89\u5168\u7684\u9023\u7dda <\/b><b>\u2013<\/b><b> <\/b>\u7ba1\u7406\u9023\u63a5\u7cfb\u7d71\u7684\u5c08\u6709\u61c9\u7528\u7a0b\u5f0f\u548c\u63a7\u5236\u4e2d\u5fc3\u53ef\u80fd\u4e0d\u6703\u4f7f\u7528\u52a0\u5bc6\u4f86\u4fdd\u8b77\u4ed6\u5011\u5728\u7db2\u8def\u4e0a\u6536\u767c\u7684\u8cc7\u8a0a\u3002\u9019\u53ef\u80fd\u6703\u5c0e\u81f4\u8cc7\u6599\u5916\u6d29\u6216\u88ab\u7aca\u53d6\u3002\u5132\u5b58\u5728\u667a\u6167\u578b\u624b\u6a5f\u672c\u8eab\u7684\u8cc7\u6599\u4e5f\u53ef\u80fd\u88ab\u5077\u8d70\u3002<\/li>\n<\/ul>\n<p>\u6211\u5011\u53ef\u4ee5\u5f9e\u9019\u4e9b\u6f5b\u5728\u5a01\u8105\u770b\u51fa\u7528\u4f86\u4f5c\u70ba\u81ea\u52d5\u5316\u4f4f\u5bb6\u9060\u7aef\u63a7\u5236\u4e2d\u5fc3\u7684\u667a\u6167\u578b\u624b\u6a5f\u5982\u679c\u88ab\u99ed\uff0c\u5f8c\u679c\u6709\u591a\u53ef\u6015\u3002\u4e0d\u50c5\u6703\u8b93\u4e0d\u6cd5\u4efd\u5b50\u6709\u53ef\u80fd\u63a7\u5236\u4f60\u7684\u4f4f\u5bb6\u548c\u8a2d\u5099\uff0c\u4e5f\u53ef\u80fd\u7aca\u53d6\u8cc7\u6599\u3002<\/p>\n<p>\u4e00\u500b\u60c5\u5883\u4f8b\u5b50\uff1a\u4f7f\u7528\u8005\u5728\u4e0a\u73ed\uff0c\u9060\u96e2\u4e86\u4ed6\u7684\u81ea\u52d5\u5316\u4f4f\u5bb6\uff0c\u5c07\u4ed6Android\u4f5c\u696d\u7cfb\u7d71\u7684\u667a\u6167\u578b\u624b\u6a5f\u8a3b\u518a\u548c\u5b89\u88dd\u70ba\u63a7\u5236\u4e2d\u5fc3\u3002\u4f7f\u7528\u8005\u4e0d\u77e5\u9053\u7684\u662f\uff0c\u7db2\u8def\u72af\u7f6a\u4efd\u5b50\u5df2\u7d93\u900f\u904e\u6f0f\u6d1e\u5165\u4fb5\u4e86\u4ed6\u7684\u667a\u6167\u578b\u624b\u6a5f \u2013 \u53ef\u80fd\u662f\u56e0\u70ba\u5f9e\u7b2c\u4e09\u65b9\u7db2\u7ad9\u66ff\u4ed6\u6700\u611b\u7684\u904a\u6232\u4e0b\u8f09\u4e00\u500b\u300c\u6b63\u5e38\u7684\u66f4\u65b0\u7a0b\u5f0f\u300d\u3002\u9019\u66f4\u65b0\u5c07\u60e1\u610f\u7a0b\u5f0f\u78bc\u63d2\u5165\u539f\u672c\u6b63\u5e38\u7684\u904a\u6232\u7a0b\u5f0f\uff0c\u6709\u6548\u5730\u5c07\u5176\u6728\u99ac\u5316\uff0c\u4f46\u4ecd\u7136\u8b93\u5b83\u4fdd\u7559\u6b63\u5e38\u4f7f\u7528\u72c0\u614b\u3002\u00a0<!--more--><\/p>\n<p>\u8a72\u6728\u99ac\u5316\u61c9\u7528\u7a0b\u5f0f\u6703\u63a5\u6536\u4f86\u81ea\u5b83\u9060\u7aef\u60e1\u610f\u4f7f\u7528\u8005\u7684\u6307\u4ee4\uff0c\u63a7\u5236\u667a\u6167\u578b\u624b\u6a5f\u4e26\u5728\u4f7f\u7528\u8005\u4e0d\u77e5\u60c5\u548c\u672a\u6388\u6b0a\u4e0b\u95dc\u9589\u5bb6\u4e2d\u7684\u4fdd\u5168\u7cfb\u7d71\u3002\u56e0\u6b64\u4e0d\u6cd5\u4efd\u5b50\u4e0d\u9700\u8981\u64d4\u5fc3\u88ab\u767c\u73fe\u6216\u662f\u88ab\u651d\u5f71\u6a5f\u7167\u5230\uff0c\u800c\u4e14\u4f7f\u7528\u8005\u5c07\u4e00\u7121\u6240\u77e5\u3002<\/p>\n<p>\u7e7c\u7e8c\u5c0d\u9019\u5047\u8a2d\u6027\u7684\u60c5\u5883\uff0c\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u4e5f\u53ef\u80fd\u5229\u7528\u4e0a\u8ff0\u653b\u64ca\u6a21\u5f0f\u4f86\u8b93\u4f7f\u7528\u8005\u548c\u5176\u5bb6\u4eba\u88ab\u8cc7\u6599\u60c5\u8490 \u2013 \u5229\u7528\u5176\u6240\u63a7\u5236\u7684\u7cfb\u7d71\u4f86\u76e3\u807d\u4ee5\u7aca\u53d6\u8cc7\u6599\u4f86\u9032\u884c\u52d2\u7d22\u3001\u8eab\u4efd\u7aca\u53d6\u548c\u5176\u4ed6\u60e1\u610f\u76ee\u7684\u3002\u88ab\u52ab\u6301\u7684\u7cfb\u7d71\u4e5f\u53ef\u4ee5\u7528\u65bc\u88fd\u9020\u5bb6\u4e2d\u7684\u6df7\u4e82\uff0c\u50cf\u662f\u5728\u4f7f\u7528\u8005\u4f7f\u7528\u7684\u6642\u5019\u958b\u958b\u95dc\u95dc\uff0c\u6216\u8b93\u5bb6\u96fb\u9577\u6642\u9593\u7684\u958b\u555f\uff0c\u9019\u53ef\u80fd\u5c0e\u81f4\u8ca1\u7522\u640d\u5931\u6216\u9ad8\u6602\u7684\u96fb\u8cbb\u3002<\/p>\n<p><b><i>\u4e0d\u53ea\u662f\u53ef\u80fd\uff0c\u800c\u662f\u8fd1\u4e4e\u771f\u5be6<\/i><\/b><\/p>\n<p>\u4e00\u4e9b\u53ef\u4f9b\u4f7f\u7528\u7684<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8802\">\u7269\u806f\u7db2\uff08IoT ,Internet of Things\uff09<\/a>\u529f\u80fd\u7522\u54c1\u5df2\u88ab\u8b49\u660e\u53ef\u80fd\u88ab\u5165\u4fb5\u3002\u6700\u8fd1\u4e00\u500b\u4f8b\u5b50\u662fLIFX\u7684\u667a\u6167\u578b\u71c8\u6ce1 \u2013 \u9019\u662f\u5177\u5099\u7db2\u8def\u80fd\u529b\u7684\u71c8\u6ce1\uff0c\u53ef\u4ee5\u900f\u904eiOS\/Android\u8a2d\u5099\u4f86\u958b\u95dc\u3002<\/p>\n<p>\u5b83\u7684\u97cc\u9ad4\u88ab\u767c\u73fe\u5177\u6709\u6f0f\u6d1e\uff0c\u6703\u8b9330\u516c\u5c3a\u5167\u7684\u99ed\u5ba2\u53d6\u5f97\u7121\u7dda\u7db2\u8def\u5bc6\u78bc\u3002\u9019\u6f0f\u6d1e\u8b93\u53ea\u8981\u8d85\u904e\u4e00\u500b\u4ee5\u4e0a\u7684<a href=\"https:\/\/arstechnica.com\/security\/2014\/07\/crypto-weakness-in-smart-led-lightbulbs-exposes-wi-fi-passwords\/\">LIFX\u71c8\u6ce1<\/a>\u9023\u5230\u540c\u4e00\u500b\u7121\u7dda\u7db2\u8def\uff0c\u7b2c\u4e00\u500b\u71c8\u6ce1\u6703\u548c\u7b2c\u4e8c\u500b\u71c8\u6ce1\u5171\u4eab\u7db2\u8def\u6191\u8b49\uff0c\u4f46\u9019\u7a2e\u65b9\u5f0f\u7684\u52a0\u5bc6\u53ef\u4ee5\u8b93\u9644\u8fd1\u7684\u4efb\u4f55\u4eba\u622a\u7372\u4e26\u52a0\u4ee5\u7834\u89e3\u5171\u4eab\u8cc7\u8a0a\u3002\u4e00\u65e6\u7121\u7dda\u7db2\u8def\u6191\u8b49\u88ab\u622a\u53d6\uff0c\u90a3\u99ed\u5ba2\u63a7\u5236\u81ea\u52d5\u5316\u4f4f\u5bb6\u5176\u4ed6\u66f4\u91cd\u8981\u90e8\u5206\uff08\u5982\u4f7f\u7528\u8005\u96fb\u8166\u6216\u662f\u4fdd\u5168\u7cfb\u7d71\uff09\u4e5f\u5c31\u53ea\u662f\u6642\u9593\u554f\u984c\u4e86\u3002<\/p>\n<p>\u5176\u4ed6\u503c\u5f97\u6ce8\u610f\u7684\u4e8b\u4ef6\u5305\u62ec\u6982\u5ff5\u8b49\u660e\u7684\u60e1\u610f\u8edf\u9ad4\u653b\u64ca\uff0c\u53ef\u80fd\u5c0e\u81f4\u4f7f\u7528\u667a\u6167\u578b\u624b\u6a5f\u63a7\u5236\u7684<a href=\"https:\/\/arstechnica.com\/security\/2013\/08\/philips-hue-lights-malware-hack\/\">\u98db\u5229\u6d66HUE LED\u7167\u660e\u7cfb\u7d71<\/a>\u505c\u64fa\u3002\u53e6\u4e00\u500b\u662f\u5177\u5099\u7db2\u8def\u529f\u80fd\u7684Belkin\u5b30\u5152\u76e3\u8996\u5668\u88ab\u8b8a\u6210<a href=\"https:\/\/arstechnica.com\/security\/2013\/10\/hack-turns-belkin-baby-monitor-into-iphone-controlled-bugging-device\/\">\u7aca\u807d\u88dd\u7f6e<\/a>\uff0c\u56e0\u70ba\u5b83\u4e0d\u5b89\u5168\u7684\u300c\u7c21\u6613\u4e00\u6b21\u6027\u9023\u63a5\u300d\u529f\u80fd\uff0c\u8b93\u4efb\u4f55\u4eba\u90fd\u53ef\u4ee5\u807d\u5230\u88ab\u76e3\u8996\u7684\u5b30\u5152\uff08\u6216\u5c4b\u5167\u7684\u8ac7\u8a71\uff09\u3002\u5f8c\u8005\u9084\u88ab\u767c\u73fe\u4efb\u4f55\u4f7f\u7528\u8207\u5b30\u5152\u76e3\u8996\u5668\u76f8\u540c\u6280\u8853\u7684\u8a2d\u5099\uff08\u5373\u540c\u4e00\u7522\u7dda\u4e0a\u7684\u4efb\u4f55\u7522\u54c1\uff09\u90fd\u53ef\u4ee5\u88ab\u5feb\u901f\u8f15\u6613\u5730\u8f49\u6210\u7aca\u807d\u8a2d\u5099\u3002<\/p>\n<p>\u6211\u5011\u76f8\u4fe1\uff0c\u96a8\u8457\u8d8a\u4f86\u8d8a\u591a\u7269\u806f\u7db2\u7522\u54c1\u51fa\u73fe\uff0c\u672a\u4f86\u6703\u767c\u73fe\u66f4\u591a\u985e\u4f3c\u7684\u4e8b\u60c5\u3002<\/p>\n<p><b><i>\u4fdd\u8b77\u7269\u806f\u7db2<\/i><\/b><\/p>\n<p>\u90a3\u53ef\u4ee5\u505a\u4e9b\u4ec0\u9ebc\u4f86<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=7080\">\u9632\u8b77\u7269\u806f\u7db2<\/a>\uff0c\u667a\u6167\u578b\u624b\u6a5f\u61c9\u8a72\u6210\u70ba\u95dc\u9375\u90e8\u5206\u4f86\u904b\u4f5c\u6574\u5957\u7cfb\u7d71\uff1f<\/p>\n<p>\u5c0d\u65bc\u5c1a\u672a\u9032\u5165\u5230\u7269\u806f\u7db2\u4e16\u754c\u7684\u4eba\uff0c\u6211\u5011\u7684\u5efa\u8b70\u662f\u7b49\u5f85\u3002\u9019\u6280\u8853\u4ecd\u7136\u5f88\u65b0\uff0c\u9084\u5728\u6e2c\u8a66\u4e2d\uff0c\u4e5f\u9084\u4e26\u4e0d\u7a69\u5b9a\uff0c\u5373\u4f7f\u5df2\u7d93\u6709\u773e\u591a\u7522\u54c1\u9762\u5e02\u53ef\u4f9b\u4f7f\u7528\u3002\u5728\u958b\u767c\u5546\u548c\u88fd\u9020\u5546\u90fd\u9084\u5728\u6478\u7d22\u968e\u6bb5\u5c31\u6295\u5165\u53ef\u80fd\u6703\u8b93\u4f60\u7684\u4f4f\u5bb6\u548c\u5bb6\u4eba\u906d\u53d7\u4f60\u5c1a\u672a\u6e96\u5099\u9762\u5c0d\u7684\u98a8\u96aa\u3002<\/p>\n<p>\u800c\u5c0d\u65e9\u671f\u63a1\u7528\u8005\uff0c\u6211\u5011\u6709\u4e00\u4e9b\u5efa\u8b70\uff1a<\/p>\n<ul>\n<li><b>\u5411\u6703\u5b9a\u671f\u66f4\u65b0\u7522\u54c1\u97cc\u9ad4\u7684\u5ee0\u5546\u8cfc\u8cb7\u7269\u806f\u7db2\u7522\u54c1\u3002<\/b>\u4efb\u4f55\u7cfb\u7d71\u90fd\u6703\u6709\u7f3a\u9677\u6216\u6f0f\u6d1e\uff0c\u4e5f\u56e0\u70ba\u5982\u6b64\uff0c\u5ee0\u5546\u6703\u91cb\u51fa\u97cc\u9ad4\u66f4\u65b0\u4f86\u5728\u6b64\u60c5\u6cc1\u4e0b\u4fee\u88dc\u5176\u7269\u806f\u7db2\u8a2d\u5099\u3002<\/li>\n<li><b>\u4fdd\u8b77\u7db2\u8def\u3002<\/b>\u4efb\u4f55\u9023\u5230\u5bb6\u5ead\u7db2\u8def\u7684\u8a2d\u5099\u90fd\u5fc5\u9808\u5177\u5099\u5b89\u5168\u548c\u9632\u8b77\u5165\u4fb5\u7684\u80fd\u529b\u3002\u9019\u5305\u62ec\u4e86\u8def\u7531\u5668\u548c\u6240\u6709\u9023\u63a5\u5230\u5b83\u7684\u96fb\u8166\u548c\u884c\u52d5\u8a2d\u5099\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>\u6700\u91cd\u8981\u7684\u662f\uff0c\u6211\u5011\u5fc5\u9808\u5f37\u8abf\uff0c\u8981\u88ab\u4f5c\u70ba\u9060\u7aef\u63a7\u5236\u4e2d\u5fc3\u7684\u667a\u6167\u578b\u624b\u6a5f\u5fc5\u9808\u88ab\u9632\u8b77\u597d\uff0c\u5c31\u8ddf\u7db2\u8def\u7684\u5176\u4ed6\u90e8\u5206\u4e00\u6a23\u3002\u4e00\u500b\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\uff0c\u4ee5\u53ca\u5176\u6240\u6709\u5167\u5efa\u800c\u7684\u5b89\u5168\u529f\u80fd\u5c07\u6709\u52a9\u65bc\u9632\u6b62\u5b83\u6210\u70ba\u7db2\u8def\u7684\u5f31\u9ede\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u4f7f\u7528\u8005\u9084\u61c9\u8a72\u8003\u616e\u5f9e\u9060\u7aef\u63a7\u5236\u4e2d\u5fc3\u548c\u81ea\u5df1\u65e5\u5e38\u4f7f\u7528\u7684\u667a\u6167\u578b\u624b\u6a5f\u5206\u958b\u4f86 \u2013 \u5f9e\u6839\u672c\u4e0a\u5c07\u5176\u5f9e\u4f11\u9592\/\u500b\u4eba\u7528\u9014\u79fb\u9664\u3002\u9019\u6d88\u9664\u5176\u4e0b\u8f09\u60e1\u610f\u61c9\u7528\u7a0b\u5f0f\u5230\u8a2d\u5099\u4e0a\u7684\u6a5f\u6703\uff0c\u548c\u9632\u6b62\u5b89\u5168\u6f0f\u6d1e\u767c\u63ee\u4f5c\u7528\u3002\u9019\u4e5f\u6709\u52a9\u65bc\u4fdd\u8b77\u9060\u7aef\u63a7\u5236\u4e2d\u5fc3\u88ab\u7aca\u6216\u907a\u5931\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u7269\u806f\u7db2\u8b93\u6211\u5011\u5c0d\u660e\u5929\u5145\u6eff\u4e86\u65b0\u7684\u9858\u666f\u3002\u4f46\u8ddf\u5176\u4ed6\u6240\u6709\u9818\u57df\u4e00\u6a23\uff0c\u5b83\u4e5f\u6709\u8457\u81ea\u5df1\u7684\u6311\u6230\uff0c\u6211\u5011\u5fc5\u9808<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=8841\">\u5c0f\u5fc3\u5730\u61c9\u5c0d<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>@\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/about-threats.trendmicro.com\/us\/mobile\/monthly-mobile-review\/2014-07-mobile-security-and-the-internet-of-everything\">Mobile Security and the Internet of Everything: The Smartphone Remote Hub Problem<\/a><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/the-role-of-smartphones-in-the-internet-of-everything\/\">The Role of Smartphones in the Internet of Everything<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4f60\u7684\u51b0\u7bb1\u6703\u5728\u4f60\u51fa\u9580\u6642\u50b3\u7c21\u8a0a\u63d0\u9192\u4f60\u86cb\u5feb\u6c92\u6709\u4e86\uff0c\u6216\u7576\u4f60\u96e2\u958b\u5bb6\u6642\u9060\u7aef\u95dc\u9589\u4f60\u7a81\u7136\u60f3\u5230\u7684\u96fb\u5668\uff0c\u9019\u4e9b\u90fd\u5f88\u5438\u5f15\u4eba\uff0c\u800c\u667a\u6167\u578b\u624b [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[1335,1722,15],"tags":[1598,1599,241,90,2607,1519,1429],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/9202"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9202"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/9202\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}