{"id":1744,"date":"2024-05-30T07:16:30","date_gmt":"2024-05-30T07:16:30","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1744"},"modified":"2024-05-30T07:16:33","modified_gmt":"2024-05-30T07:16:33","slug":"beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity\/","title":{"rendered":"\u8b39\u9632\u865b\u5047\u66f4\u65b0\u65e5\u76ca\u589e\u9577\u7684\u5a01\u8105\uff1a\u7dad\u8b77\u7db2\u8def\u5b89\u5168"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u8fd1\u5e7e\u500b\u6708\u4f86\uff0c\u9999\u6e2f\u51fa\u73fe\u4e86\u4e00\u7a2e\u540d\u70ba\u300cFakeUpdates\u300d\u6216\u300cSocGholish\u300d\u7684\u60e1\u610f\u8edf\u9ad4\u7684\u76db\u884c\u7387\u6fc0\u589e\u3002 \u9019\u7a2e\u57fa\u65bc JavaScript \u7684\u4e0b\u8f09\u7a0b\u5f0f\u5df2\u7d93\u5f71\u97ff\u4e86\u8d85\u904e 2.44% \u7684\u672c\u5730\u7d44\u7e54\uff0c\u51f8\u986f\u4e86\u99ed\u5ba2\u7e5e\u904e\u50b3\u7d71\u9632\u79a6\u4e26\u900f\u904e\u7c21\u55ae\u6280\u8853\u6b3a\u9a19\u7528\u6236\u7684\u9a5a\u4eba\u8da8\u52e2\u3002 \u5728 Check Point 11 \u6708\u5168\u7403\u5a01\u8105\u6307\u6578\u5831\u544a\u4e2d\uff0cFakeUpdates \u7684\u7a81\u51fa\u5730\u4f4d\u6e05\u695a\u5730\u63d0\u9192\u6211\u5011\uff0c\u7dad\u6301\u7a69\u5065\u7684\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u6240\u9762\u81e8\u7684\u6301\u7e8c\u6311\u6230\u3002<\/p>\n\n\n\n<p>FakeUpdates \u7684\u6b3a\u9a19\u6027\uff1a<\/p>\n\n\n\n<p>FakeUpdates \u7684\u904b\u4f5c\u65b9\u5f0f\u662f\u5411\u53d7\u611f\u67d3\u7684\u7db2\u7ad9\u6ce8\u5165 JavaScript \u7a0b\u5f0f\u78bc\uff0c\u8a98\u9a19\u7528\u6236\u76f8\u4fe1\u4ed6\u5011\u9700\u8981\u66f4\u65b0\u700f\u89bd\u5668\u3002 \u5728\u555f\u52d5\u4e4b\u524d\uff0c\u7a0b\u5f0f\u5c07\u5176\u6709\u6548\u8ca0\u8f09\u5beb\u5165\u7528\u6236\u96fb\u8166\u7684\u786c\u789f\u3002 \u4e00\u65e6\u7528\u6236\u4e0a\u7576\u4e26\u555f\u52d5\u865b\u5047\u7684\u700f\u89bd\u5668\u66f4\u65b0\uff0c\u4ed6\u5011\u7684\u7cfb\u7d71\u5c31\u5bb9\u6613\u53d7\u5230\u5404\u7a2e\u5b89\u5168\u6f0f\u6d1e\u7684\u653b\u64ca\u3002<\/p>\n\n\n\n<p>\u5168\u7403\u6f0f\u6d1e\uff1a<\/p>\n\n\n\n<p>\u96d6\u7136 FakeUpdates \u5728\u9999\u6e2f\u9020\u6210\u4e86\u56b4\u91cd\u7834\u58de\uff0c\u4f46\u5fc5\u9808\u8a8d\u8b58\u5230\u9019\u7a2e\u5a01\u8105\u8d85\u51fa\u4e86\u672c\u5730\u908a\u754c\u3002 Check Point \u5831\u544a\u986f\u793a\uff0c\u5168\u7403\u6700\u5e38\u88ab\u5229\u7528\u7684\u6f0f\u6d1e\u662f\u201cHTTP \u547d\u4ee4\u6ce8\u5165\u201d\uff0c\u8a72\u6f0f\u6d1e\u5f71\u97ff\u4e86\u5168\u7403 45% \u7684\u7d44\u7e54\u3002 \u6b64\u5916\uff0c\u300cWeb \u4f3a\u670d\u5668\u60e1\u610f URL \u76ee\u9304\u904d\u6b77\u6f0f\u6d1e\u300d\u548c\u300cZyxel ZyWALL \u547d\u4ee4\u6ce8\u5165\u653b\u64ca (CVE-2023-28771)\u300d\u7dca\u96a8\u5176\u5f8c\uff0c\u5206\u5225\u5f71\u97ff\u4e86\u5168\u7403 42% \u548c 41% \u7684\u7d44\u7e54\u3002<\/p>\n\n\n\n<p>\u964d\u4f4e\u98a8\u96aa\uff1a<\/p>\n\n\n\n<p>\u96a8\u8457\u5a01\u8105\u60c5\u52e2\u7684\u4e0d\u65b7\u767c\u5c55\uff0c\u7d44\u7e54\u548c\u500b\u4eba\u52a0\u5f37\u7db2\u8def\u5b89\u5168\u9632\u79a6\u81f3\u95dc\u91cd\u8981\u3002 \u4ee5\u4e0b\u662f\u9700\u8981\u8003\u616e\u7684\u4e00\u4e9b\u95dc\u9375\u63aa\u65bd\uff1a<\/p>\n\n\n\n<p>\u5b9a\u671f\u8edf\u9ad4\u66f4\u65b0\uff1a\u78ba\u4fdd\u6240\u6709\u8edf\u9ad4\uff08\u5305\u62ec\u700f\u89bd\u5668\u3001\u4f5c\u696d\u7cfb\u7d71\u548c\u61c9\u7528\u7a0b\u5f0f\uff09\u90fd\u662f\u6700\u65b0\u7684\u3002 \u5408\u6cd5\u66f4\u65b0\u901a\u5e38\u900f\u904e\u5b98\u65b9\u7ba1\u9053\u5206\u767c\uff0c\u4f8b\u5982\u8edf\u9ad4\u4f9b\u61c9\u5546\u7684\u7db2\u7ad9\u6216\u5167\u5efa\u66f4\u65b0\u6a5f\u5236\u3002<\/p>\n\n\n\n<p>\u63d0\u793a\u66f4\u65b0\u6642\u8acb\u52d9\u5fc5\u5c0f\u5fc3\uff1a\u5c0d\u610f\u5916\u6216\u672a\u7d93\u8acb\u6c42\u7684\u66f4\u65b0\u8acb\u6c42\u6301\u61f7\u7591\u614b\u5ea6\u3002 \u900f\u904e\u9020\u8a2a\u8edf\u9ad4\u4f9b\u61c9\u5546\u7684\u5b98\u65b9\u7db2\u7ad9\u6216\u76f4\u63a5\u806f\u7e6b\u5176\u5ba2\u6236\u652f\u63f4\u4f86\u9a57\u8b49\u66f4\u65b0\u7684\u771f\u5be6\u6027\u3002<\/p>\n\n\n\n<p>\u5be6\u65bd\u5f37\u5927\u7684\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\uff1a\u90e8\u7f72\u5168\u9762\u7684\u5b89\u5168\u89e3\u6c7a\u65b9\u6848\uff0c\u4f8b\u5982\u9632\u6bd2\u8edf\u9ad4\u3001\u9632\u706b\u7246\u548c\u5165\u4fb5\u5075\u6e2c\u7cfb\u7d71\uff0c\u4ee5\u5075\u6e2c\u548c\u9632\u6b62\u60e1\u610f\u6d3b\u52d5\u3002 \u5b9a\u671f\u66f4\u65b0\u9019\u4e9b\u5b89\u5168\u5de5\u5177\uff0c\u4ee5\u62b5\u79a6\u65b0\u51fa\u73fe\u7684\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u6559\u80b2\u548c\u63d0\u9ad8\u610f\u8b58\uff1a\u63d0\u9ad8\u54e1\u5de5\u3001\u670b\u53cb\u548c\u5bb6\u4eba\u7684\u7db2\u8def\u5b89\u5168\u610f\u8b58\u3002 \u9f13\u52f5\u4ed6\u5011\u5728\u700f\u89bd\u7db2\u8def\u6642\u4fdd\u6301\u8b66\u60d5\uff0c\u907f\u514d\u9ede\u64ca\u53ef\u7591\u9023\u7d50\u6216\u5f9e\u4e0d\u53d7\u4fe1\u4efb\u7684\u4f86\u6e90\u4e0b\u8f09\u6a94\u6848\u3002<\/p>\n\n\n\n<p>\u5b9a\u671f\u5099\u4efd\u6578\u64da\uff1a\u5b9a\u671f\u5099\u4efd\u95dc\u9375\u6578\u64da\uff0c\u4ee5\u6700\u5927\u7a0b\u5ea6\u5730\u6e1b\u5c11\u6f5b\u5728\u7db2\u8def\u653b\u64ca\u7684\u5f71\u97ff\u3002 \u5b89\u5168\u5730\u5132\u5b58\u5099\u4efd\u4e26\u5b9a\u671f\u6e2c\u8a66\u5fa9\u539f\u904e\u7a0b\u4ee5\u78ba\u4fdd\u5176\u5b8c\u6574\u6027\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>FakeUpdates \u7684\u8208\u8d77\u51f8\u986f\u4e86\u9762\u5c0d\u4e0d\u65b7\u8b8a\u5316\u7684\u7db2\u8def\u5a01\u8105\u4fdd\u6301\u8b66\u89ba\u548c\u4e3b\u52d5\u7684\u91cd\u8981\u6027\u3002 \u900f\u904e\u63a1\u7528\u5f37\u5927\u7684\u7db2\u8def\u5b89\u5168\u5be6\u8e10\u4e26\u96a8\u6642\u4e86\u89e3\u65b0\u51fa\u73fe\u7684\u98a8\u96aa\uff0c\u500b\u4eba\u548c\u7d44\u7e54\u53ef\u4ee5\u66f4\u597d\u5730\u4fdd\u8b77\u81ea\u5df1\u514d\u53d7\u60e1\u610f\u6d3b\u52d5\u7684\u4fb5\u5bb3\u3002 \u6700\u7d42\uff0c\u4fdd\u8b77\u6211\u5011\u7684\u6578\u4f4d\u74b0\u5883\u9700\u8981\u96c6\u9ad4\u52aa\u529b\uff0c\u4ee5\u78ba\u4fdd\u6bcf\u500b\u4eba\u90fd\u6709\u66f4\u5b89\u5168\u7684\u7dda\u4e0a\u9ad4\u9a57\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#Cybersecurity #FakeUpdates #SocGholish #Threats #DataProtection #OnlineSecurity #StaySafeOnline #CyberAwareness #Vulnerabilities #Hackers #DigitalDefense #CyberDefense #StayInformed #StayVigilant #SecureYourNetwork #ProtectYourData #InternetSafety #CyberProtection #StayCyberSmart #MalwareThreats #CyberAttacks<\/p>","protected":false},"excerpt":{"rendered":"<p>\u8fd1\u5e7e\u500b\u6708\u4f86\uff0c\u9999\u6e2f\u51fa\u73fe\u4e86\u4e00\u7a2e\u540d\u70ba\u300cFakeUpdates\u300d\u6216\u300cSocGholish\u300d\u7684\u60e1\u610f\u8edf\u9ad4\u7684\u76db\u884c\u7387\u6fc0\u589e\u3002 \u9019\u7a2e\u57fa\u65bc JavaScript \u7684\u4e0b\u8f09\u7a0b\u5f0f\u5df2\u7d93\u5f71\u97ff\u4e86\u8d85\u904e 2.44% \u7684\u672c\u5730\u7d44\u7e54\uff0c\u51f8\u986f\u4e86\u99ed\u5ba2\u7e5e\u904e\u50b3\u7d71\u9632\u79a6\u4e26\u900f\u904e\u7c21\u55ae\u6280\u8853\u6b3a\u9a19\u7528\u6236\u7684\u9a5a\u4eba\u8da8\u52e2\u3002 \u5728 Check Point 11 \u6708\u5168\u7403\u5a01\u8105\u6307\u6578\u5831\u544a\u4e2d\uff0cFakeUpdates \u7684\u7a81\u51fa\u5730\u4f4d\u6e05\u695a\u5730\u63d0\u9192\u6211\u5011\uff0c\u7dad\u6301\u7a69\u5065\u7684\u7db2\u8def\u5b89\u5168\u63aa\u65bd\u6240\u9762\u81e8\u7684\u6301\u7e8c\u6311\u6230\u3002<\/p>","protected":false},"author":3,"featured_media":1746,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png","jetpack-related-posts":[{"id":1662,"url":"https:\/\/first-unity.com.hk\/zh\/guarding-your-digital-life-a-deep-dive-into-cybersecurity-threats\/","url_meta":{"origin":1744,"position":0},"title":"Guarding Your Digital Life: A Deep Dive into Cybersecurity Threats","author":"Thomas Leung","date":"17 2 \u6708, 2024","format":false,"excerpt":"Introduction In this digital world, our lives and work are closely connected to the internet. For the working class in Hong Kong, protecting their digital information and cybersecurity is becoming increasingly important. The Emerging Threat Recently, a hacker group named Water Hydra is actively exploiting a vulnerability in Microsoft Windows\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1797,"url":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","url_meta":{"origin":1744,"position":1},"title":"Cyberattack on AnyDesk: Ensuring Secure Access through Immediate Updates","author":"Dr. Ken","date":"6 6 \u6708, 2024","format":false,"excerpt":"Introduction: In our increasingly connected world, cybersecurity threats continue to pose significant risks to individuals and organizations alike. Recently, AnyDesk, a prominent provider of remote desktop software, experienced a cyberattack that has raised concerns among its user base. This blog aims to shed light on the incident, outline the measures\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1744,"position":2},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1785,"url":"https:\/\/first-unity.com.hk\/zh\/microsofts-38tb-leak-how-it-leaders-should-respond\/","url_meta":{"origin":1744,"position":3},"title":"Microsoft&#8217;s 38TB Leak: How IT Leaders Should Respond","author":"Harry Spira","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital landscape, cybersecurity breaches continue to pose significant challenges for organizations worldwide. One notable incident that caught the attention of IT leaders and cybersecurity professionals was Microsoft's 38TB leak. This massive data breach raised concerns about cloud security and the importance of robust cybersecurity measures. In this\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151844.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1752,"url":"https:\/\/first-unity.com.hk\/zh\/the-alarming-rise-of-malicious-phishing-emails-how-ai-like-chatgpt-is-fueling-the-threat\/","url_meta":{"origin":1744,"position":4},"title":"The Alarming Rise of Malicious Phishing Emails: How AI like ChatGPT is Fueling the Threat","author":"Rhona Goskirk","date":"1 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent years, the world has witnessed a staggering increase in cyber threats, with one particular menace gaining significant traction: malicious phishing emails. A new report by cybersecurity firm SlashNext has shed light on the role of generative artificial intelligence tools, such as ChatGPT, in the exponential growth of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-01-140513.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1813,"url":"https:\/\/first-unity.com.hk\/zh\/lenovo-pc-laptop-flaws-understanding-the-risks-and-mitigation-strategies\/","url_meta":{"origin":1744,"position":5},"title":"Lenovo PC\/Laptop Flaws: Understanding the Risks and Mitigation Strategies","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: Lenovo, one of the leading PC and laptop manufacturers, recently disclosed multiple BIOS security vulnerabilities that have raised concerns among users and cybersecurity experts. These vulnerabilities could potentially enable attackers to run arbitrary code on affected devices, posing significant risks to user data and system integrity. In this blog,\u2026","rel":"","context":"\u5728\u300cBusiness Case Study\u300d\u4e2d","block_context":{"text":"Business Case Study","link":"https:\/\/first-unity.com.hk\/zh\/category\/business-case-study\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-135936.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-135936.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-135936.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1744"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1744"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1744\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1746"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}