{"id":1813,"date":"2024-06-08T06:07:25","date_gmt":"2024-06-08T06:07:25","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1813"},"modified":"2024-06-08T06:07:28","modified_gmt":"2024-06-08T06:07:28","slug":"lenovo-pc-laptop-flaws-understanding-the-risks-and-mitigation-strategies","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/lenovo-pc-laptop-flaws-understanding-the-risks-and-mitigation-strategies\/","title":{"rendered":"Lenovo PC\/\u7b46\u8a18\u578b\u96fb\u8166\u7f3a\u9677\uff1a\u4e86\u89e3\u98a8\u96aa\u548c\u7de9\u89e3\u7b56\u7565"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u9818\u5148\u7684 PC \u548c\u7b46\u8a18\u578b\u96fb\u8166\u88fd\u9020\u5546\u4e4b\u4e00\u806f\u60f3\u6700\u8fd1\u62ab\u9732\u4e86\u591a\u500b BIOS \u5b89\u5168\u6f0f\u6d1e\uff0c\u5f15\u8d77\u4e86\u7528\u6236\u548c\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u7684\u64d4\u6182\u3002 \u9019\u4e9b\u6f0f\u6d1e\u53ef\u80fd\u4f7f\u653b\u64ca\u8005\u80fd\u5920\u5728\u53d7\u5f71\u97ff\u7684\u88dd\u7f6e\u4e0a\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\uff0c\u5f9e\u800c\u5c0d\u4f7f\u7528\u8005\u8cc7\u6599\u548c\u7cfb\u7d71\u5b8c\u6574\u6027\u69cb\u6210\u91cd\u5927\u98a8\u96aa\u3002 \u5728\u672c\u90e8\u843d\u683c\u4e2d\uff0c\u6211\u5011\u5c07\u6df1\u5165\u7814\u7a76\u9019\u4e9b\u6f0f\u6d1e\u7684\u8a73\u7d30\u8cc7\u8a0a\u53ca\u5176\u6f5b\u5728\u5f71\u97ff\uff0c\u4e26\u63d0\u4f9b\u7de9\u89e3\u7b56\u7565\u4f86\u4fdd\u8b77\u806f\u60f3 PC \u548c\u7b46\u8a18\u578b\u96fb\u8166\u7528\u6236\u3002<\/p>\n\n\n\n<p>\u4e86\u89e3\u6f0f\u6d1e\uff1a<\/p>\n\n\n\n<p>\u806f\u60f3\u7684\u5b89\u5168\u516c\u544a\u5f37\u8abf\uff0c\u9019\u4e9b BIOS \u6f0f\u6d1e\u4e0d\u50c5\u5f71\u97ff\u806f\u60f3\u8a2d\u5099\uff0c\u4e5f\u5f71\u97ff\u6574\u500b\u7522\u696d\u7684\u5176\u4ed6\u5e7e\u5bb6\u4f9b\u61c9\u5546\u3002 \u9019\u4e9b\u6f0f\u6d1e\u7684\u56b4\u91cd\u7a0b\u5ea6\u5f88\u9ad8\uff0c\u6db5\u84cb\u4e86\u5ee3\u6cdb\u7684\u98a8\u96aa\uff0c\u5305\u62ec\u8cc7\u8a0a\u5916\u6d29\u548c\u4efb\u610f\u7a0b\u5f0f\u78bc\u57f7\u884c\u3002 \u9019\u500b\u5168\u884c\u696d\u7bc4\u570d\u5f37\u8abf\u4e86\u8fc5\u901f\u89e3\u6c7a\u9019\u4e9b\u6f0f\u6d1e\u7684\u8feb\u5207\u6027\u3002<\/p>\n\n\n\n<p>\u4e3b\u8981\u6f0f\u6d1e\uff1a<\/p>\n\n\n\n<p>\u8a18\u61b6\u9ad4\u6d29\u6f0f\u6f0f\u6d1e\uff08CVE-2023-20594 \u548c CVE-2023-20597\uff09\uff1a\u9019\u4e9b\u8207 AMD CPU \u548c APU \u76f8\u95dc\u7684\u6f0f\u6d1e\u53ef\u88ab\u5177\u6709\u63d0\u5347\u6b0a\u9650\u7684\u4f7f\u7528\u8005\u7528\u4f86\u6aa2\u7d22\u654f\u611f\u8cc7\u8a0a\u3002<\/p>\n\n\n\n<p>\u6b0a\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CVE-2023-5075\u3001CVE-2023-5078 \u7b49\uff09\uff1a\u9019\u4e9b\u6f0f\u6d1e\u5b58\u5728\u65bc\u67d0\u4e9b Lenovo \u7b46\u8a18\u672c\u3001ThinkPad \u548c\u684c\u4e0a\u578b\u96fb\u8166\u7522\u54c1\u7684 BIOS \u97cc\u9ad4\u4e2d\u3002 \u5b83\u5011\u5141\u8a31\u672c\u5730\u5a01\u8105\u884c\u70ba\u8005\u63d0\u5347\u6b0a\u9650\u4e26\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\uff0c\u5f9e\u800c\u53ef\u80fd\u5371\u53ca\u7cfb\u7d71\u7684\u5b89\u5168\u3002<\/p>\n\n\n\n<p>\u7de9\u89e3\u7b56\u7565\uff1a<\/p>\n\n\n\n<p>\u70ba\u4e86\u964d\u4f4e\u8207\u9019\u4e9b\u6f0f\u6d1e\u76f8\u95dc\u7684\u98a8\u96aa\uff0c\u806f\u60f3\u5f37\u70c8\u5efa\u8b70\u7528\u6236\u5c07\u7cfb\u7d71\u97cc\u9ad4\u5347\u7d1a\u5230\u6700\u65b0\u7248\u672c\u3002 \u8acb\u4f9d\u7167\u4ee5\u4e0b\u6b65\u9a5f\u78ba\u4fdd\u66f4\u5b89\u5168\u7684\u904b\u7b97\u9ad4\u9a57\uff1a<\/p>\n\n\n\n<p>\u8a2a\u554f\u60a8\u7522\u54c1\u7684\u5b98\u65b9 Lenovo \u652f\u63f4\u7db2\u7ad9\uff08\u4e0b\u9762\u63d0\u4f9b\u4e86\u93c8\u63a5\uff09\u3002<\/p>\n\n\n\n<p>\u4f7f\u7528\u5176\u540d\u7a31\u6216\u6a5f\u578b\u641c\u7d22\u60a8\u7684\u7522\u54c1\u3002<\/p>\n\n\n\n<p>\u5728\u5de6\u5074\u83dc\u55ae\u9762\u677f\u4e2d\u9ede\u64ca\u201c\u9a45\u52d5\u7a0b\u5e8f\u548c\u8edf\u4ef6\u201d\u3002<\/p>\n\n\n\n<p>\u9078\u64c7\u201c\u624b\u52d5\u66f4\u65b0\u201d\u4ee5\u6309\u7d44\u4ef6\u985e\u578b\u700f\u89bd\u3002<\/p>\n\n\n\n<p>\u5c07\u60a8\u7522\u54c1\u7684\u6700\u4f4e\u56fa\u5b9a\u7248\u672c\u8207\u652f\u63f4\u7db2\u7ad9\u4e0a\u53ef\u7528\u7684\u6700\u65b0\u7248\u672c\u9032\u884c\u6bd4\u8f03\u3002<\/p>\n\n\n\n<p>\u4e0b\u8f09\u4e26\u5b89\u88dd\u63a8\u85a6\u7684\u56fa\u4ef6\u66f4\u65b0\u3002<\/p>\n\n\n\n<p>\u53d7\u5f71\u97ff\u7684\u7522\u54c1\uff1a<\/p>\n\n\n\n<p>\u9019\u4e9b\u6f0f\u6d1e\u5f71\u97ff\u5404\u7a2e Lenovo \u7522\u54c1\uff0c\u5305\u62ec\u684c\u9762\u96fb\u8166\uff0c\u4e00\u9ad4\u6a5f\uff0c\u7b46\u8a18\u672c\u96fb\u8166\uff0c\u670d\u52d9\u5668\u548c\u5b58\u5132\u8a2d\u5099\u3002\u5f37\u70c8\u5efa\u8b70\u9019\u4e9b\u7522\u54c1\u7684\u7528\u6236\u6839\u64da\u4ed6\u5011\u7684\u7279\u5b9a\u7522\u54c1\u578b\u865f\u5347\u7d1a\u5230\u6700\u65b0\u7684\u56fa\u4ef6\u7248\u672c\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u89e3\u6c7a\u806f\u60f3 PC\/\u7b46\u8a18\u578b\u96fb\u8166\u7f3a\u9677\u5c0d\u65bc\u4fdd\u8b77\u4f7f\u7528\u8005\u8cc7\u6599\u548c\u7cfb\u7d71\u5b89\u5168\u81f3\u95dc\u91cd\u8981\u3002 \u900f\u904e\u53ca\u6642\u5c07\u7cfb\u7d71\u97cc\u9ad4\u5347\u7d1a\u5230\u6700\u65b0\u7248\u672c\uff0c\u806f\u60f3\u7528\u6236\u53ef\u4ee5\u6709\u6548\u964d\u4f4e\u9019\u4e9b\u6f0f\u6d1e\u5e36\u4f86\u7684\u98a8\u96aa\u3002 \u7a4d\u6975\u4e3b\u52d5\u5730\u4fdd\u8b77\u60a8\u7684\u8a2d\u5099\u4e26\u78ba\u4fdd\u5b89\u5168\u7684\u904b\u7b97\u74b0\u5883\u3002\u7db2\u8def\u5b89\u5168\u662f\u4e00\u9805\u6301\u7e8c\u7684\u5de5\u4f5c\uff0c\u5728\u7576\u4eca\u7684\u6578\u4f4d\u74b0\u5883\u4e2d\uff0c\u4e86\u89e3\u6f5b\u5728\u98a8\u96aa\u4e26\u5be6\u65bd\u5fc5\u8981\u7684\u5b89\u5168\u63aa\u65bd\u81f3\u95dc\u91cd\u8981\u3002<\/p>\n\n\n\n<p>\u8acb\u8a18\u4f4f\uff0c\u7db2\u7d61\u5b89\u5168\u662f\u4e00\u9805\u6301\u7e8c\u7684\u5de5\u4f5c\uff0c\u4e86\u89e3\u6f5b\u5728\u98a8\u96aa\u4e26\u5be6\u65bd\u5fc5\u8981\u7684\u5b89\u5168\u63aa\u65bd\u5728\u4eca\u5929\u7684\u6578\u5b57\u5316\u74b0\u5883\u4e2d\u81f3\u95dc\u91cd\u8981\u3002<br><\/p>\n\n\n\n<p>\u4ee5\u4e0a\u7db2\u5740\u53ef\u80fd\u6703\u8b8a\u66f4\u3002\u8acb\u53c3\u8003 Lenovo \u63d0\u4f9b\u7684\u6700\u65b0\u5b98\u65b9\u4f86\u6e90\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#LenovoPC #LenovoLaptop #Flaws #BIOSvulnerabilities #ArbitraryCodeExecution #Cybersecurity #DataSecurity #MitigationStrategies #FirmwareUpdate #SystemSecurity #InformationDisclosure #PrivilegeEscalation #CyberThreats #LenovoSecurityAdvisory #StayProtected #UpgradeFirmware #DigitalSecurity #PCSecurity #LaptopSecurity #CyberSafety<\/p>","protected":false},"excerpt":{"rendered":"<p>\u9818\u5148\u7684 PC \u548c\u7b46\u8a18\u578b\u96fb\u8166\u88fd\u9020\u5546\u4e4b\u4e00\u806f\u60f3\u6700\u8fd1\u62ab\u9732\u4e86\u591a\u500b BIOS \u5b89\u5168\u6f0f\u6d1e\uff0c\u5f15\u8d77\u4e86\u7528\u6236\u548c\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u7684\u64d4\u6182\u3002 \u9019\u4e9b\u6f0f\u6d1e\u53ef\u80fd\u4f7f\u653b\u64ca\u8005\u80fd\u5920\u5728\u53d7\u5f71\u97ff\u7684\u88dd\u7f6e\u4e0a\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\uff0c\u5f9e\u800c\u5c0d\u4f7f\u7528\u8005\u8cc7\u6599\u548c\u7cfb\u7d71\u5b8c\u6574\u6027\u69cb\u6210\u91cd\u5927\u98a8\u96aa\u3002 \u5728\u672c\u90e8\u843d\u683c\u4e2d\uff0c\u6211\u5011\u5c07\u6df1\u5165\u7814\u7a76\u9019\u4e9b\u6f0f\u6d1e\u7684\u8a73\u7d30\u8cc7\u8a0a\u53ca\u5176\u6f5b\u5728\u5f71\u97ff\uff0c\u4e26\u63d0\u4f9b\u7de9\u89e3\u7b56\u7565\u4f86\u4fdd\u8b77\u806f\u60f3 PC \u548c\u7b46\u8a18\u578b\u96fb\u8166\u7528\u6236\u3002<\/p>","protected":false},"author":2,"featured_media":1814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[56],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-135936.png","jetpack-related-posts":[{"id":1731,"url":"https:\/\/first-unity.com.hk\/zh\/the-growing-security-risks-of-ai-a-race-against-time-for-companies\/","url_meta":{"origin":1813,"position":0},"title":"The Growing Security Risks of AI: A Race Against Time for Companies","author":"Randy Yip","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: Artificial intelligence (AI) has been hailed as a revolutionary technology, promising increased productivity and efficiency across various industries. However, as the rapid growth of generative AI-based software continues, it presents a significant challenge for business technology leaders to keep up with potential cybersecurity risks. In this blog post, we\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-141526.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1789,"url":"https:\/\/first-unity.com.hk\/zh\/cybercriminals-exploit-remote-desktop-protocols-in-cyber-attacks-a-disturbing-report\/","url_meta":{"origin":1813,"position":1},"title":"Cybercriminals Exploit Remote Desktop Protocols in Cyber Attacks &#8211; A Disturbing Report","author":"Rhona Goskirk","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: In the digital age, cybercriminals are constantly finding new ways to compromise the security of individuals and organizations. A recent report from a global cybersecurity company, Sophos, sheds light on a concerning trend - the exploitation of remote desktop protocols (RDP) in cyber attacks. This blog explores the key\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-152011.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1676,"url":"https:\/\/first-unity.com.hk\/zh\/ai-powered-scams-rampage-through-hong-kong-an-engineers-cautionary-tale\/","url_meta":{"origin":1813,"position":2},"title":"AI-Powered Scams Rampage Through Hong Kong: An Engineer&#8217;s Cautionary Tale","author":"Dr. Ken","date":"6 3 \u6708, 2024","format":false,"excerpt":"As an experienced engineer in Hong Kong, I've witnessed firsthand the debilitating impact of technology on society, particularly the insidious nature of Artificial Intelligence (AI). Recently, the Hong Kong Computer Security Incident Response Team (HKCERT) unveiled staggering data that paints a grim picture of the rising tide of AI-driven scamming\u2026","rel":"","context":"\u5728\u300c\u9999\u6e2fIT\u5feb\u8a0a\u300d\u4e2d","block_context":{"text":"\u9999\u6e2fIT\u5feb\u8a0a","link":"https:\/\/first-unity.com.hk\/zh\/category\/%e9%a6%99%e6%b8%afit%e5%bf%ab%e8%a8%8a\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1954,"url":"https:\/\/first-unity.com.hk\/zh\/cybersecurity-in-the-modern-world-protecting-your-data-from-cyber-threats\/","url_meta":{"origin":1813,"position":3},"title":"Cybersecurity in the Modern World: Protecting Your Data From Cyber Threats","author":"Thomas Leung","date":"11 1 \u6708, 2025","format":false,"excerpt":"In today\u2019s interconnected world, we rely on technology more than ever. From banking and shopping to communication and entertainment, we do much of our daily lives online. This increased reliance on technology also means we\u2019re more vulnerable than ever to cyber threats. Understanding the importance of cybersecurity and taking steps\u2026","rel":"","context":"\u985e\u4f3c\u6587\u7ae0","block_context":{"text":"\u985e\u4f3c\u6587\u7ae0","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2025\/01\/4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1744,"url":"https:\/\/first-unity.com.hk\/zh\/beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity\/","url_meta":{"origin":1813,"position":4},"title":"Beware of the Rising Threat of FakeUpdates: Safeguarding Cybersecurity","author":"Thomas Leung","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In recent months, Hong Kong has witnessed a surge in the prevalence of a malicious software called \"FakeUpdates\" or \"SocGholish.\" This JavaScript-based download program has affected over 2.44% of local organizations, highlighting the alarming trend of hackers bypassing traditional defenses and deceiving users through simple techniques. In Check Point's\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1781,"url":"https:\/\/first-unity.com.hk\/zh\/zooms-security-issues-safeguarding-privacy-and-security-of-online-meetings\/","url_meta":{"origin":1813,"position":5},"title":"Zoom&#8217;s Security Issues: Safeguarding Privacy and Security of Online Meetings","author":"Dr. Ken","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: With the rapid development of global communication technology, the demand for online meeting platforms has significantly increased. Zoom, being a popular video conferencing tool, gained widespread popularity during the COVID-19 pandemic. However, Zoom has also gained notoriety for its security issues, raising concerns among users and experts. This blog\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151700.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1813"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1813"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1814"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}