What Is a Grey Hat?
Gray-hat hacking refers to the use of a security hole in a computer or a product system, and its purpose is to draw the owner's attention to the system vulnerability. Unlike black hat hackers, gray hat hackers are not malicious.
Gray hat hacker
Right!
- Grey hat
- Gray hat female hacker exposes Intel CPU's most lethal vulnerability
- Joanna Rutkowska, a well-known Polish beauty hacker, has become a focus in the security industry. She published a paper on the blog, exposing an Intel CPU cache vulnerability. Another security researcher, LoicDuflot, will introduce the vulnerability and attack code at the CanSecWest Security Conference in Vancouver, Canada.
- If this vulnerability proves to be a problem, hackers can use it to gain near-exclusive control of the computer and not be controlled, shut down, or disabled by any operating system. There is no doubt that antivirus software will be useless at this time. The scope of the hacker's attack may cover any operating system with Intel CPU, such as Vista, XP, Windows Server, Linux, or BSD. This will undoubtedly cause great panic for all users who have installed Intel CPUs. It is reported that the current global computer system, Intel CPU market share accounts for more than 85%.
- Fortunately, JoannaRutkowska is a vulnerability mining and researcher classified as a "grey hat hacker organization". These geniuses tend to self-respect as security researchers. They often expose the discovered vulnerabilities or give them to Microsoft officials to promote them. Software vendors are actively patching vulnerabilities.
- However, if these high-risk vulnerabilities are discovered by some other "black hat" vulnerability miners, the consequences will be very bad. Such people generally sell the exploited vulnerabilities to the black market for money, and the result is that the vulnerabilities are most likely to fall into the hands of commercial hackers, which will trigger a cyber epidemic. . Therefore, in the Internet black industry chain, the practitioners with the highest technology and the greatest threat are not Trojan horse authors, but vulnerabilities miners in "black hat organizations".
- Install the latest bug fixes provided by Microsoft and third-party software vendors.
- 360 Security Guard, as China's largest network security platform, not only can send the latest Microsoft's latest vulnerability patches to 200 million users' computers as soon as possible, but also can often intercept the use of 0Day vulnerabilities (officially discovered but not yet provided patches). The latest Trojan virus and provide users with temporary patches to fix the vulnerabilities. For example, not long after Microsoft s IE7, GDI + and other 0day vulnerabilities were exposed, 360 provided users with temporary patches before Microsoft, which effectively contained a large area of Trojan infection.
- 360 security experts said that for the possible cache vulnerability of Intel CPU, the 360 Security Center will closely monitor the recent network epidemic and pay attention to Intel's official response to this vulnerability. Once Intel confirms the existence of the vulnerability and launches a corresponding patch, 360 Security Guard will push the patch to the desktops of 200 million users' computers as soon as possible to remind users to fix the vulnerability in a timely manner.