Placeholder Image

字幕列表 影片播放

  • I'm going to be showing some of the cybercriminals'

    我今天要給大家看看,網路犯罪者

  • latest and nastiest creations.

    最新、最惡名昭彰的犯罪手法

  • So basically, please don't go and download

    基本上,請大家不要去下載

  • any of the viruses that I show you.

    我接下來要給大家看的任何病毒

  • Some of you might be wondering what a cybersecurity specialist looks like,

    在座有些人可能會猜想 網路安全專家的工作是什麼樣子

  • and I thought I'd give you a quick insight

    很快地給大家看一下

  • into my career so far.

    我目前的工作經歷

  • It's a pretty accurate description.

    這是還滿真實的描述

  • This is what someone that specializes

    精通於惡意軟體的人

  • in malware and hacking looks like.

    或是駭客就是長這樣

  • So today, computer viruses and trojans,

    現在,電腦病毒和木馬程式

  • designed to do everything from stealing data

    設計來不只竊取電腦資料

  • to watching you in your webcam

    還透過你的網路攝影機監視你

  • to the theft of billions of dollars.

    甚至盜領數十億美元

  • Some malicious code today goes as far

    現在有些惡意代碼已經能夠

  • as targeting power, utilities and infrastructure.

    攻擊能源、公共事業及基礎建設

  • Let me give you a quick snapshot

    很快地給大家看一下

  • of what malicious code is capable of today.

    現在惡意代碼能辦到的事

  • Right now, every second, eight new users

    此時此刻,每秒就有八位

  • are joining the Internet.

    新的網路使用者加入

  • Today, we will see 250,000 individual new computer viruses.

    現在,我們就有 25 萬種新的電腦病毒

  • We will see 30,000 new infected websites.

    還有三萬個剛中毒的網站

  • And, just to kind of tear down a myth here,

    然後在這裡稍微打破大家的迷思

  • lots of people think that when you get infected

    很多人以為電腦中毒

  • with a computer virus, it's because you went to a porn site.

    是因為上了色情網站

  • Right? Well, actually, statistically speaking,

    對吧?事實上,根據數據顯示

  • if you only visit porn sites, you're safer.

    如果你只上色情網站,你還比較安全

  • People normally write that down, by the way. (Laughter)

    順便一提,大家通常會把這記下來 (笑聲)

  • Actually, about 80 percent of these

    其實,大約有 80% 的病毒來源

  • are small business websites getting infected.

    是被感染的小企業網站

  • Today's cybercriminal, what do they look like?

    現在的網路犯罪者是什麼樣子呢?

  • Well, many of you have the image, don't you,

    很多人都會想到類似的畫面,對吧?

  • of the spotty teenager sitting in a basement,

    滿臉雀斑的青少年窩在地下室裡

  • hacking away for notoriety.

    為了成為惡名昭彰的駭客,入侵他人電腦

  • But actually today, cybercriminals

    但事實上,現在的網路犯罪者

  • are wonderfully professional and organized.

    有驚人的專業力和組織性

  • In fact, they have product adverts.

    其實,他們甚至還有產品廣告

  • You can go online and buy a hacking service

    你可以上網購買入侵電腦的服務

  • to knock your business competitor offline.

    以離線狀態打擊你的商業對手

  • Check out this one I found.

    一起看看我發現的這則廣告

  • (Video) Man: So you're here for one reason,

    (影片)「你會在這裡只有一個理由

  • and that reason is

    那個理由就是

  • because you need your business competitors,

    因為你要讓你商業上的競爭者

  • rivals, haters, or whatever the reason is, or who,

    敵人、憎恨的人 不管出於什麼理由,要針對什麼人

  • they are to go down.

    你要打敗他們

  • Well you, my friend, you've came to the right place.

    各位兄弟們,你們來對地方了

  • If you want your business competitors to go down,

    如果你要打敗你的競爭對手

  • well, they can.

    你可以辦的到

  • If you want your rivals to go offline, well, they will.

    你要對手無法連線,他們就會被迫離線

  • Not only that, we are providing a short-term-to-long-term

    不只如此,我們還提供短期到長期的

  • DDOS service or scheduled attack,

    分散式阻斷服務攻擊或是預定攻擊

  • starting five dollars per hour for small personal websites

    個人的小型網站每小時五塊美金

  • to 10 to 50 dollars per hour.

    到每小時十塊、五十塊美金。」

  • James Lyne: Now, I did actually pay

    我真的有付過錢

  • one of these cybercriminals to attack my own website.

    請其中一位網路犯罪者 來攻擊我自己的網站

  • Things got a bit tricky when I tried to expense it at the company.

    我試著要跟公司申請攻擊費時 事情變得有點棘手

  • Turns out that's not cool.

    結果並不如意

  • But regardless, it's amazing how many products

    但不管怎樣,現在那麼多產品和服務 都受到網路犯罪者的威脅

  • and services are available now to cybercriminals.

    涵蓋範圍非常可觀

  • For example, this testing platform,

    舉例來說,這個測試平台

  • which enables the cybercriminals

    可以讓網路犯罪者

  • to test the quality of their viruses

    在散播病毒到世界各地之前

  • before they release them on the world.

    測試他們病毒的品質

  • For a small fee, they can upload it

    只要花一筆小錢,他們就能上傳病毒

  • and make sure everything is good.

    並確保一切順利

  • But it goes further.

    但現在不只如此

  • Cybercriminals now have crime packs

    網路犯罪者現在還有犯罪套件

  • with business intelligence reporting dashboards

    能利用圖表上顯示的商業智慧數據

  • to manage the distribution of their malicious code.

    來管理惡意代碼的散佈

  • This is the market leader in malware distribution,

    這是散佈惡意軟體的市場領導者

  • the Black Hole Exploit Pack,

    「黑洞漏洞攻擊套件」

  • responsible for nearly one third of malware distribution

    在前幾季,有將近三分之一的惡意軟體散佈

  • in the last couple of quarters.

    是由其造成

  • It comes with technical installation guides,

    套件裡包含技術上的安裝說明

  • video setup routines,

    視頻安裝的例行程序

  • and get this, technical support.

    還有,技術上的支持

  • You can email the cybercriminals and they'll tell you

    你可以寄電子郵件給網路犯罪者 他們會告訴你

  • how to set up your illegal hacking server.

    如何架設你的非法駭客伺服器

  • So let me show you what malicious code looks like today.

    給大家看一下現在的惡意代碼是什麼樣子

  • What I've got here is two systems,

    這裡有兩套系統

  • an attacker, which I've made look all Matrix-y and scary,

    一個是攻擊者 我已經把它設計成嚇人的矩陣模型

  • and a victim, which you might recognize from home or work.

    一個是被害者 就是平常我們在家裡或職場上看到的

  • Now normally, these would be on different sides

    正常來說,這兩者會在地球的兩邊

  • of the planet or of the Internet,

    或是網路的兩端

  • but I've put them side by side

    但我把它們放在一起作比較

  • because it makes things much more interesting.

    能夠呈現更有趣的對比

  • Now, there are many ways you can get infected.

    你的電腦會中毒,有很多種可能

  • You will have come in contact with some of them.

    你可能接觸過其中某些病毒

  • Maybe some of you have received an email

    也許你們當中,有人已經收過電子郵件

  • that says something like, "Hi, I'm a Nigerian banker,

    內容是:「嗨,我是奈及利亞的銀行家

  • and I'd like to give you 53 billion dollars

    我想要給你 530 億美元

  • because I like your face."

    因為我喜歡你的長相。」

  • Or funnycats.exe, which rumor has it

    或是收到 funnycats.exe,聽說它

  • was quite successful in China's recent campaign against America.

    在中國最近反抗美國的活動中 執行相當成功

  • Now there are many ways you can get infected.

    電腦中毒有很多種管道

  • I want to show you a couple of my favorites.

    我想給大家看一些我最喜歡的案例

  • This is a little USB key.

    這是一個小小的隨身碟

  • Now how do you get a USB key to run in a business?

    你要如何讓公司插入隨身碟呢?

  • Well, you could try looking really cute.

    你可以用很可愛的方式

  • Awww.

    喔~

  • Or, in my case, awkward and pathetic.

    或者,我自己是用楚楚可憐的方式

  • So imagine this scenario: I walk into one of your businesses,

    想像一下這個場景,我走進你們公司

  • looking very awkward and pathetic, with a copy of my C.V.

    看起來很膽小無助地拿著一份

  • which I've covered in coffee,

    被咖啡濺濕的履歷表

  • and I ask the receptionist to plug in this USB key

    我請櫃台人員插入這個隨身碟

  • and print me a new one.

    幫我印一份新的

  • So let's have a look here on my victim computer.

    我們來看看被害者電腦的情形

  • What I'm going to do is plug in the USB key.

    我現在要插入隨身碟

  • After a couple of seconds,

    幾秒鐘後

  • things start to happen on the computer on their own,

    電腦開始自己跑出一些東西

  • usually a bad sign.

    通常是不好的兆頭

  • This would, of course, normally happen

    當然這種現象,通常只發生

  • in a couple of seconds, really, really quickly,

    在幾秒鐘之內,速度非常非常快

  • but I've kind of slowed it down

    但我把速度稍微放慢

  • so you can actually see the attack occurring.

    讓大家看清楚,電腦是怎麼遭受攻擊

  • Malware is very boring otherwise.

    不然惡意軟體其實滿無聊的

  • So this is writing out the malicious code,

    現在電腦正在寫惡意代碼

  • and a few seconds later, on the left-hand side,

    幾秒鐘後,左手邊

  • you'll see the attacker's screen get some interesting new text.

    你可以看到攻擊者的電腦出現有趣的符號

  • Now if I place the mouse cursor over it,

    假如現在我把游標移到上面

  • this is what we call a command prompt,

    這個叫做命令提示字元視窗

  • and using this we can navigate around the computer.

    利用它,就能隨意控制電腦了

  • We can access your documents, your data.

    我們可以獲取你的文件、資料

  • You can turn on the webcam.

    你可以打開網路攝影機

  • That can be very embarrassing.

    就會變得很尷尬

  • Or just to really prove a point,

    為了證明我的觀點

  • we can launch programs like my personal favorite,

    我們可以打開一個程式,像是我最愛的

  • the Windows Calculator.

    Windows 計算機

  • So isn't it amazing how much control

    所以攻擊者能輕易控制電腦

  • the attackers can get with such a simple operation?

    不是很驚人嗎?

  • Let me show you how most malware

    我讓大家看看現在的惡意軟體

  • is now distributed today.

    是如何散佈出去的

  • What I'm going to do is open up a website

    我現在要打開我架的

  • that I wrote.

    網站

  • It's a terrible website. It's got really awful graphics.

    這網站很爛,製圖滿差的

  • And it's got a comments section here

    這裡有個留言板

  • where we can submit comments to the website.

    可以在網站上留下評論

  • Many of you will have used something a bit like this before.

    很多人都用過這種留言板

  • Unfortunately, when this was implemented,

    不幸地,執行這個動作後

  • the developer was slightly inebriated

    版主有點得意忘形

  • and managed to forget

    試圖遺忘

  • all of the secure coding practices he had learned.

    所有他學過的安全編碼

  • So let's imagine that our attacker,

    想像一下我們的攻擊者

  • called Evil Hacker just for comedy value,

    為了笑果,我們將其稱為「邪惡駭客」

  • inserts something a little nasty.

    他在網頁中置入了棘手的東西

  • This is a script.

    這是一串程式語言

  • It's code which will be interpreted on the webpage.

    是一種網頁可讀取的編碼

  • So I'm going to submit this post,

    我現在要送出這則留言

  • and then, on my victim computer,

    接著,我要打開

  • I'm going to open up the web browser

    受害者電腦的網頁瀏覽器

  • and browse to my website,

    上我的網站

  • www.incrediblyhacked.com.

    www.incrediblyhacked.com

  • Notice that after a couple of seconds,

    注意看,幾秒鐘後

  • I get redirected.

    網站被轉出

  • That website address at the top there,

    從網站上方的網址

  • which you can just about see, microshaft.com,

    可以看到 microshaft.com

  • the browser crashes as it hits one of these exploit packs,

    網站在碰到這些攻擊套件後就當機了

  • and up pops fake antivirus.

    然後出現冒牌的防毒軟體

  • This is a virus pretending to look like antivirus software,

    這種病毒假裝自己是防毒軟體

  • and it will go through and it will scan the system,

    它會仔細瀏覽並掃描整個系統

  • have a look at what its popping up here.

    看一下這裡出現什麼

  • It creates some very serious alerts.

    出現了嚴重的警告

  • Oh look, a child porn proxy server.

    看,兒童色情網代理伺服器

  • We really should clean that up.

    我們真的應該把它清乾淨

  • What's really insulting about this is

    真的很羞辱人的部分

  • not only does it provide the attackers with access to your data,

    不只是它賦予了攻擊者竊取資料的能力

  • but when the scan finishes, they tell you

    更是因為當掃描結束後,它會顯示

  • in order to clean up the fake viruses,

    為了清理假的病毒

  • you have to register the product.

    你必須要申請產品註冊

  • Now I liked it better when viruses were free.

    現在我更喜歡免費的病毒了

  • (Laughter)

    (笑聲)

  • People now pay cybercriminals money

    現在大家付錢請網路犯罪者

  • to run viruses,

    來跑病毒

  • which I find utterly bizarre.

    我覺得很奇怪

  • So anyway, let me change pace a little bit.

    不管怎樣,現在我要稍微換個步調

  • Chasing 250,000 pieces of malware a day

    一天要追趕 25 萬個惡意軟體

  • is a massive challenge,

    是很大的挑戰

  • and those numbers are only growing

    而這樣的數據只會不斷上升

  • directly in proportion to the length of my stress line, you'll note here.

    你可以看到,它和我皺紋的長度成正比

  • So I want to talk to you briefly

    所以我要簡短的跟大家談談

  • about a group of hackers we tracked for a year

    我們追蹤了一年的駭客團隊

  • and actually found --

    而且我們確實找到他們

  • and this is a rare treat in our job.

    對我們的工作來說,這是很難得的事

  • Now this was a cross-industry collaboration,

    這是一個跨企業的合作研究

  • people from Facebook, independent researchers,

    成員有臉書的網友、獨立研究員

  • guys from Sophos.

    以及 Sophos (防毒軟體公司)的人員

  • So here we have a couple of documents

    這裡有一些文件

  • which our cybercriminals had uploaded

    是網路犯罪者

  • to a cloud service, kind of like Dropbox or SkyDrive,

    上傳到類似 Dropbox 或 SkyDrive 的雲端

  • like many of you might use.

    就像你們可能使用過的雲端服務

  • At the top, you'll notice a section of source code.

    上方,你們可以看到原始碼的部分

  • What this would do is send the cybercriminals

    它的功能是每天傳送訊息

  • a text message every day telling them how much money

    給網路犯罪者,告知他們

  • they'd made that day,

    他們當天賺了多少錢

  • so a kind of cybercriminal billings report, if you will.

    所以你可以說它 有點像網路犯罪者的營業額報告

  • If you look closely, you'll notice a series

    如果你仔細看,你會注意到有一串

  • of what are Russian telephone numbers.

    俄羅斯的電話號碼

  • Now that's obviously interesting,

    顯然現在事情越來越有趣了

  • because that gives us a way of finding our cybercriminals.

    因為它提供我們找出網路犯罪者的管道

  • Down below, highlighted in red,

    下方,紅色部分

  • in the other section of source code,

    另一部分的原始碼

  • is this bit "leded:leded."

    是位元 "leded:leded"

  • That's a username,

    那是使用者名稱

  • kind of like you might have on Twitter.

    有點像你在推特上的名字

  • So let's take this a little further.

    現在我們更進一步來看

  • There are a few other interesting pieces

    還有一些網路犯罪者所上傳的

  • the cybercriminals had uploaded.

    有趣的東西

  • Lots of you here will use smartphones

    在場的各位,大部分都會在會議時

  • to take photos and post them from the conference.

    用智慧型手機拍照上傳

  • An interesting feature of lots of modern smartphones

    而大部分的智慧型手機都有一項特色

  • is that when you take a photo,

    當你拍照時

  • it embeds GPS data about where that photo was taken.

    手機會匯入有關拍攝地點的 GPS 資料

  • In fact, I've been spending a lot of time

    事實上,最近我大部分的時間

  • on Internet dating sites recently,

    都花在交友網站上

  • obviously for research purposes,

    當然是為了研究目的

  • and I've noticed that about 60 percent

    而我注意到交友網站上

  • of the profile pictures on Internet dating sites

    大約 60% 的個人照

  • contain the GPS coordinates of where the photo was taken,

    提供了拍攝地點的 GPS 服務

  • which is kind of scary

    這其實有點可怕

  • because you wouldn't give out your home address

    因為你不會給陌生人

  • to lots of strangers,

    你家的住址

  • but we're happy to give away our GPS coordinates

    但我們卻樂意分享我們的位置

  • to plus or minus 15 meters.

    讓 15 公里外的人知道

  • And our cybercriminals had done the same thing.

    網路犯罪者也是做同樣的事情

  • So here's a photo which resolves to St. Petersburg.

    這是在聖彼得堡的照片

  • We then deploy the incredibly advanced hacking tool.

    我們部屬了非常先進的駭客工具

  • We used Google.

    也就是 Google

  • Using the email address, the telephone number

    利用電子郵件、電話號碼

  • and the GPS data, on the left you see an advert

    以及 GPS 數據,左手邊可以看到

  • for a BMW that one of our cybercriminals is selling,

    網路犯罪者在宣傳的 BMW 廣告

  • on the other side an advert for the sale of sphynx kittens.

    另一邊可以看到賣斯芬克斯貓的廣告

  • One of these was more stereotypical for me.

    其中一個對我來說比較常見

  • A little more searching, and here's our cybercriminal.

    進一步研究之後,找到這位網路犯罪者

  • Imagine, these are hardened cybercriminals

    想像一下,這些頑固的網路犯罪者

  • sharing information scarcely.

    幾乎不分享資訊

  • Imagine what you could find

    想像一下,你可以在現場

  • about each of the people in this room.

    每個人身上找出什麼資訊

  • A bit more searching through the profile

    透過個人資料進一步搜尋

  • and there's a photo of their office.

    這是他們辦公室的照片

  • They were working on the third floor.

    他們在三樓工作

  • And you can also see some photos

    你可以從他們的企業夥伴那裡

  • from his business companion

    看到更多照片

  • where he has a taste in a certain kind of image.

    在那,他帶有某種形象的特徵

  • It turns out he's a member of the Russian Adult Webmasters Federation.

    結果發現他是 俄羅斯成人網路管理聯盟的一員

  • But this is where our investigation starts to slow down.

    由此開始,我們的調查遇到瓶頸

  • The cybercriminals have locked down their profiles quite well.

    網路犯罪者把他們的個人檔案鎖得很確實

  • And herein is the greatest lesson

    而此正是我們

  • of social media and mobile devices for all of us right now.

    使用社群媒體和行動裝置時,最重要的一課

  • Our friends, our families and our colleagues

    我們的朋友、家人和同事

  • can break our security even when we do the right things.

    在我們沒做錯事時,也可能危及我們的安全

  • This is MobSoft, one of the companies

    MobSoft,是這位網路犯罪者擁有的

  • that this cybercriminal gang owned,

    其中一家公司

  • and an interesting thing about MobSoft

    有趣的是

  • is the 50-percent owner of this

    擁有 MobSoft 的人

  • posted a job advert,

    50% 分享過招聘廣告

  • and this job advert matched one of the telephone numbers

    而此招聘廣告,剛好符合其中一支

  • from the code earlier.

    先前顯示的電話號碼

  • This woman was Maria,

    這位女性是瑪麗亞

  • and Maria is the wife of one of our cybercriminals.

    她是其中一位網路犯罪者的妻子

  • And it's kind of like she went into her social media settings

    她可能是進入她的社群媒體設定

  • and clicked on every option imaginable

    點選了你想的到的任何選項

  • to make herself really, really insecure.

    使自己陷入極不安全的狀態

  • By the end of the investigation,

    在調查的最後

  • where you can read the full 27-page report at that link,

    在連結中,你可以看到整整 27 頁的報告

  • we had photos of the cybercriminals,

    我們有網路犯罪者的照片

  • even the office Christmas party

    甚至是全體職員

  • when they were out on an outing.

    一起出遊辦的聖誕節派對

  • That's right, cybercriminals do have Christmas parties,

    沒錯,結果網路犯罪者

  • as it turns out.

    也有聖誕派對

  • Now you're probably wondering what happened to these guys.

    現在你可能會想,這些傢伙是怎麼回事

  • Let me come back to that in just a minute.

    等等我再回來談這件事

  • I want to change pace to one last little demonstration,

    我想要最後再做一次示範

  • a technique that is wonderfully simple and basic,

    一個非常簡單且基本的技巧

  • but is interesting in exposing how much information

    有趣的是我們總共洩漏了

  • we're all giving away,

    多少資訊

  • and it's relevant because it applies to us as a TED audience.

    這很重要,因為它適用於我們所有 TED 觀眾

  • This is normally when people start kind of shuffling in their pockets

    通常我們在口袋裡移來移去

  • trying to turn their phones onto airplane mode desperately.

    拼命地要把手機轉成飛航模式就是這樣子

  • Many of you all know about the concept

    大家都知道

  • of scanning for wireless networks.

    選擇無線網路的概念

  • You do it every time you take out your iPhone or your Blackberry

    每次你拿出你的 iPhone 或黑莓機都會做這件事

  • and connect to something like TEDAttendees.

    把它連到像 TEDAttendees 的網路

  • But what you might not know

    但你可能不知道

  • is that you're also beaming out a list of networks

    這時你也發射出了

  • you've previously connected to,

    一系列先前連過的網站訊號

  • even when you're not using wireless actively.

    即使你並沒有常常在使用無線網路

  • So I ran a little scan.

    所以我稍微掃描了一下

  • I was relatively inhibited compared to the cybercriminals,

    比起網路犯罪者,我比較有顧忌一點

  • who wouldn't be so concerned by law,

    因為他們並不在乎法律的約束

  • and here you can see my mobile device.

    這是我的行動裝置

  • Okay? So you can see a list of wireless networks.

    你們可以看到一連串的無線網路

  • TEDAttendees, HyattLB. Where do you think I'm staying?

    TEDAttendees, HyattLBTE 你們覺得我連的是哪一個網路?

  • My home network, PrettyFlyForAWifi,

    我家的網路 PrettyFlyForAWifi

  • which I think is a great name.

    我覺得這名字很不錯

  • Sophos_Visitors, SANSEMEA, companies I work with.

    Sophos_Visitors, SANSEMEA 這是我公司的網路

  • Loganwifi, that's in Boston. HiltonLondon.

    Loganwifi ,它在波士頓 還有 HiltonLondon

  • CIASurveillanceVan.

    以及 CIASurveillanceVan

  • We called it that at one of our conferences

    我們在其中一場會議使用這個名稱

  • because we thought that would freak people out,

    因為我們覺得這可以嚇到大家

  • which is quite fun.

    還滿有趣的

  • This is how geeks party.

    這就是網路怪客娛樂的方式

  • So let's make this a little bit more interesting.

    我們現在談點有趣的

  • Let's talk about you.

    談談你們好了

  • Twenty-three percent of you have been to Starbucks

    在座有 23% 的人最近去過星巴克

  • recently and used the wireless network.

    並且使用無線網路

  • Things get more interesting.

    事情越來越有趣

  • Forty-six percent of you I could link to a business,

    有 46% 的人可以讓我連線到某家企業

  • XYZ Employee network.

    XYZ 員工的網路

  • This isn't an exact science, but it gets pretty accurate.

    這並不是一門精確的科學,但它多少滿準確的

  • Seven hundred and sixty-one of you I could identify a hotel you'd been to recently,

    我可以指出在場 761 位聽眾 最近去過的旅館

  • absolutely with pinpoint precision somewhere on the globe.

    而且是相當精確的位置

  • Two hundred and thirty-four of you, well, I know where you live.

    在場的 234 位聽眾,我知道你們住哪裡

  • Your wireless network name is so unique

    你們的無線網路名稱很特別

  • that I was able to pinpoint it

    讓我能夠非常精確的判斷位置

  • using data available openly on the Internet

    只需要使用網路上公開的資料

  • with no hacking or clever, clever tricks.

    不需要當駭客或任何聰明的技巧

  • And I should mention as well that

    我也要順便提一下

  • some of you do use your names,

    有些人直接使用自己的姓名

  • "James Lyne's iPhone," for example.

    比如說「詹姆斯·萊恩的iPhone」

  • And two percent of you have a tendency to extreme profanity.

    還有 2% 的人使用不雅的名稱

  • So something for you to think about:

    所以有些事應該要思考一下

  • As we adopt these new applications and mobile devices,

    當我們接受這些新的應用程式及行動裝置

  • as we play with these shiny new toys,

    當我們在把玩這些閃亮亮的機子時

  • how much are we trading off convenience

    我們為了方便

  • for privacy and security?

    賠上了多少隱私和安全?

  • Next time you install something,

    下次當你要安裝軟體時

  • look at the settings and ask yourself,

    看看設定,問問自己

  • "Is this information that I want to share?

    「這是我想要分享的資訊嗎?

  • Would someone be able to abuse it?"

    會不會有人濫用它呢?」

  • We also need to think very carefully

    我們也必須仔細思考

  • about how we develop our future talent pool.

    未來的人才庫該如何發展

  • You see, technology's changing at a staggering rate,

    科技日新月異,速度驚人

  • and that 250,000 pieces of malware

    而那 25 萬種惡意軟體

  • won't stay the same for long.

    還會持續不斷增加

  • There's a very concerning trend

    現在有一個需要關注的趨勢

  • that whilst many people coming out of schools now

    許多離開校園的人

  • are much more technology-savvy, they know how to use technology,

    都越來越了解科技,他們知道如何使用科技

  • fewer and fewer people are following the feeder subjects

    越來越少人去研究使用說明

  • to know how that technology works under the covers.

    來了解科技背後是如何運作

  • In the U.K., a 60 percent reduction since 2003,

    在英國,這一類的人 從 2003 年開始就減少了 60%

  • and there are similar statistics all over the world.

    全世界的統計都差不多

  • We also need to think about the legal issues in this area.

    我們必須好好想想科技帶來的非法問題

  • The cybercriminals I talked about,

    我談到的網路犯罪者

  • despite theft of millions of dollars,

    儘管盜領了幾百萬美元

  • actually still haven't been arrested,

    現在仍然逍遙法外

  • and at this point possibly never will.

    而且看起來永遠抓不到了

  • Most laws are national in their implementation,

    大部分的法律都是以國家為單位來執行

  • despite cybercrime conventions, where the Internet

    儘管網路犯罪基本上按定義來說

  • is borderless and international by definition.

    是全球不分國界的

  • Countries do not agree, which makes this area

    國家無法掌控,使得科技

  • exceptionally challenging from a legal perspective.

    在法律上特別棘手

  • But my biggest ask is this:

    但我最大的請求是

  • You see, you're going to leave here

    你將要離開這裡了

  • and you're going to see some astonishing stories in the news.

    你會在新聞上看到很多驚人的故事

  • You're going to read about malware doing incredible

    你會看到惡意軟體做了很多

  • and terrifying, scary things.

    非常駭人的事情

  • However, 99 percent of it works

    然而,這些軟體 99% 可以成功

  • because people fail to do the basics.

    是因為大家都忽略了基本原則

  • So my ask is this: Go online,

    所以我的請求是:上網

  • find these simple best practices,

    去找出這些簡單卻最好用的執行方法

  • find out how to update and patch your computer.

    去了解要如何更新和修正你的電腦

  • Get a secure password.

    設一組安全的密碼

  • Make sure you use a different password

    請確保你在登入每個網站時

  • on each of your sites and services online.

    都是使用不同的密碼

  • Find these resources. Apply them.

    找出這些資源,並加以利用

  • The Internet is a fantastic resource

    網路是一個很棒的資源

  • for business, for political expression,

    不管是對企業、對政治

  • for art and for learning.

    對藝術,還是對於學習

  • Help me and the security community

    請大家幫我及安全社群

  • make life much, much more difficult

    讓網路犯罪者的生存

  • for cybercriminals.

    更加艱難

  • Thank you.

    謝謝

  • (Applause)

    (掌聲)

I'm going to be showing some of the cybercriminals'

我今天要給大家看看,網路犯罪者

字幕與單字

單字即點即查 點擊單字可以查詢單字解釋

B1 中級 中文 英國腔 TED 網路 惡意 網站 軟體 病毒

【TED】詹姆斯-萊恩:每天的網絡犯罪--以及你能做什麼(詹姆斯-萊恩:每天的網絡犯罪--以及你能做什麼)。 (【TED】James Lyne: Everyday cybercrime -- and what you can do about it (James Lyne: Everyday cybercrime -- and what you can do about it))

  • 4490 173
    Max Lin 發佈於 2021 年 01 月 14 日
影片單字