字幕列表 影片播放
I'm going to be showing some of the cybercriminals'
我今天要給大家看看,網路犯罪者
latest and nastiest creations.
最新、最惡名昭彰的犯罪手法
So basically, please don't go and download
基本上,請大家不要去下載
any of the viruses that I show you.
我接下來要給大家看的任何病毒
Some of you might be wondering what a cybersecurity specialist looks like,
在座有些人可能會猜想 網路安全專家的工作是什麼樣子
and I thought I'd give you a quick insight
很快地給大家看一下
into my career so far.
我目前的工作經歷
It's a pretty accurate description.
這是還滿真實的描述
This is what someone that specializes
精通於惡意軟體的人
in malware and hacking looks like.
或是駭客就是長這樣
So today, computer viruses and trojans,
現在,電腦病毒和木馬程式
designed to do everything from stealing data
設計來不只竊取電腦資料
to watching you in your webcam
還透過你的網路攝影機監視你
to the theft of billions of dollars.
甚至盜領數十億美元
Some malicious code today goes as far
現在有些惡意代碼已經能夠
as targeting power, utilities and infrastructure.
攻擊能源、公共事業及基礎建設
Let me give you a quick snapshot
很快地給大家看一下
of what malicious code is capable of today.
現在惡意代碼能辦到的事
Right now, every second, eight new users
此時此刻,每秒就有八位
are joining the Internet.
新的網路使用者加入
Today, we will see 250,000 individual new computer viruses.
現在,我們就有 25 萬種新的電腦病毒
We will see 30,000 new infected websites.
還有三萬個剛中毒的網站
And, just to kind of tear down a myth here,
然後在這裡稍微打破大家的迷思
lots of people think that when you get infected
很多人以為電腦中毒
with a computer virus, it's because you went to a porn site.
是因為上了色情網站
Right? Well, actually, statistically speaking,
對吧?事實上,根據數據顯示
if you only visit porn sites, you're safer.
如果你只上色情網站,你還比較安全
People normally write that down, by the way. (Laughter)
順便一提,大家通常會把這記下來 (笑聲)
Actually, about 80 percent of these
其實,大約有 80% 的病毒來源
are small business websites getting infected.
是被感染的小企業網站
Today's cybercriminal, what do they look like?
現在的網路犯罪者是什麼樣子呢?
Well, many of you have the image, don't you,
很多人都會想到類似的畫面,對吧?
of the spotty teenager sitting in a basement,
滿臉雀斑的青少年窩在地下室裡
hacking away for notoriety.
為了成為惡名昭彰的駭客,入侵他人電腦
But actually today, cybercriminals
但事實上,現在的網路犯罪者
are wonderfully professional and organized.
有驚人的專業力和組織性
In fact, they have product adverts.
其實,他們甚至還有產品廣告
You can go online and buy a hacking service
你可以上網購買入侵電腦的服務
to knock your business competitor offline.
以離線狀態打擊你的商業對手
Check out this one I found.
一起看看我發現的這則廣告
(Video) Man: So you're here for one reason,
(影片)「你會在這裡只有一個理由
and that reason is
那個理由就是
because you need your business competitors,
因為你要讓你商業上的競爭者
rivals, haters, or whatever the reason is, or who,
敵人、憎恨的人 不管出於什麼理由,要針對什麼人
they are to go down.
你要打敗他們
Well you, my friend, you've came to the right place.
各位兄弟們,你們來對地方了
If you want your business competitors to go down,
如果你要打敗你的競爭對手
well, they can.
你可以辦的到
If you want your rivals to go offline, well, they will.
你要對手無法連線,他們就會被迫離線
Not only that, we are providing a short-term-to-long-term
不只如此,我們還提供短期到長期的
DDOS service or scheduled attack,
分散式阻斷服務攻擊或是預定攻擊
starting five dollars per hour for small personal websites
個人的小型網站每小時五塊美金
to 10 to 50 dollars per hour.
到每小時十塊、五十塊美金。」
James Lyne: Now, I did actually pay
我真的有付過錢
one of these cybercriminals to attack my own website.
請其中一位網路犯罪者 來攻擊我自己的網站
Things got a bit tricky when I tried to expense it at the company.
我試著要跟公司申請攻擊費時 事情變得有點棘手
Turns out that's not cool.
結果並不如意
But regardless, it's amazing how many products
但不管怎樣,現在那麼多產品和服務 都受到網路犯罪者的威脅
and services are available now to cybercriminals.
涵蓋範圍非常可觀
For example, this testing platform,
舉例來說,這個測試平台
which enables the cybercriminals
可以讓網路犯罪者
to test the quality of their viruses
在散播病毒到世界各地之前
before they release them on the world.
測試他們病毒的品質
For a small fee, they can upload it
只要花一筆小錢,他們就能上傳病毒
and make sure everything is good.
並確保一切順利
But it goes further.
但現在不只如此
Cybercriminals now have crime packs
網路犯罪者現在還有犯罪套件
with business intelligence reporting dashboards
能利用圖表上顯示的商業智慧數據
to manage the distribution of their malicious code.
來管理惡意代碼的散佈
This is the market leader in malware distribution,
這是散佈惡意軟體的市場領導者
the Black Hole Exploit Pack,
「黑洞漏洞攻擊套件」
responsible for nearly one third of malware distribution
在前幾季,有將近三分之一的惡意軟體散佈
in the last couple of quarters.
是由其造成
It comes with technical installation guides,
套件裡包含技術上的安裝說明
video setup routines,
視頻安裝的例行程序
and get this, technical support.
還有,技術上的支持
You can email the cybercriminals and they'll tell you
你可以寄電子郵件給網路犯罪者 他們會告訴你
how to set up your illegal hacking server.
如何架設你的非法駭客伺服器
So let me show you what malicious code looks like today.
給大家看一下現在的惡意代碼是什麼樣子
What I've got here is two systems,
這裡有兩套系統
an attacker, which I've made look all Matrix-y and scary,
一個是攻擊者 我已經把它設計成嚇人的矩陣模型
and a victim, which you might recognize from home or work.
一個是被害者 就是平常我們在家裡或職場上看到的
Now normally, these would be on different sides
正常來說,這兩者會在地球的兩邊
of the planet or of the Internet,
或是網路的兩端
but I've put them side by side
但我把它們放在一起作比較
because it makes things much more interesting.
能夠呈現更有趣的對比
Now, there are many ways you can get infected.
你的電腦會中毒,有很多種可能
You will have come in contact with some of them.
你可能接觸過其中某些病毒
Maybe some of you have received an email
也許你們當中,有人已經收過電子郵件
that says something like, "Hi, I'm a Nigerian banker,
內容是:「嗨,我是奈及利亞的銀行家
and I'd like to give you 53 billion dollars
我想要給你 530 億美元
because I like your face."
因為我喜歡你的長相。」
Or funnycats.exe, which rumor has it
或是收到 funnycats.exe,聽說它
was quite successful in China's recent campaign against America.
在中國最近反抗美國的活動中 執行相當成功
Now there are many ways you can get infected.
電腦中毒有很多種管道
I want to show you a couple of my favorites.
我想給大家看一些我最喜歡的案例
This is a little USB key.
這是一個小小的隨身碟
Now how do you get a USB key to run in a business?
你要如何讓公司插入隨身碟呢?
Well, you could try looking really cute.
你可以用很可愛的方式
Awww.
喔~
Or, in my case, awkward and pathetic.
或者,我自己是用楚楚可憐的方式
So imagine this scenario: I walk into one of your businesses,
想像一下這個場景,我走進你們公司
looking very awkward and pathetic, with a copy of my C.V.
看起來很膽小無助地拿著一份
which I've covered in coffee,
被咖啡濺濕的履歷表
and I ask the receptionist to plug in this USB key
我請櫃台人員插入這個隨身碟
and print me a new one.
幫我印一份新的
So let's have a look here on my victim computer.
我們來看看被害者電腦的情形
What I'm going to do is plug in the USB key.
我現在要插入隨身碟
After a couple of seconds,
幾秒鐘後
things start to happen on the computer on their own,
電腦開始自己跑出一些東西
usually a bad sign.
通常是不好的兆頭
This would, of course, normally happen
當然這種現象,通常只發生
in a couple of seconds, really, really quickly,
在幾秒鐘之內,速度非常非常快
but I've kind of slowed it down
但我把速度稍微放慢
so you can actually see the attack occurring.
讓大家看清楚,電腦是怎麼遭受攻擊
Malware is very boring otherwise.
不然惡意軟體其實滿無聊的
So this is writing out the malicious code,
現在電腦正在寫惡意代碼
and a few seconds later, on the left-hand side,
幾秒鐘後,左手邊
you'll see the attacker's screen get some interesting new text.
你可以看到攻擊者的電腦出現有趣的符號
Now if I place the mouse cursor over it,
假如現在我把游標移到上面
this is what we call a command prompt,
這個叫做命令提示字元視窗
and using this we can navigate around the computer.
利用它,就能隨意控制電腦了
We can access your documents, your data.
我們可以獲取你的文件、資料
You can turn on the webcam.
你可以打開網路攝影機
That can be very embarrassing.
就會變得很尷尬
Or just to really prove a point,
為了證明我的觀點
we can launch programs like my personal favorite,
我們可以打開一個程式,像是我最愛的
the Windows Calculator.
Windows 計算機
So isn't it amazing how much control
所以攻擊者能輕易控制電腦
the attackers can get with such a simple operation?
不是很驚人嗎?
Let me show you how most malware
我讓大家看看現在的惡意軟體
is now distributed today.
是如何散佈出去的
What I'm going to do is open up a website
我現在要打開我架的
that I wrote.
網站
It's a terrible website. It's got really awful graphics.
這網站很爛,製圖滿差的
And it's got a comments section here
這裡有個留言板
where we can submit comments to the website.
可以在網站上留下評論
Many of you will have used something a bit like this before.
很多人都用過這種留言板
Unfortunately, when this was implemented,
不幸地,執行這個動作後
the developer was slightly inebriated
版主有點得意忘形
and managed to forget
試圖遺忘
all of the secure coding practices he had learned.
所有他學過的安全編碼
So let's imagine that our attacker,
想像一下我們的攻擊者
called Evil Hacker just for comedy value,
為了笑果,我們將其稱為「邪惡駭客」
inserts something a little nasty.
他在網頁中置入了棘手的東西
This is a script.
這是一串程式語言
It's code which will be interpreted on the webpage.
是一種網頁可讀取的編碼
So I'm going to submit this post,
我現在要送出這則留言
and then, on my victim computer,
接著,我要打開
I'm going to open up the web browser
受害者電腦的網頁瀏覽器
and browse to my website,
上我的網站
www.incrediblyhacked.com.
www.incrediblyhacked.com
Notice that after a couple of seconds,
注意看,幾秒鐘後
I get redirected.
網站被轉出
That website address at the top there,
從網站上方的網址
which you can just about see, microshaft.com,
可以看到 microshaft.com
the browser crashes as it hits one of these exploit packs,
網站在碰到這些攻擊套件後就當機了
and up pops fake antivirus.
然後出現冒牌的防毒軟體
This is a virus pretending to look like antivirus software,
這種病毒假裝自己是防毒軟體
and it will go through and it will scan the system,
它會仔細瀏覽並掃描整個系統
have a look at what its popping up here.
看一下這裡出現什麼
It creates some very serious alerts.
出現了嚴重的警告
Oh look, a child porn proxy server.
看,兒童色情網代理伺服器
We really should clean that up.
我們真的應該把它清乾淨
What's really insulting about this is
真的很羞辱人的部分
not only does it provide the attackers with access to your data,
不只是它賦予了攻擊者竊取資料的能力
but when the scan finishes, they tell you
更是因為當掃描結束後,它會顯示
in order to clean up the fake viruses,
為了清理假的病毒
you have to register the product.
你必須要申請產品註冊
Now I liked it better when viruses were free.
現在我更喜歡免費的病毒了
(Laughter)
(笑聲)
People now pay cybercriminals money
現在大家付錢請網路犯罪者
to run viruses,
來跑病毒
which I find utterly bizarre.
我覺得很奇怪
So anyway, let me change pace a little bit.
不管怎樣,現在我要稍微換個步調
Chasing 250,000 pieces of malware a day
一天要追趕 25 萬個惡意軟體
is a massive challenge,
是很大的挑戰
and those numbers are only growing
而這樣的數據只會不斷上升
directly in proportion to the length of my stress line, you'll note here.
你可以看到,它和我皺紋的長度成正比
So I want to talk to you briefly
所以我要簡短的跟大家談談
about a group of hackers we tracked for a year
我們追蹤了一年的駭客團隊
and actually found --
而且我們確實找到他們
and this is a rare treat in our job.
對我們的工作來說,這是很難得的事
Now this was a cross-industry collaboration,
這是一個跨企業的合作研究
people from Facebook, independent researchers,
成員有臉書的網友、獨立研究員
guys from Sophos.
以及 Sophos (防毒軟體公司)的人員
So here we have a couple of documents
這裡有一些文件
which our cybercriminals had uploaded
是網路犯罪者
to a cloud service, kind of like Dropbox or SkyDrive,
上傳到類似 Dropbox 或 SkyDrive 的雲端
like many of you might use.
就像你們可能使用過的雲端服務
At the top, you'll notice a section of source code.
上方,你們可以看到原始碼的部分
What this would do is send the cybercriminals
它的功能是每天傳送訊息
a text message every day telling them how much money
給網路犯罪者,告知他們
they'd made that day,
他們當天賺了多少錢
so a kind of cybercriminal billings report, if you will.
所以你可以說它 有點像網路犯罪者的營業額報告
If you look closely, you'll notice a series
如果你仔細看,你會注意到有一串
of what are Russian telephone numbers.
俄羅斯的電話號碼
Now that's obviously interesting,
顯然現在事情越來越有趣了
because that gives us a way of finding our cybercriminals.
因為它提供我們找出網路犯罪者的管道
Down below, highlighted in red,
下方,紅色部分
in the other section of source code,
另一部分的原始碼
is this bit "leded:leded."
是位元 "leded:leded"
That's a username,
那是使用者名稱
kind of like you might have on Twitter.
有點像你在推特上的名字
So let's take this a little further.
現在我們更進一步來看
There are a few other interesting pieces
還有一些網路犯罪者所上傳的
the cybercriminals had uploaded.
有趣的東西
Lots of you here will use smartphones
在場的各位,大部分都會在會議時
to take photos and post them from the conference.
用智慧型手機拍照上傳
An interesting feature of lots of modern smartphones
而大部分的智慧型手機都有一項特色
is that when you take a photo,
當你拍照時
it embeds GPS data about where that photo was taken.
手機會匯入有關拍攝地點的 GPS 資料
In fact, I've been spending a lot of time
事實上,最近我大部分的時間
on Internet dating sites recently,
都花在交友網站上
obviously for research purposes,
當然是為了研究目的
and I've noticed that about 60 percent
而我注意到交友網站上
of the profile pictures on Internet dating sites
大約 60% 的個人照
contain the GPS coordinates of where the photo was taken,
提供了拍攝地點的 GPS 服務
which is kind of scary
這其實有點可怕
because you wouldn't give out your home address
因為你不會給陌生人
to lots of strangers,
你家的住址
but we're happy to give away our GPS coordinates
但我們卻樂意分享我們的位置
to plus or minus 15 meters.
讓 15 公里外的人知道
And our cybercriminals had done the same thing.
網路犯罪者也是做同樣的事情
So here's a photo which resolves to St. Petersburg.
這是在聖彼得堡的照片
We then deploy the incredibly advanced hacking tool.
我們部屬了非常先進的駭客工具
We used Google.
也就是 Google
Using the email address, the telephone number
利用電子郵件、電話號碼
and the GPS data, on the left you see an advert
以及 GPS 數據,左手邊可以看到
for a BMW that one of our cybercriminals is selling,
網路犯罪者在宣傳的 BMW 廣告
on the other side an advert for the sale of sphynx kittens.
另一邊可以看到賣斯芬克斯貓的廣告
One of these was more stereotypical for me.
其中一個對我來說比較常見
A little more searching, and here's our cybercriminal.
進一步研究之後,找到這位網路犯罪者
Imagine, these are hardened cybercriminals
想像一下,這些頑固的網路犯罪者
sharing information scarcely.
幾乎不分享資訊
Imagine what you could find
想像一下,你可以在現場
about each of the people in this room.
每個人身上找出什麼資訊
A bit more searching through the profile
透過個人資料進一步搜尋
and there's a photo of their office.
這是他們辦公室的照片
They were working on the third floor.
他們在三樓工作
And you can also see some photos
你可以從他們的企業夥伴那裡
from his business companion
看到更多照片
where he has a taste in a certain kind of image.
在那,他帶有某種形象的特徵
It turns out he's a member of the Russian Adult Webmasters Federation.
結果發現他是 俄羅斯成人網路管理聯盟的一員
But this is where our investigation starts to slow down.
由此開始,我們的調查遇到瓶頸
The cybercriminals have locked down their profiles quite well.
網路犯罪者把他們的個人檔案鎖得很確實
And herein is the greatest lesson
而此正是我們
of social media and mobile devices for all of us right now.
使用社群媒體和行動裝置時,最重要的一課
Our friends, our families and our colleagues
我們的朋友、家人和同事
can break our security even when we do the right things.
在我們沒做錯事時,也可能危及我們的安全
This is MobSoft, one of the companies
MobSoft,是這位網路犯罪者擁有的
that this cybercriminal gang owned,
其中一家公司
and an interesting thing about MobSoft
有趣的是
is the 50-percent owner of this
擁有 MobSoft 的人
posted a job advert,
50% 分享過招聘廣告
and this job advert matched one of the telephone numbers
而此招聘廣告,剛好符合其中一支
from the code earlier.
先前顯示的電話號碼
This woman was Maria,
這位女性是瑪麗亞
and Maria is the wife of one of our cybercriminals.
她是其中一位網路犯罪者的妻子
And it's kind of like she went into her social media settings
她可能是進入她的社群媒體設定
and clicked on every option imaginable
點選了你想的到的任何選項
to make herself really, really insecure.
使自己陷入極不安全的狀態
By the end of the investigation,
在調查的最後
where you can read the full 27-page report at that link,
在連結中,你可以看到整整 27 頁的報告
we had photos of the cybercriminals,
我們有網路犯罪者的照片
even the office Christmas party
甚至是全體職員
when they were out on an outing.
一起出遊辦的聖誕節派對
That's right, cybercriminals do have Christmas parties,
沒錯,結果網路犯罪者
as it turns out.
也有聖誕派對
Now you're probably wondering what happened to these guys.
現在你可能會想,這些傢伙是怎麼回事
Let me come back to that in just a minute.
等等我再回來談這件事
I want to change pace to one last little demonstration,
我想要最後再做一次示範
a technique that is wonderfully simple and basic,
一個非常簡單且基本的技巧
but is interesting in exposing how much information
有趣的是我們總共洩漏了
we're all giving away,
多少資訊
and it's relevant because it applies to us as a TED audience.
這很重要,因為它適用於我們所有 TED 觀眾
This is normally when people start kind of shuffling in their pockets
通常我們在口袋裡移來移去
trying to turn their phones onto airplane mode desperately.
拼命地要把手機轉成飛航模式就是這樣子
Many of you all know about the concept
大家都知道
of scanning for wireless networks.
選擇無線網路的概念
You do it every time you take out your iPhone or your Blackberry
每次你拿出你的 iPhone 或黑莓機都會做這件事
and connect to something like TEDAttendees.
把它連到像 TEDAttendees 的網路
But what you might not know
但你可能不知道
is that you're also beaming out a list of networks
這時你也發射出了
you've previously connected to,
一系列先前連過的網站訊號
even when you're not using wireless actively.
即使你並沒有常常在使用無線網路
So I ran a little scan.
所以我稍微掃描了一下
I was relatively inhibited compared to the cybercriminals,
比起網路犯罪者,我比較有顧忌一點
who wouldn't be so concerned by law,
因為他們並不在乎法律的約束
and here you can see my mobile device.
這是我的行動裝置
Okay? So you can see a list of wireless networks.
你們可以看到一連串的無線網路
TEDAttendees, HyattLB. Where do you think I'm staying?
TEDAttendees, HyattLBTE 你們覺得我連的是哪一個網路?
My home network, PrettyFlyForAWifi,
我家的網路 PrettyFlyForAWifi
which I think is a great name.
我覺得這名字很不錯
Sophos_Visitors, SANSEMEA, companies I work with.
Sophos_Visitors, SANSEMEA 這是我公司的網路
Loganwifi, that's in Boston. HiltonLondon.
Loganwifi ,它在波士頓 還有 HiltonLondon
CIASurveillanceVan.
以及 CIASurveillanceVan
We called it that at one of our conferences
我們在其中一場會議使用這個名稱
because we thought that would freak people out,
因為我們覺得這可以嚇到大家
which is quite fun.
還滿有趣的
This is how geeks party.
這就是網路怪客娛樂的方式
So let's make this a little bit more interesting.
我們現在談點有趣的
Let's talk about you.
談談你們好了
Twenty-three percent of you have been to Starbucks
在座有 23% 的人最近去過星巴克
recently and used the wireless network.
並且使用無線網路
Things get more interesting.
事情越來越有趣
Forty-six percent of you I could link to a business,
有 46% 的人可以讓我連線到某家企業
XYZ Employee network.
XYZ 員工的網路
This isn't an exact science, but it gets pretty accurate.
這並不是一門精確的科學,但它多少滿準確的
Seven hundred and sixty-one of you I could identify a hotel you'd been to recently,
我可以指出在場 761 位聽眾 最近去過的旅館
absolutely with pinpoint precision somewhere on the globe.
而且是相當精確的位置
Two hundred and thirty-four of you, well, I know where you live.
在場的 234 位聽眾,我知道你們住哪裡
Your wireless network name is so unique
你們的無線網路名稱很特別
that I was able to pinpoint it
讓我能夠非常精確的判斷位置
using data available openly on the Internet
只需要使用網路上公開的資料
with no hacking or clever, clever tricks.
不需要當駭客或任何聰明的技巧
And I should mention as well that
我也要順便提一下
some of you do use your names,
有些人直接使用自己的姓名
"James Lyne's iPhone," for example.
比如說「詹姆斯·萊恩的iPhone」
And two percent of you have a tendency to extreme profanity.
還有 2% 的人使用不雅的名稱
So something for you to think about:
所以有些事應該要思考一下
As we adopt these new applications and mobile devices,
當我們接受這些新的應用程式及行動裝置
as we play with these shiny new toys,
當我們在把玩這些閃亮亮的機子時
how much are we trading off convenience
我們為了方便
for privacy and security?
賠上了多少隱私和安全?
Next time you install something,
下次當你要安裝軟體時
look at the settings and ask yourself,
看看設定,問問自己
"Is this information that I want to share?
「這是我想要分享的資訊嗎?
Would someone be able to abuse it?"
會不會有人濫用它呢?」
We also need to think very carefully
我們也必須仔細思考
about how we develop our future talent pool.
未來的人才庫該如何發展
You see, technology's changing at a staggering rate,
科技日新月異,速度驚人
and that 250,000 pieces of malware
而那 25 萬種惡意軟體
won't stay the same for long.
還會持續不斷增加
There's a very concerning trend
現在有一個需要關注的趨勢
that whilst many people coming out of schools now
許多離開校園的人
are much more technology-savvy, they know how to use technology,
都越來越了解科技,他們知道如何使用科技
fewer and fewer people are following the feeder subjects
越來越少人去研究使用說明
to know how that technology works under the covers.
來了解科技背後是如何運作
In the U.K., a 60 percent reduction since 2003,
在英國,這一類的人 從 2003 年開始就減少了 60%
and there are similar statistics all over the world.
全世界的統計都差不多
We also need to think about the legal issues in this area.
我們必須好好想想科技帶來的非法問題
The cybercriminals I talked about,
我談到的網路犯罪者
despite theft of millions of dollars,
儘管盜領了幾百萬美元
actually still haven't been arrested,
現在仍然逍遙法外
and at this point possibly never will.
而且看起來永遠抓不到了
Most laws are national in their implementation,
大部分的法律都是以國家為單位來執行
despite cybercrime conventions, where the Internet
儘管網路犯罪基本上按定義來說
is borderless and international by definition.
是全球不分國界的
Countries do not agree, which makes this area
國家無法掌控,使得科技
exceptionally challenging from a legal perspective.
在法律上特別棘手
But my biggest ask is this:
但我最大的請求是
You see, you're going to leave here
你將要離開這裡了
and you're going to see some astonishing stories in the news.
你會在新聞上看到很多驚人的故事
You're going to read about malware doing incredible
你會看到惡意軟體做了很多
and terrifying, scary things.
非常駭人的事情
However, 99 percent of it works
然而,這些軟體 99% 可以成功
because people fail to do the basics.
是因為大家都忽略了基本原則
So my ask is this: Go online,
所以我的請求是:上網
find these simple best practices,
去找出這些簡單卻最好用的執行方法
find out how to update and patch your computer.
去了解要如何更新和修正你的電腦
Get a secure password.
設一組安全的密碼
Make sure you use a different password
請確保你在登入每個網站時
on each of your sites and services online.
都是使用不同的密碼
Find these resources. Apply them.
找出這些資源,並加以利用
The Internet is a fantastic resource
網路是一個很棒的資源
for business, for political expression,
不管是對企業、對政治
for art and for learning.
對藝術,還是對於學習
Help me and the security community
請大家幫我及安全社群
make life much, much more difficult
讓網路犯罪者的生存
for cybercriminals.
更加艱難
Thank you.
謝謝
(Applause)
(掌聲)