Chapter 986
"Ding~ Infringement of computer information system security cybercrime, score +1."
"Ding~ The crime of destroying private information, the score is +1."
"Ding~ The crime of destroying private information, the score is +1."
"Ding~~~"
Jiang Hao was eating, and there was a continuous sound of ding ding dong dong in his ears, and suddenly felt that the sound was so pleasant, Jiang Hao closed his eyes and enjoyed it.
Full, really full.
"Sir, are you okay?" A waiter saw that Jiang Hao raised his head slightly, closed his eyes, and his hands seemed to be gently grasping something in mid-air. He didn't know what the guest was doing, so he hurried over to ask.
Jiang Hao opened his eyes, with a comfortable smile on his face, "Today's lamb chops are really delicious, I want to tip the chef."
"Okay, I'll call the chef right now." The waiter said quickly.
There is no greater compliment to a chef than to eat up his dishes.
Of course, there is a better compliment, that is, to tip them directly. No one loves money. After a while, the chef came over with his assistant, and he looked like an Arab, "Sir, are you satisfied with today's meal?" .”
"Yes, I'm very satisfied, especially this lamb chop. I ate up a whole big portion." Jiang Hao said, pointing to the bones on the plate.
The chef nodded and smiled, "God bless you with a good appetite".
"How many people are there in your back kitchen?" Jiang Hao asked.
"A total of 17 people." The chef and assistant's eyes lit up. Is this the rhythm of rewarding everyone?
Jiang Hao took out a thick stack of US dollars from his pocket, all of which were hundred-dollar bills, and took out one and handed it to the waiter, "This is your tip, I am very satisfied with your service."
The waiter took the tip with a smile on his face and couldn't stop thanking him.
I counted two more and handed them to the chef, "The lamb chops you baked are very good, I am very satisfied, thank you for bringing me delicious food."
The chef happily accepted the $200, and then Jiang Hao counted out 1,600 people, and handed it to the chef, "This is the tip for the rest of the chef, one hundred per person."
Tipping is basically the norm in the United States and European countries. Tips are required for receiving services. Generally, they are about 10 to 20% of the service price. The main income of waiters comes from tips, but like Jiang Hao, he tipped thousands at a time. Dollars are really rare.
Calculating casually, he has earned hundreds of millions of dollars in just a short time, so spending two thousand dollars in rewards is nothing.
Rich and willful.
Not long after, the chefs all came out and thanked Jiang Hao together, which attracted other guests to look here. This is the appearance of a real local tyrant.
200 million mobile phones in the United States have been data cleaned. This event has caused a sensation all over the world. The current speed of information transmission is calculated in seconds, and countries all over the world have reported on this matter.
US media: "This is our catastrophe day, even surpassing the terrorist attack. The security department and Google announced at the same time, saying that this incident was done by hackers and deliberately undermined the security of the United States. The president has ordered the security department to investigate this matter, but those lost data Who is in charge?"
British media, "This incident occurred in the United States. Is the United Kingdom safe? If someone attacks mobile phone users in the United Kingdom, it is doubtful whether we can avoid losses."
Egyptian media, "One of the world's top Internet companies was attacked and had no way to fight back, causing huge losses to its users. Isn't Google responsible? Google's stock fell sharply by 20% that day. This is the best illustrate."
Russian media, "Internet experts analyzed that hackers used Android vulnerabilities to create this data cleaning incident, which fully exposed the imperfection of the Android system."
Chinese media, "Be vigilant against cyber-terrorist attacks, and domestic Android users are requested to back up their data, so as not to cause such incidents to cause greater losses. The Android system accounts for 75% of the world's mobile phone systems, which itself is an extremely dangerous As shown in this incident, once it is attacked, the consequences will be disastrous."
"In addition, the system independently developed by a Chinese company will hold a press conference in 3 days. The system independently developed by China has an independent algorithm different from the Android system. It has the characteristics of high security and strong stability, and will definitely provide users with the most Good security."
This report is very Chinese.
Two hours after the incident broke out, hundreds of victims who blocked the door gathered at the gate of Google, demanding that Google give an explanation.
At the same time, a large number of demonstrators also appeared outside the White House and in front of the state governments. They shouted slogans,
"Give back my data, my privacy, my safety, my youth, and my love."
"The loss of data has caused great losses, and Google is required to make compensation."
"Google is a crap company and US security is a bunch of idiots."
There was a lot of uproar and disturbance.
This incident was very troublesome, because there were too many people involved, and a special declared that the country had entered a state of emergency again.
Ok,
Anyway, he announced that this kind of thing is already familiar.
At the same time, the security department also conducted a detailed investigation of the incident, and finally concluded that the incident was deliberately done by someone who first rented the supercomputer of KT Data Company, and then used the supercomputer to attack Google servers. After the information on the Google server was blocked, it used KT Data’s telecommunications network to send update information to mobile phone numbers across the United States. Among the intruded information, there was data to crack Android vulnerabilities, and then directly controlled the mobile phone to perform self-recovery factory settings.
In fact, the method is not advanced at all, but its destructiveness is comparable to that of a nuclear bomb. The damage caused this time will be calculated in trillions.
After analyzing the data of the KT supercomputer, someone said in surprise: "These data residues are very similar to the data of the previous 'Crystal Palace robbery', 'Federal prison riot', and 'Boeing data center intrusion'. It's the same software."
The head of the Security Bureau looked at the report, gritted his teeth and shouted: "It's that 'Jason' again, damn Jason, I don't know if this 'Jason' is a person or an organization, they have this kind of technology that can invade supercomputers , I don’t know how much impact and loss it will cause to the United States. This is terrible. Their existence has already threatened the national security of the United States. I order all security agencies to use all their strength to search for Jason’s whereabouts!!!”
the next day,
U.S. stock markets open,
Google's stock continued to fall crazily, as if it was diving from a high platform without any obstacles, and jumped straight from a 10-meter high platform.
No wonder the falling stock is called diving, it is too vivid.
Google held a formal press conference, and the chairman, executive president and vice presidents all attended.
"This update incident has caused great losses to more than 200 million mobile phone users in the United States. We are concerned about this. What we want to explain is that this incident was not caused by Google's mistakes. Even if the other party does not attack Google servers, it can still use The telecommunications network invaded and damaged the mobile phone, and the real intrusion data this time was sent from the KT data center in Los Angeles. At the same time, the attack on our company's server was initiated by the KT data center's supercomputer It has to be hacked and controlled to have such disastrous consequences."
These words are throwing the pot away, and I want to throw the pot to the KT data center.
"The national security department has taken over this matter and identified it as a terrorist incident that endangers the national security of the United States, and has locked the suspect. We hope to catch the suspect as soon as possible and let him accept legal sanctions."
"Google has not suffered much loss in this incident, and the server has returned to normal, which will never affect the normal operation and use of customers."
Google has brushed aside its responsibilities, but is the question that simple?
impossible.
The reporter asked,
"As the world's top technology company, Google, which claims to have the strongest service data system, has no power to fight back in this hacking operation. If it encounters such an incident again, how will Google respond?"
Google executives: Well~~~!
"May I ask Google, is there any way to recover the loss of customer data, and what responsibility does Google take?"
Google executives: Oh~~~!
"There are many loopholes in the Android system. If hackers use the Google Store to intrude data again, how will Google ensure the safety of customers?"
Google executives: Ah~~~!
"The last time Qualcomm and Google executives negotiated to steal user data call records were exposed by hackers, indicating that there are loopholes in Google's communication system. Hackers can come and go freely and obtain data from Google's communication software. Then Google's products, such as Google Chrome, Whether there are loopholes in the Google Play application store, mailboxes, maps, Google Translate, YouTube, etc., and whether there may be a danger of being hacked and stealing data.”
Google executives: Fake~~~!
When a company has a crisis of trust, when a high-tech company is questioned about its technological capabilities, people's expectations of it will drop dramatically. No company is irreplaceable or invincible, especially this high-tech enterprise. What the company actually sells is not a real product, but a future.
The future is promising, the stock price appreciates,
With no future in sight, his shares would be worthless.
Back then, Yahoo ruled the roost because of the highest technology, but after investors thought he was outdated, the stock price fell again and again, from the highest value of more than 100 billion to the final sale of 3.8 billion, and the valuation dropped by 30 times.
30 times, it only took five or six years, what a horrible thing.
Google was hacked, and the actual loss was very small. It can be said that the company itself did not suffer any real loss, but it lost a lot of intangible assets.
In the next few days, Google's stock price continued to fall, so much that his father could hardly recognize it. Under the amazed gaze of countless people, Google's stock price fell to less than half of its original value, and then gradually calmed down.
It is reported that Google is considering whether to suspend trading.
There are several reasons for the suspension of trading. Simply put, it is a continuous sharp decline. Because of some misunderstanding, the company chooses to temporarily suspend trading, and then come out to clarify and explain, so as to avoid continuous irrational decline due to misunderstanding.
The second is that when encountering major events, such as restructuring, they will choose to suspend trading. The third is that stocks encountered illegal operations and were ordered to suspend trading by the China Securities Regulatory Commission.
In fact, Google also wants to suspend trading, but the loss may be even greater. After all, it is a high-tech company, and it relies on the support of shareholders to have such a high stock price. Now, Google can only support it with difficulty, hoping to overcome this difficulty.
But Jiang Hao believes that even if Google gets through the storm, its image will be greatly affected.