GetMsg

{"errCode":"0","errMessage":"\u8bf7\u6c42\u6210\u529f\u001a\u001a\u001a\u001a","data":[{"id":"13994","title":"Passwords still dominant authentication method, top cause of data brea","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2017\/10\/09102947\/password.jpg","description":"Passwords still dominant authentication method, top cause of data brea","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13994","createTime":1583744873000},{"id":"13890","title":"Employees aware of privacy risks, but unsure of how they affect the wo","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2016\/05\/09112845\/person.jpg","description":"Employees aware of privacy risks, but unsure of how they affect the wo","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13890","createTime":1582449107000},{"id":"13985","title":"Seven cybersecurity and privacy forecasts for 2020","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2018\/07\/09100605\/healthcare.jpg","description":"Seven cybersecurity and privacy forecasts for 2020","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13985","createTime":1582182646000},{"id":"13990","title":"500 Google Chrome extensions found to be spreading malware","icon":"https:\/\/www.hackread.com\/wp-content\/uploads\/2020\/02\/500-google-chrome-extensions-found-to-be-spreading-malware-2.jpg","description":"500 Google Chrome extensions found to be spreading malware","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13990","createTime":1581835594000},{"id":"13804","title":"Hackers exploiting vulnerability in smart doors to launch DDoS attacks","icon":"https:\/\/www.hackread.com\/wp-content\/uploads\/2020\/02\/hackers-exploiting-vulnerability-in-smart-doors-to-launch-ddos-attack-2.jpg","description":"Hackers exploiting vulnerability in smart doors to launch DDoS attacks","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13804","createTime":1581494190000},{"id":"13861","title":"Fixed Sudo flaw in macOS gave root-command privileges to all users","icon":"https:\/\/photos5.appleinsider.com\/gallery\/34396-61992-terminal-head-xl.jpg","description":"Fixed Sudo flaw in macOS gave root-command privileges to all users","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13861","createTime":1581493544000},{"id":"13798","title":"Touch panels deployed in critical infrastructure vulnerable to remote ","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2020\/02\/05110524\/automationdirect_c-more_touch_panels.jpg","description":"Touch panels deployed in critical infrastructure vulnerable to remote ","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13798","createTime":1581493437000},{"id":"13810","title":"Philips patched a longstanding Hue bulb security flaw","icon":"https:\/\/o.aolcdn.com\/images\/dims?thumbnail=1200%2C630&quality=80&image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D5616%252C3507%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C999%26image_uri%3Dhttps%253A%252F%252Fs.yimg.com%252Fos%252Fcreatr-uploaded-images%252F2020-02%252F826b74f0-482d-11ea-bf05-7b8ad8c4fa3f%26client%3Da1acac3e1b3290917d92%26signature%3D813eda833035ddd79293d10b7334d8d986f255b5&client=amp-blogside-v2&signature=028046f8ed3f896da4aca561965d9a3db0000c97","description":"Philips patched a longstanding Hue bulb security flaw","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13810","createTime":1581161766000},{"id":"13814","title":"Apple pushed fix for Mail app encryption bug with latest macOS Catalin","icon":"https:\/\/i0.wp.com\/9to5mac.com\/wp-content\/uploads\/sites\/6\/2019\/06\/macOS-Catalina-hero.jpg","description":"Apple pushed fix for Mail app encryption bug with latest macOS Catalin","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13814","createTime":1581156027000},{"id":"13797","title":"CDPwn vulnerabilities open millions of Cisco enterprise devices to att","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2020\/02\/05223021\/cdpwn-abstract.jpg","description":"CDPwn vulnerabilities open millions of Cisco enterprise devices to att","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13797","createTime":1581153055000},{"id":"13868","title":"Google Chrome Is Cracking Down on Most Annoying Video Ads","icon":"https:\/\/icdn2.digitaltrends.com\/image\/digitaltrends\/google-chrome-url-1200x630-c-ar1.91.jpg","description":"Google Chrome Is Cracking Down on Most Annoying Video Ads","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13868","createTime":1581151573000},{"id":"13812","title":"Twitter releases bug fix for missing polls on iOS, tweaks redesigned i","icon":"https:\/\/9to5mac.com\/wp-content\/uploads\/sites\/6\/2020\/02\/ipad-twitter-app.jpg?resize=1024,512","description":"Twitter releases bug fix for missing polls on iOS, tweaks redesigned i","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13812","createTime":1581151398000},{"id":"13807","title":"WhatsApp desktop security flaw gave intruders remote access to files","icon":"https:\/\/o.aolcdn.com\/images\/dims?thumbnail=1200%2C630&quality=80&image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D4610%252C3072%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C1066%26image_uri%3Dhttps%253A%252F%252Fs.yimg.com%252Fos%252Fcreatr-images%252F2020-02%252Fa0596930-484c-11ea-bef7-8fb36ea5dac6%26client%3Da1acac3e1b3290917d92%26signature%3D4d4c41735c3d00646e6ee0252e542ff77fb43db0&client=amp-blogside-v2&signature=3295bd3b1eeb2ac3ec243f5d269d4cdb696a34f0","description":"WhatsApp desktop security flaw gave intruders remote access to files","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13807","createTime":1580989678000},{"id":"13726","title":"Enterprise laptops vulnerable to critical direct memory access attack","icon":"https:\/\/www.hackread.com\/wp-content\/uploads\/2020\/01\/enterprise-laptops-vulnerable-direct-memory-access-dma-attack-3.jpg","description":"Enterprise laptops vulnerable to critical direct memory access attack","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13726","createTime":1580954149000},{"id":"13723","title":"Researchers develop new optical stealth encryption technology","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2020\/01\/29153125\/encryption-1.jpg","description":"Researchers develop new optical stealth encryption technology","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13723","createTime":1580910876000},{"id":"13730","title":"Hacker pleads guilty to stealing Nintendo secrets","icon":"https:\/\/o.aolcdn.com\/images\/dims?thumbnail=1200%2C630&quality=80&image_uri=https%3A%2F%2Fo.aolcdn.com%2Fimages%2Fdims%3Fcrop%3D1600%252C871%252C0%252C0%26quality%3D85%26format%3Djpg%26resize%3D1600%252C871%26image_uri%3Dhttps%253A%252F%252Fs.yimg.com%252Fos%252Fcreatr-uploaded-images%252F2020-02%252F0c650070-451f-11ea-b77b-d179d3c1a076%26client%3Da1acac3e1b3290917d92%26signature%3De1c7bbe2c757c07f770c3f851bb3ad8ee9e80fae&client=amp-blogside-v2&signature=bd842d61d0c35e72684048ab72602966d674951b","description":"Hacker pleads guilty to stealing Nintendo secrets","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13730","createTime":1580859809000},{"id":"13783","title":"Microsoft Offers up to $20,000 to Identify Vulnerabilities in Xbox Liv","icon":"https:\/\/icdn2.digitaltrends.com\/image\/digitaltrends\/xbox-one-s-all-digital-edition-review-4-1200x630-c-ar1.91.jpg","description":"Microsoft Offers up to $20,000 to Identify Vulnerabilities in Xbox Liv","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13783","createTime":1580801613000},{"id":"13698","title":"Avast antivirus harvested user data, then sold to Google, Microsoft","icon":"https:\/\/photos5.appleinsider.com\/gallery\/34298-61655-avast-on-mac-head-xl.jpg","description":"Avast antivirus harvested user data, then sold to Google, Microsoft","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13698","createTime":1580391774000},{"id":"13665","title":"Say hello to the new Fantastical: one robust calendar for iPhone, iPad","icon":"https:\/\/9to5mac.com\/wp-content\/uploads\/sites\/6\/2020\/01\/The-new-Fantastical.png","description":"Say hello to the new Fantastical: one robust calendar for iPhone, iPad","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13665","createTime":1580391487000},{"id":"13523","title":"Over half of organizations were successfully phished in 2019","icon":"https:\/\/img.helpnetsecurity.com\/wp-content\/uploads\/2019\/05\/09094418\/email-danger.jpg","description":"Over half of organizations were successfully phished in 2019","content":"http:\/\/www.trustmobi.com\/security\/en\/view.php?id=13523","createTime":1580222737000}]}