By Jay Wennington

3200Ëü·ïʬ¤ÎTwitter¥¢¥«¥¦¥ó¥È¾ðÊó¤¬ÇäÇ㤵¤ì¤Æ¤¤¤¿¤ê¡¢Gmail¡¦Hotmail¡¦Yahoo!¤Ê¤É¤«¤é2²¯7200Ëü·ï¤Î¥á¡¼¥ë¥¢¥É¥ì¥¹¤È¥Ñ¥¹¥ï¡¼¥É¤¬Î®½Ð¤·¤¿¤ê¡¢¥í¥·¥¢ºÇÂç¤ÎSNS¤«¤é1²¯·ïʬ¤Î¥Ñ¥¹¥ï¡¼¥É¤¬Î®½Ð¤·¤¿¤ê¤È¡¢¿È¶á¤ÊSNS¤ä¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¥µ¡¼¥Ó¥¹¤ÇÂ絬ÌϤʾðÊóϳ±Ì¤¬µ¯¤³¤ë¤³¤È¤Ï¤½¤ì¤Û¤ÉÄÁ¤·¤¤¤³¤È¤Ç¤Ï¤¢¤ê¤Þ¤»¤ó¡£¤½¤ó¤Ê¥Ï¥Ã¥­¥ó¥°Èï³²¤«¤é¿È¤ò¼é¤ë¤¿¤á¤ÎÊýË¡¤òGoogle¤¬ÅÁ¼ø¤·¤Æ¤¯¤ì¤Æ¤¤¤Þ¤¹¡£

Google Online Security Blog: New research: Understanding the root cause of account takeover

https://security.googleblog.com/2017/11/new-research-understanding-root-cause.html

How To Prevent Your Email Account Being Hacked? Google Study Explains

http://www.ibtimes.com/how-prevent-your-email-account-being-hacked-google-study-explains-2613509

2016ǯ¤Ë¹Ô¤ï¤ì¤¿¥¢¥á¥ê¥«ÂçÅýÎÎÁªµó¤Ë¤ª¤¤¤Æ¡¢Ì±¼çÅÞ¸õÊä¤Î¥Ò¥é¥ê¡¼¡¦¥¯¥ê¥ó¥È¥ó»á¦¤Î¿Ø±Ä¤ÇÁªµóÂкö°Ñ°÷Ťò̳¤á¤¿¤Î¤¬¥¸¥ç¥ó¡¦¥Ý¥Ç¥¹¥¿»á¤Ç¤¹¡£¤½¤ó¤Ê¥Ý¥Ç¥¹¥¿°Ñ°÷Ĺ¤Î¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¤¬¥Ï¥Ã¥­¥ó¥°¤µ¤ì¡¢¥¯¥ê¥ó¥È¥ó¿Ø±Ä¤Î¥á¡¼¥ë¿ôËüÄ̤¬WikiLeaks¤Ç¸ø³«¤µ¤ì¤Þ¤·¤¿¡£

¥Ý¥Ç¥¹¥¿°Ñ°÷Ĺ¤Î¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¤ò¥Ï¥Ã¥­¥ó¥°¤·¤¿ÊýË¡¤Ï¡¢Èó¾ï¤Ëñ½ã¤ÊÊýË¡¤Ç¤¢¤Ã¤¿¤½¤¦¤Ç¤¹¡£¥Ï¥Ã¥«¡¼¤Ï¥Ý¥Ç¥¹¥¿°Ñ°÷Ĺ¤Ë¥¢¥«¥¦¥ó¥È¤¬¥Ï¥Ã¥­¥ó¥°¤µ¤ì¤¿¤ÈÄÌÃΤòÁ÷¤ê¡¢Google¤Î¥í¥°¥¤¥ó²èÌ̤˵¶Áõ¤·¤¿²èÌ̾å¤Ç¥Ñ¥¹¥ï¡¼¥É¤ÎÊѹ¹ºî¶È¤ò¼Â¹Ô¤µ¤»¤ë¤³¤È¤Ç¡¢¥Ý¥Ç¥¹¥¿°Ñ°÷Ĺ¤Î¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¤Î¥í¥°¥¤¥ó¾ðÊó¤òÅð¤ß½Ð¤¹¤³¤È¤ËÀ®¸ù¤·¤Æ¤¤¤Þ¤¹¡£¤½¤Î¸å¡¢¥Ï¥Ã¥«¡¼¤Ï¥Ý¥Ç¥¹¥¿°Ñ°÷Ĺ¤Î¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¤«¤éÆÀ¤¿¾ðÊó¤òWikiLeaks¾å¤Ç¸ø³«¤·¡¢2016ǯ¤Î¥¢¥á¥ê¥«ÂçÅýÎÎÁªµó¤Î·ë²Ì¤Ë¾¯¤Ê¤«¤é¤º±Æ¶Á¤òÍ¿¤¨¤Þ¤·¤¿¡£



¤³¤¦¤¤¤Ã¤¿ÊýË¡¤Ï¡¢Google¤Î̵ÎÁ¥á¡¼¥ë¥µ¡¼¥Ó¥¹¤Ç¤¢¤ëGmail¤Î¥¢¥«¥¦¥ó¥È¤ò¥Ï¥Ã¥­¥ó¥°¤¹¤ë¼êË¡¤Î¤Ò¤È¤Ä¤Ë²á¤®¤Þ¤»¤ó¡£Google¤ÎÄ´ºº¤Ë¤è¤ë¤È¡¢¥æ¡¼¥¶¡¼¤Î15¡ó°Ê¾å¤¬2016ǯ3·î¤«¤é2017ǯ3·î¤Þ¤Ç¤ÎÌó1ǯ´Ö¤Ç¡¢¥½¡¼¥·¥ã¥ë¥á¥Ç¥£¥¢¤Þ¤¿¤Ï¥á¡¼¥ë¥¢¥«¥¦¥ó¥È¤Î¾è¤Ã¼è¤ê¤ò·Ð¸³¤·¤¿¤ÈÊó¹ð¤·¤Æ¤ª¤ê¡¢Æ±´ü´Ö¤Ë78Ëü8000·ïʬ¤Î¥¢¥«¥¦¥ó¥È¾ðÊ󤬥ϥå«¡¼¤Ë¤è¤êÅð¤Þ¤ì¤Æ¤¤¤ë¤³¤È¤âÌÀ¤é¤«¤Ë¤Ê¤Ã¤Æ¤¤¤Þ¤¹¡£

Google¤Ï¥«¥ê¥Õ¥©¥ë¥Ë¥¢Âç³Ø¥Ð¡¼¥¯¥ì¡¼¹»¤È¶¨ÎϤ·¤Æ¡¢¥¢¥«¥¦¥ó¥È¤Î¾è¤Ã¼è¤ê¤¬¤É¤Î¤è¤¦¤Ëµ¯¤³¤ë¤«¤òÄÉÀ×Ä´ºº¤·¤Æ¤¤¤Þ¤¹¡£Ä´ºº¤Ç¤Ï2016ǯ3·î¤«¤é2017ǯ3·î¤Þ¤Ç¤Î1ǯ´Ö¤Ç¤¤¤¯¤Ä¤«¤Î¥Ö¥é¥Ã¥¯¥Þ¡¼¥±¥Ã¥È¤òʬÀϤ¹¤ë¤³¤È¤Ç¡¢¥¢¥«¥¦¥ó¥È¾è¤Ã¼è¤êÈȤ¬Åð¤ó¤À¥Ñ¥¹¥ï¡¼¥É¤ä¤½¤Î¾¤Î¥Ç¡¼¥¿¤ò¤É¤Î¤è¤¦¤Ë´ÉÍý¤·¤Æ¤¤¤ë¤Î¤«¤òÄ´¤Ù¤Æ¤¤¤Þ¤¹¡£Ä´ºº¤Ë·È¤ï¤Ã¤¿¸¦µæ¼Ô¤Ï¡¢¥Æ¥­¥µ¥¹½£¤Î¥À¥é¥¹¤Ç³«ºÅ¤µ¤ì¤¿Computer and Communications Security Conference¤ÎÃæ¤Ç¸¦µæ·ë²Ì¤Î¾ÜºÙ¤ò¸øɽ¤·¤Æ¤¤¤Þ¤¹¡£



By Blake Connally

Ä´ºº¤Ë¤è¤ë¤È¡¢Â¿¤¯¤Î¿Í¤¬Ê£¿ô¤Î¥¢¥«¥¦¥ó¥È¤ÇƱ¤¸¥Ñ¥¹¥ï¡¼¥É¤òÍøÍѤ·¤Æ¤¤¤ë¤¿¤á¡¢¥Ï¥Ã¥«¡¼¤¬²¿¤«¤·¤é¤Î¥¢¥«¥¦¥ó¥È¤Î¥Ñ¥¹¥ï¡¼¥É¤òÆþ¼ê¤¹¤ë¤³¤È¤ËÀ®¸ù¤¹¤ë¤È¡¢Â¾¥µ¡¼¥Ó¥¹¤Î¥¢¥«¥¦¥ó¥È¤â¥Ï¥Ã¥­¥ó¥°²Äǽ¤Ë¤Ê¤Ã¤Æ¤·¤Þ¤¦¥±¡¼¥¹¤¬Â¿¤¤¤È¤Î¤³¤È¡£¤Þ¤¿¡¢¥Ï¥Ã¥«¡¼¤Ï¥­¡¼¥í¥¬¡¼¤ä¥Õ¥£¥Ã¥·¥ó¥°¥Ä¡¼¥ë¤Ê¤É¤ÎÀöÎý¤µ¤ì¤¿µ»½Ñ¤ä¥½¥Õ¥È¥¦¥§¥¢¤òÍѤ¤¤ë¾ì¹ç¤¬Â¿¤¯¡¢¥¿¡¼¥²¥Ã¥È¤È¤Ê¤Ã¤¿¥æ¡¼¥¶¡¼¤ÎIP¥¢¥É¥ì¥¹¤ò¼ý½¸¤·¤Æ¤¤¤ë¤³¤È¤âÌÀ¤é¤«¤Ë¤Ê¤Ã¤Æ¤¤¤Þ¤¹¡£¤³¤ì¤é¤Î¾ðÊó¤ò´ð¤Ë¡¢¥Ï¥Ã¥«¡¼¤Ï¥æ¡¼¥¶¡¼¥Ñ¥¹¥ï¡¼¥É¤Ê¤É¤Î¤è¤ê½ÅÍפʾðÊó¤òÅð¤ß½Ð¤¹¤½¤¦¤Ç¤¹¡£

Ä´ºº·ë²Ì¤ò¼õ¤±¤Æ¡¢Google¤ÏGmail¥¢¥«¥¦¥ó¥È¤ò¤è¤ê°ÂÁ´¤Ë¤¹¤ë¤È¼çÄ¥¤·¤Æ¤¤¤Þ¤¹¡£¤Þ¤¿¡¢À¯¼£²È¤äÇÐÍ¥¤Ê¤É¤Î¡Ö¥Ï¥Ã¥­¥ó¥°¤Î¥¿¡¼¥²¥Ã¥È¤Ë¤Ê¤ê¤ä¤¹¤¤¿Íʪ¡×¤ËÂФ·¤Æ¤Ï¡¢¤è¤êÀè¿ÊŪ¤Ê¥»¥­¥å¥ê¥Æ¥£¤òÄ󶡤·¤Æ¤¤¤¯¤³¤È¤âȯɽ¤·¤Æ¤¤¤Þ¤¹¡£¤³¤ì¤Ë²Ã¤¨¤Æ¡¢Google¤Ï¥¢¥«¥¦¥ó¥È¤ò°ÂÁ´¤ËÊݤĤ¿¤á¤ÎÊýË¡¤È¤·¤Æ¡¢¡Ö¥Ñ¥¹¥ï¡¼¥É¥¸¥§¥Í¥ì¡¼¥¿¡¼¤ò»ÈÍѤ·¤Æ°ÂÁ´¤Ê¥Ñ¥¹¥ï¡¼¥É¤òÀßÄꤹ¤ë¤³¤È¡×¤È¡Ö2Ãʳ¬Ç§¾Ú¥×¥í¥»¥¹¤òÍ­¸ú¤Ë¤¹¤ë¤³¤È¡×¤òµó¤²¤Æ¤¤¤Þ¤¹¡£Google¤Ë¤è¤ë¤È¡¢¤³¤Î2¤Ä¤ò¼Â»Ü¤¹¤ë¤À¤±¤ÇGmail¥¢¥«¥¦¥ó¥È¤Ï¤Û¤Ü¥Ï¥Ã¥­¥ó¥°ÉÔ²Äǽ¤Ê¾õÂ֤ˤʤ뤽¤¦¤Ç¤¹¡£

Google¥¢¥«¥¦¥ó¥È¤Î2Ãʳ¬Ç§¾Ú¥×¥í¥»¥¹¤Ï°Ê²¼¤Î¥Ú¡¼¥¸¤«¤é»ÈÍѤ¹¤ë¤³¤È¤¬¤Ç¤­¤Þ¤¹

Google 2 Ãʳ¬Ç§¾Ú¥×¥í¥»¥¹



¤Ê¤ª¡¢¤½¤Î¾¤Î¥æ¡¼¥¶¡¼Â¦¤Ç¼è¤ì¤ëÂкö¤È¤·¤Æ¤Ï¡¢¡ÖÀøºßŪ¤Ë´í¸±¤ò¤Ï¤é¤à¤è¤¦¤Ê¥µ¥¤¥È¤òˬÌ䤷¤Ê¤¤¡×¤ä¡Ö¥á¡¼¥ë¤Ë´Þ¤Þ¤ì¤¿²ø¤·¤¤¥ê¥ó¥¯¤ò¥¯¥ê¥Ã¥¯¤·¤Ê¤¤¤³¤È¡×¤¬µó¤²¤é¤ì¤Æ¤¤¤Þ¤¹¡£