Analysis and prevention of mobile virus

Source: Internet
Author: User

Mobile virus is a branch of the virus, although its existence is only a few years, but in the future will likely be with the promotion of 3G and a large number of emerging.

Virus type: Mobile virus

Virus purpose: Destroy the mobile phone system, send messages, etc.

The originator of the cell phone virus

I've been using my cell phone for a long time, probably in the late 90. At that time there is no mobile phone virus this dongdong existence. Why am I so sure, because I have a deep memory of the earliest mobile virus. It was around June 2000, when the SMS bomb virus appeared in Spain, sending abusive text messages to many mobile phone users.

At that time, I was not equipped with the computer for how long, is busy in computer knowledge, "charging", heard this news, feeling that the creator of the virus is extremely boring, do some harm to the people do not selfish things. However, the SMS bomb virus is not a real mobile phone virus, at best is a rogue, a preference for mobile phone rogue.

Virus Hazard: In the mobile phone virus, light is altered, some programs can not run, heavy mobile phone data is deleted, in the case of the machine owners do not know to the phone book to send all users with a virus message, causing the system to slow down, or even panic. It can be said that mobile phone virus than PC platform virus is also a bit more hateful, in the process of its transmission will send messages to let you spend.

Bluetooth helps spread the virus

On the computer, the virus is not unusual, but the phone hit the virus is really very strange. That year was 2004, I changed the mobile phone with Bluetooth (Symbian operating system), flattered with its travel, one day I found that the phone is particularly slow.

Later I learned that I was in the Bluetooth bully virus, a worm spread through Bluetooth, it will automatically find new mobile phone or other devices in Bluetooth, once found prey, will send virus files, so my phone is not slow to blame. The virus is the first real mobile virus.

Virus theory: We can think of mobile phones as a pocket computer, so it is easy to understand why the virus can also invade the phone. Because some of the phone's programs have write capabilities, the virus can use this function to write to the phone, and then execute. It should be noted that the different mobile operating systems are not very open (such as interface), mobile phone virus is very difficult to take all the mobile phone operating system, often only a mobile operating system, such as Symbian.

Mobile phone virus transmission mainly three kinds, the first is through the download into the mobile phone, the second is through malicious text messages into the mobile phone, such as mobile hacker virus, and the third is through Bluetooth access to mobile phones, such as Bluetooth bully virus. The second and third mode of transmission is the use of mobile phone viruses more.

Skull-head grabs the phone.

Since then, I have turned off the Bluetooth function, anyway, usually do not use, the real time to open it. Increased security vigilance, no longer by the Bluetooth bully virus harassment. However, it was later planted again. That day I found that the program icon on the phone has become a pirate's skull-head logo, then one Leng, is the mobile phone by Pirates of the Caribbean fell?

In addition to the phone, other functions, such as text messages, MMS, etc. can not be used. Please come to the master, only to fix the virus-mobile phone terrorists, and from the master's mouth that there are communications recorded theft, MMS virus, such as mobile virus. I hate these cell phone viruses.

Small part of the eye: mobile virus relative to the computer virus, or very few, and the development of mobile virus is still relatively "mysterious", many hackers did not pay attention to it. But with the advent of 3G, hackers will be more concerned about this area, the corresponding mobile virus may appear in large numbers in the future. At present, foreign countries have been able to directly steal the balance of the virus, mobile phone virus will eventually go to the hacker's own profit-making path.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.