Summary: Last night's CCTV 315 party, revealed nearly 10 kinds of phenomenon of consumer abuse. 2 of them are related to the mobile phone, is: 1, the mobile phone is pre-installed on the suction software, delete also deleted, but also uncovered the Datang artifact such aiding behind the company and
Last night's CCTV 3 15 party, revealed nearly 10 kinds of phenomenon of consumer abuse. Of these, 2 are related to mobile phones, respectively:
1, the mobile phone is pre-installed on the suction software, "Delete also deleted", but also uncovered the Datang artifact such a aiding behind the company and products.
2, the second is a two-dimensional code scam, mobile phone scan two-dimensional code, the forced installation of malicious software, resulting in security privacy of the leak.
These two kinds of consumption pits, seemingly all related to mobile phones, the first curse is to the mobile phone pre-installed companies, the second warning to prevent the deliberate creation of malicious two-dimensional code. But to defend yourself, you may be able to cure the problem, because the deadlock in the Android phone system security issues. According to a 2012-year report by Kaspersky Security Lab, 99% of mobile-end malware is targeted at the Android platform.
It is because the security of the Android phone is not good enough, it gives the company that pre-installed the handset application and the company that maliciously manufactures the two-dimensional code to have the opportunity. So you'll find that the cases that describe both of these problems are all Android phones.
In terms of security, there is a huge gap between Android and iOS, which can be seen from these points:
1. Software source control.
iOS if you do not jailbreak, the software has only one source, is the App Store, Apple's audit mechanism is very strict, it has a clear specification to tell developers what will be rejected, such as the application to try to obtain the user's mobile phone number, then the App Store audit tool will be rejected directly, So Apple first turned it off.
But Android is not the same, not only Google's official application store, there are many Third-party application stores, but also through the Web page directly download installation, storage card import installation, and so on, a variety of channels, the good and bad, malicious programs hidden in the probability is very large.
Poisoned Android Phone
2. The drawbacks of the open system.
iOS is a closed system, and Android is open systems that can be arbitrarily modified by many manufacturers. iOS is like a hardcover repair room, unified style and standards, and Android is a rough room, the use of each suite are decorated by different decoration company, refers to a variety of unexpected tricks and problems exist.
3, the user's own controllability.
Each time the Android phone is installed, it prompts you for what permissions the application needs, such as GPS locations, phone books, and so on, which are related to personal privacy. But this hint is not very meaningful, and does not mean that ordinary users do not have the patience to see or understand these permissions. Even if you know, if you really need this application, what permissions will directly point to the next installation.
Apple iOS privacy settings are more reasonable, when the application needs to read the phone book, photo clips and other data, will ask the user to judge.
4, sales channels and activation control.
Sales of the iphone are mainly licensed and parallel to the channel, no matter which channel, if the new machine, the product is not "activated" as important as the hymen, because the product is activated is not a new machine, on the official Apple website is easy to find, at the same time, the activation is the iphone warranty certificate.
If not activated, the dealer will not be able to give the iphone to pre-installed a variety of applications. The importance of activation blocked the advent of iphone pre-installed apps, and Apple was extremely strict with pre-installed apps, and none of the carriers working on the iphone would be used by prefabricated operators.
In the Android phone market, a completely different phenomenon, each Android phone is built into several or even dozens of of pre-installed applications. On to Samsung, Lenovo, down to the unknown cottage small factories are so. Android phones, while also having an active concept, are almost ignored.
In addition to the Android system's congenital security flaws, there are 2 reasons for the first two problems:
1 is driven by the interests of Internet companies, application pre-installed in a few years ago has been a complete industrial chain, whether it is a network game company or portal site, or Baidu such a search company or Tencent, such as instant messaging products companies, need to apply distribution, occupy the user's mobile phone, and willing to spend money.
2Android mobile phone base is large, especially the scale of low-cost mobile phones, this kind of consumers on the smart phone awareness, security awareness is poor, many will not buy brand Android phone, it is easy to be prefabricated malicious programs in the phone.
Since a lot of original function machine users began to use Low-cost Android phones, to the malware program, from this point of view, the Android phone is not as safe as before the function of mobile phones.
How to solve the Bureau
How to solve the Android phone Security Bureau, it is impossible to cut off the needs of the tour stakeholders, so that Android users can use the iphone is not realistic. Next should be like PC, security software and malicious software game. A malicious program appears, there will be security software blocking. From this point of view, CCTV 3 15 exposure of these mobile phone security issues, is actually to the mobile phone security company a positive.
This is the top 10 of the highest scores of Android platform security software for the famous German security software rating agency, AV test testing, which can be selected for installation:
On the other hand, it should be from Google in the top-tier product logic design, the Android system to enhance security. The first is to control the safety of the manufacturers. Second, to the user with the direct effective risk control logic, specifically to see the next version of Android 5.0.