960 Dual-system mobile phone tour mobile interconnected world

Source: Internet
Author: User
Keywords Mobile
Talking about the information security in the mobile internet era, the most is from the attention of smartphone devices, the data show that 2013 China's smartphone output amounted to 300 million, with a total of 500 million, of which Android smartphones accounted for 70%. The results of the Android system opened up to the 960 security-phone chairman, Ming, calling it "a very dirty biosphere"; Dirty "and can not accurately express the current mobile phone intelligent market status, but the following data may illustrate some of the problems: 1, malware in the first half of the 360 Internet Security Center intercepted the new malware, in order to steal privacy as the main purpose of malware accounted for up to 24%, while the privacy of the theft of malicious software up to 90% Above。 2, Mobile virus "the first half of 2013 China Mobile phone security status report" shows that in the first half of 2013, the total number of mobile phone virus infection more than 480 million people, close to 2012 annual infection. 3, harassing the telephone all year 2013, the number of harassment phone numbers marked by netizens as high as 422 million, more than 100 million of the total population of the United States. An average of about 2.3 million harassment phone numbers per day harass national mobile phone users. 4, Spam SMS 2013, 360 mobile phone guards all the year to intercept all kinds of mobile phone spam SMS 97.1 billion, the average daily interception of 266 million spam messages. Mobile Interconnection: Enjoy the convenience, the sacrifice of security!3g in the ascendant, 4G, coupled with intensive WiFi coverage for easy access, the continuous high-speed reinforcement of the network, the smartphone provides more and more applications: anytime, anywhere to send micro-BO & micro-letters, look up information, take photos, Smartphones have become more intimate than lovers ' accompanying. Recently, mobile payment has brought a revolution in the way of consumption, shopping, taxis, AA receivables ... The consumption of all aspects of basic necessities can be all done. It brings unlimited convenience at the same time, how to prevent leaks, security has become a smartphone era of attention to the hot spots. Most smartphone users will be puzzled: my mobile phone in their own hands, how can information leak it? And my phone has a lot of personal information, including communication rates, photos, telecommunications, mobile phone payment software and passwords, and so on, these will be stolen? The answer is yes. Enjoy the convenience at the same time, we are also at the expense of security! Which channels will cause mobile phone security to be compromised? At present, through the mobile phone trojan and malicious software directly to steal user information is the user's mobile phone leaks the most important channels, but also outlaws to obtain personal information on mobile phone is the main way. According to statistics, mobile phone trojan and malware threat to the largest mobile phone, privacy theft Trojan will listen and upload call recordings, and some seemingly ordinary software may read private text messages, spying, monitoring the behavior of users, and the relevant information sold to the relevant businesses. At present, the opening of the mobile software platform makes the software developers more and more, because the software on-line audit is not very strict, many developers for the authority does not value, will inadvertently or intentionally add some "function." Even many of the security app's permission settings will include reading private communication rates, texting, etc.This is a typical abuse of authority behavior, for users is a security risk. Convenience and security, can you have it all at once? In addition to the use of mobile network equipment, the code of conduct, most users rely more on the security of the Butler class software. But because the mobile phone security Butler itself is only an app program, the ability to guard is limited, and the security butler itself brings the user a complicated, troubled and even vulnerable threat. In the future, is there a better solution for both convenience and safety? The better news is, March 25, with the state launched the first dual-system security mobile phones, from the bottom of the operating system to provide security, with the island's exclusive initiative of the dual system switching program, mobile phone factory with a safety immune system 960OS and security management software, and compatible with all Android application experience, so that users Entertainment two not mistaken, also make 960 OS more adapt to the market, close to users.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.