"Convicted" by the people behind the phone

Source: Internet
Author: User
Keywords With the continent
960 security phones in the same state were released in Beijing yesterday (March 25), the world's first dual-system 4G security Cell Phone 960E Conference held in Beijing National Conference Center, the entire event around the "mobile interconnection from the security" theme, with the continent invited guests, media and mobile phone Tatsu people together to explore the new development trend of mobile interconnection, Explore mobile internet age mobile phone hidden trouble behind, and officially released the first security phone--960e, said it will be the mobile internet era to bring the real sense of information security. According to China Internet Network Information Center (CNNIC), the 33rd China Internet Development Statistics report shows that as of December 2013, the size of China's internet users up to 618 million, net penetration rate of 45.8%. Among them, the size of mobile internet users reached 500 million, become an important part of Chinese netizens. With the popularity of smartphones and the development of mobile Internet, mobile Internet is becoming more and more popular, we ushered in the "Smart Mobile phone network Life" of the mobile internet era. However, with the growth of mobile phone users, mobile phone access to the general, mobile phone information security more and more hidden dangers, more and more diverse. The four big mobile phone security hidden trouble in the information society, mobile phone has become the essential electronic products in people's life, work, social, entertainment can be realized and completed through mobile phone. But the security hidden behind the phone, but also to the vast number of users have brought great damage. At present, the handset security hidden trouble mainly manifests in four aspects: the handset system security hidden danger. According to the "2013 China Mobile phone security Status Report", the 2013 Android phone users infected with mobile phone Trojan 97.47 million people, a 88.3% increase in 2012, an average of 267,000 people infected every day. Mobile communications Security risks. Spam messages, harassing phones and "beep" charges are even more rampant today. In the case of spam messages, the total number of 360 mobile phone guards intercepted spam messages in 2013 was 97.1 billion. Mobile phone (hardware) security risks. In addition to the loss or theft caused by direct economic losses, the phone address book, photos and other user privacy data value sometimes even more than the value of the phone itself. In addition, mobile phone privacy security. With the previous mobile phone will only store some phone numbers, text messages are different, now there will be a lot of photos, videos, files and information, and many applications and game software in operation will be unauthorized reading, resulting in the user's mobile privacy security is facing a great threat. Who is the mobile phone hidden "behind the scenes" from the whole look at the security of mobile phones, can be concluded that most of the security threats are through malicious software and viruses to achieve, these malware and viruses are the ultimate in the money, the developers behind the main is to obtain economic benefits. It is understood that some unscrupulous software developers have been malicious software and viruses formed a complete industrial chain, from the software manufacturing, to the final profit income, unscrupulous developers from the entire chain to obtain economic profits. In addition to malware developers, some mobile phone manufacturers are also "behind the scenes," at the CCTV 315 party exposed mobile virus is throughPreset in the mobile phone, the way to achieve user information theft. Convicted "behind the scenes" to protect the safety of mobile phones for mobile phone security and behind the manufacturer, Ming, chairman of the same state, said, "Mobile phone is not the biggest real killer is mobile phone manufacturers." He pointed out that "it is because the handset manufacturers are unwilling to spend the research and development of independent operating system, but only" doctrine "blindly use foreign operating system, the user's mobile phone security disregard, so that users and even the country's information security is very bad. Ming Introduction, with the release of the 960E is 960os+android dual system, of which 960 security operating system is the same continent electronics lasted 9 years of dedicated research and development of the independent operating system, 960OS use C, C + + language to write, and thus fundamentally eliminate the illegal application of the software two times the behavior. 960 system has independent intellectual property rights, can monitor and prevent information from the bottom of the address Book, text messages, files, location, etc. 960 OS and Android dual operating systems, use without restarting the phone, one key to achieve seamless switching between the two systems, while dual system applications and data is completely isolated, even if the Android virus infected, will not affect the security of the 960 OS, This can effectively isolate malware and viruses from the Android system from the operating system level. At the end of the conference, Ming said that the emergence of 960 security phones will lead the mobile phone into the era of innate security, mobile interconnection will also enter an orderly, reliable, secure new era. At the meeting he also Xia Quan with the participants Liu Xingliang and Xun network Mo Yongwei together with the initiative will be March 25 every year as "mobile Security Day", to irresponsible mobile phone manufacturers, fake security software manufacturers, rogue virus software vendors to declare war, calling on the people to promote mobile security awareness, farewell to Gray 315, to meet security 325, Together to safeguard personal information security and national information security, so that 1.3 billion of people into the security of the new mobile internet era. Finally, he said, safeguarding national information security is the core of the same continent, for the vast number of users to bring the best product experience is the direction of the continent, the establishment of a truly safe and benign mobile interconnected environment is the ultimate goal of the same continent. He said, "with the continent 960 have the determination also has the ability to do better, 9 years is only a beginning, we will continue to resolutely take the mobile interconnection security Road, for 9.6 million square kilometers of information security escort!"
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.