Five traffic traps: who stole your cell phone traffic

Source: Internet
Author: User
Keywords Flow
Recently, security Research and vulnerability report Platform Cloud website issued security warning, pointed out that the mobile phone software has been tampered with, Luantan advertising backstage traffic is becoming more and more serious, and about the mobile phone is likely to steal the flow of information in many smartphone users caused a large response, there are more than 30% The Netizen feedback once appeared the handset steals the traffic the phenomenon. As for the reasons for the flow of theft, some have a certain basis for mobile phone knowledge of the respondents said that the flow monitoring software will be tested, found that many of the software stolen traffic is downloaded in the third party software market, they were hackers two times packaged into malicious code. In fact, this is just the tip of the iceberg of traffic theft, which is a malicious part. In addition, there are some inadvertently inserted Liu traffic theft. Expert tips, want to completely eliminate traffic theft, unless the data function is turned off. Otherwise, give up your smartphone. Access to the Internet can not avoid the flow of stolen mobile phone traffic, according to the usual situation, mostly refers to consumers do not know the case, mobile phone because of mobile internet generated unknown flow or even costs. In today's information society, smartphones are almost the necessities of people's lives, according to Cnnic recently released the 32nd China Internet Development Statistics report shows that in the first half of 2013, mobile phone became the first source of new netizens, accounting for 70% of the new netizens. Affected by its impact, as the Internet's first big application-Instant messaging (micro-letter products) in the mobile phone side also has a decent performance, its internet users up to 397 million, the use rate of 85.7%. As instant messaging applications evolve from a single chat tool to an integrated platform, their market potential is also stimulated. Unlike SMS, instant messaging software sends information through traffic. In other words, there is no cell phone signal, as long as there is WiFi network, can also send information. Nowadays, more and more people begin to use micro-letters instead of text messages. As a result, mobile internet access has become an essential living accessories. If in the age of the function machine, the Internet of mobile phone will surf the net. Because it is a single task to run, the basic will not appear the problem of running traffic. The age of the intelligent machine is not, there are mobile phone experts said, want to eliminate the flow of stolen traffic, unless turned off the Internet function. However, the smartphone will not be useful, it is better to throw away, is not realistic. However, even the flow of stolen traffic, there are intentional and unintentional two kinds. The expert said that most of the flow of traffic is unintentional, telecom operators will not and application developers on the flow of profits to be divided into, so even if it is intended to steal traffic, the purpose is to pop-up more ads or to achieve the purchase of fees and other items, rejection. Traffic steals the five traps. Mr. Chen's mobile phone in the new town not only ran out of all the traffic in the package overnight, but also owed more than $700. According to Mr. Chen, he forgot to turn off data traffic before he went to bed, and when the flow of the package was over, it did receive a message from the operator, but he was sleeping and seeing the message was the next morning. In this respect, Mr. Chen is very helpless and very puzzled: how my mobile phone traffic is stolen? According to the introduction, many reasons can lead to traffic theftRun, but the most common are 5 kinds. The implementation of the push function must be based on a network connection to detect software updates and message reminders. Therefore, even if you do not actively access the Internet, in the case of network connection will work in the background, will inevitably generate a certain amount of traffic. Once the user accidentally virus with malicious software downloaded to the mobile phone, the Trojan will open the root authority for the background networking, download the software for malicious promotion and synchronous consumption of user traffic, resulting in traffic theft. When the WiFi signal is unstable and weak, the smartphone has the function of automatically searching and switching to the 2G/3G network to continue to provide the Internet service. If the user does not notice, continue to use the service that needs to consume the flow, can produce high traffic fee. Now many mobile phones have a cloud synchronization function, can help users to contact people or text messages or even photos and other information automatically backed up to the cloud, but this will cost a lot of traffic, especially when the picture is synchronized upload function, the flow of consumption will be more severe. A lot of running in the user's mobile phone game software, function is not as simple as it seems, in addition to the obvious on the game services provided to users, often also in the secretly collection of user models, geographical location and other personal information, at this time, traffic so quietly fled.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.