Mobile virus invasion of financial management app application audit mechanism needs to be strengthened
Source: Internet
Author: User
KeywordsMobile virus financial application
This reporter Lin Financial fund class products are hot, also make the mobile phone end of a large number of financial finance category app became the hardest hit by the virus sneak attack. According to Tencent Mobile Security laboratory released the day before yesterday, the February mobile phone Security report, financial management harassment, fraud SMS users to report the focus of spam messages, similar to bank criminals, theft of zombie and other payment-type virus to the user to pay security poses no small threat. For the increasingly rampant mobile virus, users in the network to invest in financial management in addition to maintaining good internet habits, but also how long simpleton. The application of financial management to mobile virus infection more than with the CCTV 315 consecutive exposure to a number of mobile phone-related security issues, the majority of users have begun to pay attention to the security of mobile phones. March 19, Tencent Mobile Security Laboratory released the "February 2014 mobile phone Security Report", the system to expose the current users of the virus, spam messages, fraud phones and other issues. The report showed that in February 2014, the number of users infected with mobile phone virus reached 14.3113 million. Among them, malicious debit-type mobile phone virus accounted for a large increase in the financial and online shopping app frequently infected, ROM built-in virus accounted for increased trend; February 2014, the number of spam SMS users reported 34.48 million, the chain fell 28.46%; financial management harassment, Fraudulent text messages have become a new trend for users to report spam messages this month. Most of these viruses secretly send text messages through the background, shielding feedback information, uploading Mobile information and other means, resulting in user tariff consumption and privacy leakage. A large number of such apps also suffer from viral infections, according to reports that include stocks, funds, money management, investment and insurance. Tencent Mobile Security Laboratory detected an Android virus package of 40,462, of which the cost of consumption accounted for more than 53.68%, malicious deduction accounted for 25.45%, malicious deduction of the virus accounted for a relatively large increase in the month before. The bank pickpocket, the bank to kill, A.expense.tgpush three virus to become the Fund finance class app's Terminator. In addition, also has the stock good helper, the stock alarm clock, the stock hunter and so on 42 stock type mobile phone app also is infected by the virus. It is noteworthy that a large number of brand online cosmetics app also encounter virus camouflage and cottage. Poly United States Excellent products, only goods will, Amoy plastic sell and so are unfortunate strokes. These mobile viruses use the popular cosmetics network to buy software to confuse the female group download, through the backstage to send text messages, shielding feedback information, upload Mobile information and other means, resulting in user tariff consumption and privacy leakage. Internet financial security is easy to ignore smart phones, like computers, can leak personal information as long as there is a system leak. Users in the process of using mobile phones, such as mobile phone address book, SMS, Notepad and other personal information may be passed to the developer through the program, resulting in personal information leakage. At present, the diversification of financial instruments so that the public overwhelmed, many fraudsters also seize the public's knowledge of emerging products unfamiliar, the deception extended to these new financial instruments, such as balance treasure, micro-credit account. Take the real case as an example, a netizen in TaobaoCamp an online shop, one day a stranger to buy goods for the name plus his QQ friends, while sending a two-dimensional code let him first sweep, to facilitate future contact, but then there is no further contact. After that, the Netizen just use mobile phone login Net bank transfer, found that the balance becomes less, he hurriedly inquires the transaction record, found his bank card has several online payment records, total paid hundreds of yuan. The money is basically through the online payment platform for mobile phone recharge, buy game currency, so he hurriedly to the public relations authorities to report. Police investigation shows that once the two-dimensional code is scanned, the victim and the phone-bound network silver information, online payment verification code information will be automatically forwarded to the cheater's mobile phone. At the same time, the victim's mobile phone message reception function will be blocked, can only send text messages, can not receive text messages. All the text messages of the victim will be mastered by the cheater. Now people on the mobile phone with app software to choose financial products fast and convenient, move a finger can complete all business associates, the Outlaws is aimed at this will be the Internet financial products as a gold-sucking weapon, so users should pay attention to the Internet financial security when using products. To prevent the mobile phone virus must be multi-party joint efforts at present network financing crime modus operandi mainly has three: one is the PC end, publishes the fictitious financial product customer service telephone in the net, the deception Netizen calls the wrong customer service telephone, then the remote control directs carries on the fraud; the second is on the handset, Through the off-site replacement of mobile phone cards to obtain victims and Alipay binding mobile phone authentication code text messages, to change the payment treasure password for theft; the third is to send the net silver Trojan to the victim's smartphone on the micro-letter and other chat tools, or to the victim on the smartphone to send embedded Trojan files, access to mobile phone messages, account passwords and other information. Of course, the loss of mobile phone is also an important reason for the disclosure of financial account information. In the context of the proliferation of mobile phone virus, the application platform is not to review, laissez-faire attitude is to promote the virus rampant. In addition, the audit mechanism is too lenient, even if the virus found, it is difficult to bring the original person to justice. In order to eliminate the chaotic image of mobile phone virus mode, it is imperative to strengthen supervision. Manage cell phone virus, first of all, we should improve the industry certification standards and relevant legal provisions, the establishment of software application store safety standards and mobile phone application safety standards; Secondly, the application platform audit failed to contribute to the proliferation of Virus Shanzhai software, from the upstream of the industrial chain to kill Mobile virus, application platform to strengthen the cleaning of cottage software Raise the threshold for user registration. In addition, security manufacturers should also strengthen the application of audit efforts, we should not only pay attention to the user experience, but also improve the security of the application. Third, mobile phone users should develop a good habit of use, enhance the awareness of self-protection, at the same time choose to have a formal security certification of the download channels to enhance the ability to protect the security, can really let outlaws no loopholes can
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.