Qihoo 360 is involved in the Enterprise mobile security field
Source: Internet
Author: User
KeywordsWorking
After a niche in the personal security market, Qihoo 360 tried to get involved in the enterprise-level security market. At the 360 Internet security conference yesterday, Qihoo 360 founder Zhou Hongyi said it was already developing mobile security products specifically aimed at corporate BYOD (employees with mobile devices), which will be released in the near future. Zhou Hongyi said: "Before many foreign internet giants to give employees the BlackBerry phone as a very glorious welfare, but as employees use mobile phones, tablet computers for Office, BYOD (staff with computing equipment) problem has become an enterprise information security a very headache problem, which will be a big problem of future security. Wu Hequan,, academician of the Chinese Academy of Engineering, yesterday revealed a group of data: 77% of U.S. employees use social networks at work, 33% of US companies are infected by some viruses through social networks, 2/3 work on social networks, and 1/3 of companies have been infected through social networks. Although the mobile operating system, like Andriod itself, has taken into account a variety of security factors, using a signature system to force users to confirm identity, but its certificate is not required by Google, hackers can still not issue Google proof. According to 360 Internet Security Center reports, the first half of the interception of new mobile phone trojans, malware and malicious advertising plug-ins 450,000, on average, add 2,500 daily balance of malicious software. 360 company chief scientist, Xiaoxian, a professor at North Lerona State University, said that the mainstream handset makers at home and abroad will almost always modify the original Android system, and malware can use these custom system vulnerabilities to gain system privileges, install applications silently in the background, and send phishing messages, 64% to 85% of the analysis's mobile phone Android system vulnerabilities are caused by custom systems.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.