Mobile Virus _ Internet Surfing

Source: Internet
Author: User

1, the realization of the principle of mobile virus

Cell phone virus is actually like computer viruses, it can be carried out through the computer to mobile phone hair messages. Strictly speaking, the mobile virus should be a computer virus, which can only be spread on the computer network and can not be transmitted through the mobile phone, so the so-called mobile virus is actually a computer virus program to start a telecommunications company's services, such as e-mail to mobile phone message function, and it sent to the phone is a document, There is no destructive power at all. Of course, some mobile phone virus destructive or relatively large, once the attack may be more powerful than personal computer viruses, its spread speed, and even more than "I love you" virus faster. The virus that attacks the Internet phone automatically starts the phone recording function and transmits the recordings around, and the virus automatically makes calls, deletes the files on the phone, and creates a huge amount of phone bills. Because some of the mobile phone virus is from automatic phone call when the spread, because the phone network is too perfect connection, so it is more than computer viruses, and in the future with the mobile phone design more complex and more diversified, the virus will bring more disaster.

In addition, because there are other mobile phone data communication methods, such as SMS, WAP services, on the one hand they can bring us convenience, just press a few keys can change a logo, download your favorite ringtones. But it is also these functions that can be written to the system or memory instructions, as soon as the attacker finds out the gap, spreads a poisoned message, assembly programming changes the system's internal code (machine code), hides the instructions in memory, and then opens the phone book of other phones, wantonly spread the virus, in a certain period of time attack, damage the mobile phone's boot system.

2, the mobile phone virus attack mode

Many mobile phone users now worry that WAP phones will become an important object of hacker attacks. Because the network directly to the WAP mobile phone attacks than the GSM mobile phone to attack more convenient. In this respect, some experts have pointed out, because such technology is very difficult, coupled with mobile phone network operators have been in the WAP server and "gateway" to set up security systems, so the general user basic need not worry.

If the hacker attacks on the mobile phone, there are usually three ways to behave: one is to attack the WAP server so that WAP phone can not accept the normal information. The second is to attack, control "gateway", send spam message to mobile phone. The third is to directly attack the phone itself, so that the mobile phone can not provide services. This method of destruction is relatively difficult, but the level of technology is still difficult to achieve.

Based on the above attack mode, WAP phones and other computer information systems Network-related products will face new security requirements, which at least tells us, based on WAP "gateway" Anti-Virus product demand has been generated, the relevant handset manufacturers, telecommunications companies should put this issue on the agenda. For WAP mobile phone users, also need to keep an eye on the new information, preventive.

3, the main types of mobile virus

There are currently 6 viruses in the market, respectively:

A, the first is "epoc_alarm", it always issued a warning sound, although no blight, but also quite annoying;

B, the second is "Epoc_bandinfo." A ", it attack will change the user information to" somefoolownthis ";

C, the third is "Epoc_fake." A ", it will be on the phone screen to format the built-in hard drive screen, do not panic, because in fact, the phone does not perform a format operation;

D, the fourth kind is "epoc_ghost." A ", it will be displayed on the screen" everyonehatesyou "words;

E, the fifth is "epoc_lights." A ", it will make the background lamp backlight continuously flashing;

F, the sixth type is "Epoc_alone." A ", it can disable keyboard operation, and so on.

The first five of these six viruses are not very harmful, and there is a taste of mischief, but the sixth kind of "Epoc_alone." A "is a vicious virus. When the computer executes a poisonous program, it displays the image displayed when the infrared communication receives the file and silently hides the virus in memory. When the virus is camped in memory, it will display "Warning-virus" information on the computer screen, then the handset will not accept any keyboard operation. When you find out, you can enter "Leavemealone" to remove the virus resident.

4, the mobile virus to take measures

A, turn off the garbled phone

When the other side of the phone call, the original screen should be the caller phone number, but it shows other words or strange symbols. If you encounter the above situation, the person answering the phone should not answer or close the phone immediately. If you answer a call, you will be infected with the virus, and all the terminology and settings will be destroyed.

B, as little as possible to download information from the Internet

If the virus wants to invade, to break the mobile phone short message protection system, in the complex coding program, and then in the mobile network transmission, is not that easy, but with the advent of 3G, mobile phones tend to a small computer, there will be computer viruses have mobile virus, we are still more careful!

C, note the possible virus in the message

The sending and receiving of short messages is becoming an important way of mobile communication, however, short message is an important way to infect mobile phone virus. At last year's Asian anti-virus conference revealed that the development of mobile phone virus has been from the incubation period to the destruction period, has drawn attention from all walks of life. Once the mobile phone user received a message with the virus, read the phone will appear after the keyboard is locked, and even damage the phone IC card and other malicious mobile phone virus.

D, the mobile phone to carry out the killing virus. At present, the main technical measures to deal with mobile phone virus are two kinds: one is through the wireless website to the mobile phone antivirus, the second is through the phone's IC access or infrared transmission port for antivirus.

Of course, mobile phone virus has not yet reached that terrible point, because the current number of mobile phone capacity (capacity and operation), is not strong enough to independently handle, spread the virus. So the virus can only through the computer, WAP server, WAP gateway to harass the phone, and the real damage to the phone itself (damage to the smart card, dialing, etc.) technically is very difficult.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.