As WAP technology matures, accessing the Internet to obtain a large amount of information has become one of the important functions of WAP mobile phones. Of course, this also increases the chance of WAP mobile phones infected with viruses. Because it is relatively simple to directly attack WAP mobile phones through the network, WAP mobile phones have become an important target of computer hacker attacks.
Attacks on WAP mobile phones are usually carried out in three ways: one is to attack the WAP server, so that the WAP mobile phone cannot receive normal information; the other is to attack and control the "Gateway" and send junk information to the mobile phone; third, it directly attacks the WAP mobile phone itself. Viruses that attack mobile phones may not only automatically enable the phone recording function, automatically call the phone, delete information on the phone, but may even generate a huge phone bill.
Therefore, in daily use, in addition to downloading information from the Internet as little as possible, you must always be aware of viruses and monitor abnormal mobile phone situations at any time to detect viruses in a timely manner.
1. Monitoring garbled characters.
When the other party calls the phone, the screen usually displays the incoming call number. If other words or special characters are displayed, they may be attacked by viruses. In this case, the user should not answer or immediately close the phone. If you receive a call, the system will be infected with a virus, and all the settings on the machine may be damaged.
2. Monitor text messages.
As an important method of mobile communication, sending and receiving short messages is also an important way for WAP mobile phones to be infected with viruses. Once a mobile phone user receives a short message with a virus, the mobile phone keyboard may be locked, or even the Mobile Phone IC card may be damaged. Therefore, do not enable or forward messages sent by strangers, and delete them in time.
Once mobile phone viruses are detected, close the phone as soon as possible (if the phone is dead, you can directly remove the battery), take out the SIM card and insert it into another model of mobile phone (preferably different brands ), delete the suspicious text message that is stored in the SIM card, and re-connect the card to the original mobile phone. If it is still unavailable, contact the mobile phone service provider to perform anti-virus on the mobile phone through a wireless website as soon as possible, or use the mobile phone's IC access port or infrared transmission interface for anti-virus.