When you are using a smart phone to chat online, send and receive emails, or even buy or buy stocks, and upload short videos to the Internet, you will surely lament that your mobile phone is becoming more and more "smart" and more convenient. But have you ever thought that the more intelligent the mobile phone is, the more traps there may be! For the sake of your information security, let's fight for the security of your smartphone.
Fight 1
If you think that only computers will be poisoned, and the virus against smartphones has not been published, you will be too OUT of date. Although there are many operating systems on smartphones, such as the old Windows Mobile and Symbian operating systems, as well as new celebrities such as Android and iPhone OS, it is difficult for viruses to spread between so many different operating systems on smartphones, but this does not mean that there is no virus in the smartphone world. Recently, a smartphone virus named "Mobile Phone skeleton" has become prevalent. It is a virus in your mind, not only will your phone bill be "sucked up ", friends and family in the mobile phone address book also suffer.
How did the "Mobile Phone skeleton" be spread to smartphones? It may be disguised as a MMS or text message and sent to the user's smartphone. The message indicates "dedication to Zhang Ziyi's private information. Please go to http: // tran ×××. com, or "my mobile phone has been controlled by the mobile phone, and the address book has been uploaded to http: // tran ×××. com ". If your curiosity is" attack "and you click the above link," congratulations: the mobile browser automatically downloads and installs a virus file on the smartphone. The virus will immediately subscribe to a large number of billing services of SP service providers without notice, at the same time, the above-mentioned MMS and text messages containing viruses are automatically sent to each phone number in the mobile phone address book, the large number of SP charges, MMS, and SMS charges generated here are enough to quickly "suck up" your balance. The "mobile phone skeleton" virus not only causes a large amount of phone fees to be lost by drug addicts, but also expands the spread mode of the virus.
It is worth noting that the current mobile phone virus has evolved into multiple transmission modes, in addition to deceiving mobile phone users to access websites with viruses, mobile phone viruses can also be hidden in various cracked mobile phone software and games. For example, if you have downloaded a mobile game software from the Internet, you think that you can play the game after installing it on a smart phone, but while playing the game, mobile phone viruses hidden in the game may also start to work quietly, making international phone calls without your knowledge-the results can be imagined, and a large amount of phone calls evaporated.
[Prevention]
1. unknown route text messages
Mobile phone Internet access is becoming increasingly popular, and spam messages have also grasped this trend. In the past, only when mobile phone users reply to spam messages can they fall into the trap of billing SP, however, currently, spam makes full use of the mobile browser, so you do not need to reply to the text message. You only need to click the link in the spam text message to fall into the trap. Especially for full-screen mobile phones, due to misoperations and clicking the link, the mobile phone is poisoned and the phone charge is deducted. This is really a waste.
For the sake of security, we should try to avoid clicking links in text messages and MMS. Even links sent by people you are familiar with should be taken care of (the recipient's mobile phone may be infected with viruses ), for text messages with unknown routes, you should "delete them without renewal ".
2. Do not allow the program to gain excessive Permissions
Each time a smartphone installs a software, the mobile operating system (especially the Symbian System) will assign specific permissions to this program, for example, if a program requires different permissions, such as reading system files, obtaining Internet access ports, and making phone calls, you should be careful if the permissions required by the program do not match their functions.
For example, if a mobile game software needs to obtain the permission to make a call, you have reason to suspect that this game program may make a crazy call without knowing it, you need to know that "games" and "making phone calls" are not compatible. [Counterattack]
Mobile Anti-Virus Software is indispensable
Here, you may think it is necessary to install an anti-virus software for your smartphone. Currently, major computer antivirus software companies on the market have launched anti-virus software for smartphones. In addition to finding and killing known mobile phone viruses, the more important function is to intercept spam messages, harass calls, and even provide functions that make your smartphone safer, such as querying incoming calls and clearing the mobile phone system. The following are some popular anti-virus software for mobile phones. you can install the corresponding anti-virus software based on the operating system of your mobile phone. 360 mobile guard (free): shouji.360.cn, supporting Symbian mobile phones.
Kaspersky mobile phone security software (158 yuan/3 years authorization): buy.kaba365.com/1030100.asp, supporting symbian?windowslelemobile phone.
Kingsoft mobile guard (free): www.jxphone.com, which supports Android and Sym-bian mobile phones.
Rising antivirus software mobile edition (free for half a year): mobile.rising.com.cn, supporting mobile phones for Symbian and Windows Mobile.
Netqin Mobile Anti-Virus (78 yuan Lifetime Service): www.netqin.com, supports Symbian and WindowsMobile phones.
Fight 2 does not allow Bluetooth to become "spyware"
With the Bluetooth function enabled, mobile phones can easily transmit photos, videos, business cards, and other data to each other. However, this convenient function also has security risks, if you do not notice that Bluetooth is likely to become a "spy", your privacy will be disclosed. Currently, there are many apps on the Internet that use Bluetooth to monitor smart phones. They can find smart phones with Bluetooth enabled, you can use the Bluetooth port to obtain important data such as the address book, photo, and password of your smartphone. Even the text messages and calls you send and receive may be monitored through Bluetooth.
How does this Bluetooth "spyware" work? These software can be easily found on the Internet. Its main function is to enable the mobile phone installed with the "spyware" software to control other mobile phones with the Bluetooth function enabled, including reading text messages and address books from the controlled mobile phone; the mobile phone scene mode may also be changed, and the ringtones and volume may be changed at will; you can even disable your opponent's mobile phone and restore the factory settings of the mobile phone (all data in the mobile phone will be cleared ). Once this "spy" is targeted, will your smartphone still have privacy?
[Prevention]
1. Do not connect to Bluetooth at will
Fortunately, the popular Bluetooth spyware software requires confirmation from the recipient's mobile phone during pairing. That is to say, when the spy mobile phone is eyeing your mobile phone, it will send a Bluetooth pairing request to your mobile phone, once you confirm that you agree to the pairing, your mobile phone will be "spy". On the contrary, if you do not agree to the pairing, the other party is helpless. Therefore, when your mobile phone receives a Bluetooth pairing request, do not simply press "OK" to determine who the other phone is. If you suddenly receive a Bluetooth pairing request when you wait at the station next time, don't be curious and press "agree.
2. Mobile phones are not easily lent to others
Once a mobile phone is handed over to another user, the consequences may be more serious.
For example, the other party may have used a mobile phone to pair a Bluetooth spy. When the mobile phone returns to your hand, the "spy" may have quietly acted behind the scenes. For the sake of peace of mind, we should also check the list of Bluetooth pairing devices from time to see how many bluetooth devices are connected to your mobile phone. If we find any suspicious pairing device, we can immediately delete the pairing. 3. Remember to disable it when you do not need Bluetooth.
Many mobile phone users are used to enabling the Bluetooth function for a long time. This is really a bad habit-Bluetooth consumes a lot of power, and it is even worse for those with bad intentions.
Fight 3 beware of iPhone "jailbreak" Sequelae
IPhone "jailbreak" refers to cracking iPhone OS, so that I-Phone, which could only install paid genuine software, can also install pirated software. Currently there are a large number of pirated iPhone software on the Internet, therefore, many iPhone users choose "jailbreak ". However, not every iPhone user who "jailbreak" knows the aftereffects of "jailbreak"-if you do not change the password, the iPhone after "jailbreak" will be undefended.
Why is the iPhone "jailbroken" undefended? In the old iPhone "jailbreak" process, its SSH (Se-cureShellProtocol, Secure Shell protocol) needs to be activated so that users can log on to the iPhone through the Terminal (Terminal, while SSH has a default password protection (alpine), iPhone users often do not change this default SSH password after "jailbreak, this means that hackers can use this default password to log on to your iPhone.
Viruses can also intrude into the iPhone Based on the SSH Password Vulnerability. The iPhone with the name of iKee will be infected with the "jailbreak" iPhone without modifying the SSH password, and search for and infect other "jailbreak" iPhone phones on the Internet, at the same time, it will obtain the highest permissions for the iPhone. All websites on which you use the iPhone, who you call, and various account and password information will be leaked.
[Prevention]
Remember to change the password of iPhoneSSH
The remedy to this problem is that the iPhone "jailbreak" is caused by the default SSH password. The solution is to change the SSH password by yourself. Follow these steps to change the SSH password:
1. Install Mo-bileTerminal in Cydia.
2. After MobileTerminal is executed, enter login. Enter root in the login name login, and alpine in the password.
3. Enter passwd again to change the password. You may need to enter the password twice.
4. Enter login again. This time, enter mobile in the login name login, and alpine in the password.
5. Enter passwd to change the password. You need to enter the password twice.
6. Restart the iPhone.
Fight 4 prevents free WiFi leakage of privacy
How does free WiFi leak the privacy of smartphones? First, when your smartphone is connected to a public Wi-Fi wireless network without password protection, your smartphone is the same as all other computers and mobile phones connected to the Wi-Fi network, all are undefended. People with ulterior motives can access your smartphone from any device on the Wi-Fi network.
Through special software, the other party can obtain the data transmitted between the smartphone and the Wi-Fi network to know what web pages you are using the smartphone to view. If you are visiting your mailbox, your email password will be exposed. If you use a smartphone to log on to a mobile phone bank, the bank password may also suffer.