Recently, researchers from an information security company found that a vulnerability in Apple's iPhone software could allow mobile phones to be remotely controlled. The vulnerability occurs in the mobile phone's Safari web browser, which is also used on Apple computers. Personal Computer Software defects also occur on mobile phones. This is just a good example.
The more advanced, the less secure
Mobile phone viruses have been around for nearly 10 years. Many experts believe that with the increasing computing power and complexity of mobile phones, the threat of mobile phone viruses will become a serious problem in the next few years. Professor of computer science at the University of California, Berkeley, David Wagner, said that mobile phones are becoming more and more like a micro-computer, and the consequence is that it began to inherit the same problems that computers face. Researchers have recently begun paying attention to these effects by designing mobile phone security systems to address these challenges.
At present, some information security companies that provide anti-virus software for computers, including Symantec, maffv, and mofeis, have begun to provide anti-virus software products for mobile phones. The working principles of these mobile phone versions are similar to those of computer versions, and mobile phone versions are often more efficient. However, considering the limitations of cell phone battery and processing capabilities, the mobile anti-virus software is simpler than the computer version and has limited functions.
In some cases, problems caused by limited battery life and processing capabilities can be solved by simply running security software in the mobile phone carrier infrastructure, rather than installing security software on the mobile phone. Nowadays, many carriers have installed security software on their devices that scan network traffic to scan the characteristic code of known viruses and prevent malicious programs from intruding into users' mobile phones.
[Content navigation] |
Page 1: |
Page 1: hardware failure |