The "Third Ear" is the way mobile phone security experts listen.

Source: Internet
Author: User

Installing Micro-bugs on mobile phones is the oldest hacker.
Stolen index:★★

Does the mobile phone we carry with us every day sell us out? How did our private calls be spread? With a few questions, the reporter came to the Information Security Research Center of Southeast University yesterday. Over the years, Professor Hu aiqun, Director of the Information Security Research Center, has been devoted to mobile information security technology research. He is also an information security consulting expert of Jiangsu Information Office.

Professor Hu told reporters that "compared with traditional phones, mobile phone eavesdropping is more technical ." Because a fixed phone transmits analog signals during a call, there is no encryption measure. If this signal is stolen, it can be easily restored to speech. The mobile phone signal is sent to the air. The transmitted signal is encrypted and it is still worth pondering if you want to decrypt it. Even so, mobile phone eavesdropping is still happening without fear. For example, installing a micro-bug in a mobile phone is the most primitive and old-fashioned method of eavesdropping.

However, when we open the back cover of the mobile phone, the parts in the mobile phone are very compact. Where is the gap between installing a bug? Professor Hu explained: "there is still enough space, and all the bugs with buttons can be installed ." For example, the cell phone battery is only half of the original size, so there is enough space. However, in this eavesdropping mode, the transmission distance is mostly about several dozen meters. That is to say, if you want to listen to a mobile phone call, it must be within a certain range, and the distance will no longer work.

Expert tips: Don't keep strangers close to your cell phone

Experts warned that it is generally not easy to find a mobile phone equipped with a miniature bug. Therefore, it is recommended that you go to a regular and Professional store when purchasing and repairing mobile phones. It is best not to lend your mobile phones to strangers. In addition, a cell phone offered by others may have to be replaced. In addition, like anti-eavesdropping in a movie, if you have very confidential calls and highly suspect that someone is eavesdropping, you may wish to learn the plot of a movie to make noise. Because listening devices are the same and sensitive to noise. The effect of noisy eavesdropping is greatly affected.

Pseudo base station, half-road "robbery" to take the call signal

Stolen index:★★★

In the popular Hong Kong Film "snoop", the line says, "our GSM intercept can intercept and hear each other's calls by entering the target mobile phone number ". The "GSM intercept" in the video is like a computer chassis. Is this really awesome guy?

The GSM intercept is actually a pseudo base station. People thousands of miles away can talk through mobile phones, relying on nearby base stations. On the one hand, the base station receives signals, and on the other hand, it is responsible for transmitting signals, acting as a "bridge" between callers. This pseudo base station does not transmit signals, but only receives signals. The size of a pseudo base station is not the same as that of a computer host, but it can receive all the communication signals. Despite receiving so many signals, this blocker can intelligently identify and find the mobile phone to be tapped. The mystery is that the pseudo base station can obtain the IMSI number of each mobile phone in the air. The IMSI number is unique, just like the mobile phone's "ID card number. After a pseudo base station obtains this number, all signals sent from this mobile phone are blocked.

Expert tips: Basic shutdown status security

As long as you search the Internet, the information that sells the "GSM intercept" will continue to jump out, the seller price is not high, 300 or 400 yuan a set. How can we prevent such eavesdropping? "Under normal circumstances, the mobile phone enters a safe state when it is actually shut down ." Hu aiqun explained that if the battery is switched out again, it would be safer, because no chip can play a role without power-on, and mobile phones are no exception. Of course, this is not absolute. If your mobile phone is "modified" and a rechargeable battery is added to it, it is likely to be monitored. To prevent eavesdropping, another trick is to shut down the mobile phone and store it in a closed metal box.

Mobile phone "hackers", no way to grab money, don't discuss

Stolen index:★★★★★

Computer viruses make Internet users miserable. In fact, mobile phones also have viruses! Mobile phone "undercover software" is no longer a legend. This software is also called mobile phone spyware. Once your mobile phone is "lucky", you will have no privacy at all.

Mobile phone hackers are more terrible than pseudo base stations, and they are almost pervasive. "There are about 1000 types of mobile phone viruses around the world. In our country, most of the people who know about mobile phones are still making phone calls and taking photos. There are not many people who use mobile phones to access the Internet, so there are few viruses, mobile phone viruses in foreign countries often occur."

Hu aiqun said that the "hijacking" of Grandma Liu's mobile phone is a serious poisoning phenomenon. A mobile phone virus is a program. If you use a mobile phone to access the Internet, it is very easy to get poisoned. The poisoned mobile phone is "crazy". It will create the illusion that the phone is shut down, making the phone black screen and keyboard invalid. The poisoned mobile phone can also be automatically started to leak all information about the mobile phone's environment.

After being poisoned, the mobile phone will automatically switch on and off, and will also be used to automatically send text messages to others, automatically call the phone, automatically access the Internet, and even damage the SIM card chip. Some bad sellers use the mobile phone virus to send advertising information and spam messages to other people through the virus's mobile phone. "He has made an advertisement and does not have to spend any money. The worst thing is the mobile phone master ." What's more, in order to vent your emotions, you will use your mobile phone to send your abusive words to people around you.

Even computers are infected with infected mobile phones connected to computers. If mobile phones connected to fixed phones, they will sell you.

So when will your mobile phone be recruited? Hu aiqun smiled: "There are too many ways of getting viruses! You are a person who likes to access the Internet. virus programs are uploaded to your mobile phone through a computer. To share a song with friends, you have activated bluetooth or infrared, viruses intrude into your mobile phone through Bluetooth (infrared), and the mobile phone is constantly initialized. In fact, all your personal information is sold by the mobile phone. MMS is also insecure, and the virus may be in mms ."

Expert tips: Use anti-virus software.

Infected mobile phones can be attacked with anti-virus software. However, anti-virus software cannot keep up with the speed at which new viruses are generated. At the current level, once your mobile phone is infected with viruses, you can apply for value-added mobile phone security services from the operator or change your mobile phone. Experts remind people who prefer to use their mobile phones to access the Internet. If there is nothing to worry about, try not to use a mobile phone to access the Internet. "The longer you use your mobile phone to access the Internet, the higher the risk of poisoning ." Also, do not enable Bluetooth or infrared, or download software from unknown sources.

Copy the SIM card and steal your privacy

Stolen index:★★★

On the Internet, the group text message "you can copy a mobile phone SIM card to eavesdrop on anyone's phone without a parent card" suddenly found a "Ride ". Not only do I publish this message by sending a group of text messages, but the reporter also found many posts selling SIM card replicas on the Internet, with prices ranging from 1000 yuan to 3000 yuan.

Professor Hu said that it is easy to copy SIM cards when there is a parent card. "It is similar to copying other files. Anyone can do this if there is a machine device ." For example, Wu Tong, his SIM card mentioned above, may be copied by others. While the Little Guo, his mobile phone signal was leaked, probably because his friend's SIM card was copied, And that card had the phone number of Little Guo. There is also the advertisement that Kobayashi sees. If the other party can use a small chip to steal mobile phone secrets, it may also use SIM card replication technology.

However, it is quite difficult to copy a SIM card without a parent card. Professor Hu told reporters: "If you know the SIM card encryption and decryption method, International Identity Authentication identification code, and other data, you must use high technology to enter the carrier system. This is very unlikely. It is a lie that you do not need a mother card to copy the data sold on the Internet ." Of course, Professor Hu said, It is not ruled out that some people will illegally use high-tech technology to enter the carrier system, so mobile phone users must be optimistic about their SIM cards.

Expert suggestion: report the loss as soon as possible after the SIM card is lost

Experts warned that, in general, mobile phone users should keep their mobile phone SIM cards and passwords safe, and criminals cannot clone mobile phone cards out of thin air. If a user loses the SIM card, the user should report the loss immediately.

If you enable Bluetooth when there are many people, it is almost the same as getting naked in public.

Stolen index:★★★

Bluetooth allows people to enjoy the surprise and pleasure of information sharing. However, when you feel this joy, there is also a crisis.

It is said that "Bluetooth" was originally a king who unified Denmark in the 10th century. He unified Sweden, Finland and Denmark at that time. His name is used to name this new technical standard, which means to unify the fragmented situation.

Bluetooth is a short-distance wireless communication technology. Electronic devices can connect to each other through Bluetooth, saving traditional wires. Through wireless receivers on the chip, electronic products equipped with Bluetooth technology can communicate with each other within 10 meters.

In foreign countries, mobile phones are commonly used to exchange e-business cards, which are sent via Bluetooth, but the e-business cards may carry viruses. The most miserable thing is that you accidentally turned on Bluetooth, and the secrets in your cell phone were completely leaked, and you did not know it yet.

For example, Bao Feng, as mentioned earlier, was reminded by a friend that he realized that his mobile phone's Bluetooth function was accidentally turned on. Bao Feng found the Bluetooth function and found that it was on.

Expert tips: do not enable Bluetooth in multiple places

Because wireless devices can penetrate the wall, once you enable the Bluetooth, it is "the wall has ears ". How can we be secure? Hu aiqun said that the scope of Bluetooth transmission is relatively limited. do not enable Bluetooth in areas with many people or hybrid areas, so that you enter a relatively safe place. Of course, if you don't need Bluetooth at all, your world will be much more clean. Also, you can check whether your mobile phone's Bluetooth function is enabled frequently. when not in use, you should immediately disable it.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.