360 and "Every Sutra" dispute ringing mobile internet Age Security alarm

Source: Internet
Author: User
Keywords Mobile Internet security 360
360 was also pushed to the cusp by the daily economic news report. Since February 26, the daily economic news has been repeating several reports accusing 360 of "security issues". July 4, "360 in the user's privacy information access, has broken through the moral and legal boundaries." This report disclosed the issue of the disclosure of Futures securities information, related to Internet financial security, in the industry a huge response. After a lengthy report of 360 for the first time in February, 360 promptly refuted and sued each other. This 360 claims to be added to the indictment of each sutra. According to netizens, "every sutra" and its subordinate "Chengdu Business Newspaper" has been a domestic internet giant boss investment. As a result, its reports have been questioned as an attack and defense campaign by internet companies. Apart from the animosity between the company, calm thinking, mobile internet age, what kind of security do we need? Who gives us a sense of security? First, the free subversion of traditional anti-virus software Zhou with its advocacy of "disruptive subversion" of micro-innovation philosophy, starting with the security assistant, first with Kaspersky and other old anti-virus software, and then continue to launch its own anti-virus software, and forever free. The "free" This killer has subverted the traditional anti-virus industry. Kaspersky, Rising, Jinshan poison PA, jiangmin and other anti-virus software in the market blew, crumbling. Around the search for cracked version of anti-virus software, kneeling for antivirus software leak secret key behavior is already nostalgic past style. At that time package annual antivirus package more than 100 yuan, there are still a large number of users like Wu. When Internet viruses and Trojans flooded, panda incense author Li June has not "go in", the father of 360 security aides, Jinshan network CEO Fu also surrender to Zhou under the command. 360 with its "Free + value-added" core model, rapid Gongchenglvede, the growth of China's second largest desktop client, the final successful landing on the Nasdaq. Based on free antivirus software, 360 built a traffic kingdom. The use of client-side traffic, with the browser, to contribute traffic to the Web site navigation and games. form a sound business model. The core of this pattern is traffic. Therefore 360 clients need to constantly pop-up notification window, to guide users click to obtain user traffic, and in the back-end. Attendant interference. Users need to face a variety of window. The news, games, entertainment, and information that have nothing to do with security guards are all about to bounce off and get bored. In addition to 360, thunder and other clients are familiar with the bomb window big kill device. Like opium, clients know that the window will hurt the user experience, but they still enjoy it. In addition to advertising, it is reported that 360 has also used the updated patch channel to promote their products. We enjoy free benefits, it is reasonable to pay a certain amount of time cost, visual pollution costs. But the privacy issue is the most dreaded bottom line for every user. Second, privacy security to replace the virus to become the biggest security problem mobile Internet era, the Internet more life. PC is changingis one of many computing devices, and not the most important. The PC may be just a tool to accomplish some large engineering tasks in the future. such as drawing, programming, editing, tabulation, etc. Viruses and Trojans originate from PCs and have more destructive power on PCs. But mobile internet is not a paradise for viruses and Trojans. On the traditional PC Internet, since the massive outbreak of panda incense virus, along with Li June "go in", the large-scale destructive virus also disappeared. This has 360 of security software, such as virus search, kill, and defense technology, but also WINDOWS is becoming a relationship. The core cause of the XP era virus is still the hole in the WINDOWS system's thousand holes. WIN7 begin to reduce vulnerabilities and therefore become more secure. All this makes it harder for a massive virus to appear. The virus is characterized by the ability to reproduce the proliferation of malicious programs. Its purpose is more destructive, latent when the control computer becomes "broiler", the outbreak of direct impact on the computer normal work. The virus itself is a simple and abusive mode of operation. In the great environment of the one-foot road, the virus makers are moving into other "hacker markets" where the Nuggets have opportunities. Panda incense, Li June came out, did not choose to continue to do the cause of the virus, a few days on suspicion of online gambling by the police control. The anti-virus software on the PC has no sense of existence. Thus, computer-aided management, boot time rankings and other functions become the standard anti-virus software. The smartphone does not show a similar mass of viruses on the PC side. The reason behind this comes from the following: First, the lesson of the PC operating system is that the smartphone OS design is more fully considered for security. For example, Root permissions, installation mandatory confirmation, one-click Restore, and so on. Second, the two smartphone operating systems, Android, are open source systems with better self-healing capabilities and vulnerability detection because everyone can help them find vulnerabilities, while IOS relies on Appsotre's manual audit mechanism to prevent viruses. Thirdly, the advanced Self upgrade mechanism of the smartphone operating system is also superior to the PC operating system. This makes it less opportunistic to rely on system vulnerabilities. Finally, the network environment of the smartphone restricts the rapid spread of the virus. From the market already have products, the main mobile phone anti-virus Network Qin, although the successful listing, but its installed capacity, income and other indicators are not optimistic. Traditional anti-virus software such as 360 and Jinshan, the former is mainly to do mobile phone-assisted management, followed by security. Jinshan is the main push battery doctor, tube battery is even more important than the tube virus. But the security appeal of mobile Internet is more important than PC. PC virus affects the work is entertainment, resulting in economic losses. And the security of mobile Internet will affect our real life. Mobile internet and people's life more closely linked, intelligent equipment with the communication, camera, recording, positioning and other physical conditions, stored contacts, photos, communications records and other data, the bearer of personal identification such as shortLetter authentication Code, micro-letter task, resulting in mobile phone security concerns also from anti-virus Trojan to prevent privacy leaks. The pain that people lose their phones may be more from loss of numbers, loss of data, and disclosure of privacy. The mission of PC in the mobile internet era is also undergoing great changes. E-commerce, silver and other functions, so that the security demands on the PC from anti-virus into privacy security. Mobile Internet era, we need not antivirus, but the safe production, circulation and consumption of information. We do not just need equipment security, more need information security, that is, privacy security. Iii. What kind of security services do we need? Since privacy security has become the core of security concerns, the new era of security software will also be the function of anti-virus antivirus into privacy protection. What we need is not just a piece of software, but a set of mechanisms, or systems, to secure privacy. Security software is just one of these components. 1, how to ensure that the Internet Service security browser security is becoming the basic security requirements. The development trend of PC side is that more and more tasks need to be done through the browser. Whether surfing the Internet or shopping, you need to use a browser. Open the computer at the same time often open the browser. And the maturity of cloud computing and cloud application makes more data and application transfer from local hard drive to cloud. The transfer channel on the PC is the browser. This makes the security of the browser as important as the security at the operating system level. That's why mainstream browsers are the main security concept. 360 security browsers, cheetah browsers are emphasizing their own security. Cheetah browsers have even launched payment services. When using a cheetah, a loss due to security problems can be applied for a claim. The problem is whether the browser is safe and only the browser knows it. Domestic browsers, while using the open source kernel, did not open up the entire browser to Chrome. What it can do, what data to obtain, what data is collected, for users, is the black box. Go to the next level. Internet services such as search engines are also providing security services. Baidu has a similar Leopard browser payment system. Use Baidu Search, encounter Trojan Web site to bring losses, you can claim to Baidu. and security requirements such as Taobao, Alipay, net silver have their own security measures. such as browser controls, soft keyboards, and so on. PC, we no longer just need the computer is safe, more need to use a computer to surf the Internet, the use of various services are safe. 2, how to ensure the safety of smart Devices Network Qin has proved that the PC antivirus mode to move to the mobile internet can not solve security problems. Intelligent devices, the operating system has a layer of rights management system, the application of the permissions constraints. However, due to the user's lack of attention to the problem, resulting in a large number of App swoop, beyond the scope of responsibility, access to the need for high privileges such as address book, positioning and so on. These apps can upload users ' privacy data to the cloud. There is also a large amount of data on the server side itself. For example, the electric business shopping data, the cloud storage data, the mail, the Address book and so on, movesThe security of the Internet, more is the security of the cloud. What we need to guard against is the abuse of our data by apps and service providers. Keep an eye on them, and you can secure privacy. 3, security software How to ensure privacy security? Antivirus software to help us monitor the computer, monitor the browser, monitor the net silver, who will monitor them? This is a deep-seated reason for the 360 dispute with the daily economic news. How does antivirus software prove itself innocent, proving to the world that it has not crossed the border to get the information it shouldn't have? Not collect or even disclose user's privacy information? There is still a need for a secure client on the PC. It's been a long time since the virus broke out, but streaking is still a minority adventure. One out of 10,000 of the risk is also worth defending against. The current PC client antivirus software In addition to 360, another player is the old anti-virus software Jinshan. Recently, search giant Baidu launched anti-virus software, High-profile joined the anti-virus software camp. Baidu antivirus software into a Red Sea market. In order to differentiate, the other anti-virus software has been widely criticized for privacy and security issues, publicity itself is "green Anti-Virus, quiet protection", that is, do not peep private, not harassment, not coercion. Plainly, Baidu wanted to tell the world do not need data I do not take, do not play window, nor threat to intimidate small white users push their own clients. Because Baidu push antivirus software is not to make money or to promote business, is purely a defensive means. The problem is that every anti-virus software can claim its own green quiet. Do not harass and do not stress, the world has eyes to monitor, but it is difficult to spy on the monitoring of private. Valid proof way is: open source. Open your source code to the world and do things at a glance. The paradox is that anti-virus software and viruses, Trojan Horse itself is a cat-and-mouse game. If you open yourself, in front of the virus, Trojan maker fully exposed themselves, so that it can prevent anti-virus software even targeted self-improvement, the consequences may be more serious. Anti-Virus software at home and abroad are mostly closed. Golden Hill Guards in 2010 years has launched an open source plan, open degree and effect is unknown. But this attitude is worth encouraging. The eclectic approach is to selectively open small areas. be included in the industry third party supervision, or government related departments of supervision. The principles and codes of antivirus software are transparent to regulators. We trust these regulators, who help users verify that antivirus software is not overstepping its authority. This is the most feasible and urgent need. Ultimate safety is human security. Small white users with any security software may also be cheated, professional users "naked" is also a small chance of being cheated. The privacy of the cloud, the need to "rule by man", and no powerful technology to restrain the cloud data master's behavior, through the regulatory system to ensure privacy security. Security is a long way off, the final state may be by tools, technology, supervision and even laws and regulations to form a comprehensive security system for our Digital Life escort.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.