360 will push mobile antivirus tool can camouflage positioning to protect privacy

Source: Internet
Author: User
Keywords 360 Mobile Antivirus
360 Mobile antivirus will be built-in privacy features, can be disguised as other address April 23 Noon news, the source said, 360 will be on line today a new mobile phone app:360 mobile antivirus. The official outflow of the product page shows that for better privacy, 360 mobile phone antivirus camouflage location, mobile phone model, operator name and other functions, can be their own positioning information in the FBI headquarters, Dubai and other locations. Over the past few weeks, 360 has been quickly laid out in mobile apps, with Android cleanup gurus, security-changing apps, and more. According to the fourth quarter of last year, the total number of smartphone users in Qihoo 360 's main mobile security products was about 467 million, compared with only 207 million in December 2012. These people said that the upcoming release of the 360 mobile anti-virus tool is the most characteristic of privacy, the ability to disguise the location, mobile phone model, operator name. When the camouflage location is turned on, you can select multiple addresses around the world, allowing Trojans and applications confused to steal user locations. In addition, to notice the interception of advertising, is also 360 mobile phone antivirus a big bright spot, you can use the mobile phone application of the notification bar message for unified management, the repeated pop-up ads app settings prohibit pop-up. Zhou, chairman of the 360, said at the Singularity conference this week that with the development of the Internet over the past few years, security issues have not diminished but become more and more serious, which is the inevitable cost of cloud computing and large data development today, coupled with the access of a wide range of mobile intelligent devices, Security issues can become particularly serious. At the above meeting, he put forward three principles of information security: first, the user information is the user's personal assets, the ownership belongs to the user. Second, the principle of equal exchange, to use the services of manufacturers must be given to the manufacturers confidence, but the user must have the right to know. Third, the confidence of the principle of security processing, to obtain user data on the server user data encryption. Elwyn)
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.