Comments: Mobile Internet faces four security issues

Source: Internet
Author: User
Keywords Internet facing
Mobile phone or mobile internet security problems are mainly four categories: mobile phone system security, mobile communication security, mobile (hardware) security and mobile privacy security, China Internet Network Information Center (CNNIC) issued the 28th China Internet Development Status Statistics report. The report shows that by the end of June 2012, China's mobile internet users for the first time exceeded the desktop user, reached 388 million, compared to the end of 2011 increased by about 32.7 million people.  The proportion of mobile internet users in the total Netizen reaches 65.5%, becoming an important part of Chinese netizens. In the past two years, with the popularity of smartphones, mobile internet more and more popular, we ushered in the "mobile network era."  Accompanied by the explosion of mobile phone users, mobile internet more convenient to come, the security of mobile phones more and more problems, more and more prominent. Four types of problems puzzle users with mobile phones to download a chess game, did not expect to cause a mobile phone owed fees. Netizens "smart" recently posted on the forum said "in the game download installation process There is no hint, the phone is overdue after the operator Web site inquiries, but found to be inexplicably deducted information fees."  In fact, "smart" in the download game, also downloaded a bundle of mobile phone virus in the game, resulting in malicious deduction fee. In recent years, there have been more and more people suffering from "smart". According to Tencent Mobile Security laboratory data show that about 1.2 million of Android (Android) mobile phone users have suffered a malicious deduction of the virus, each person suffered 2 times, an average loss of 6 yuan, a total loss of more than 14 million yuan. And the malicious debit virus is just the tip of many mobile-phone security issues – since 2011, China's mobile-phone security sector has begun to really enter the "dangerous" situation.  360 company vice President Li that the current mobile phone or mobile internet security problems are mainly four categories: mobile phone system security, mobile communications security, mobile (hardware) security and mobile privacy security. The security of mobile phone system is the most common problem that users encounter. Mobile Trojan virus only in two years time to complete the PC Trojan virus 10 years of development process.  The 360 Security Center released the first quarter of 2012 mobile Security report, the Android platform added malware and 3,336 Trojans, compared to the first quarter of 2011, an increase of 1785%, the number of infected people more than 3.95 million, the year-on-year increase of 2,369%. The security of mobile communication is the second major problem that endangers users. Spam messages, harassing phones and "beep" charges are even more rampant today.  In the case of spam messages, the total number of 360 mobile phone guards intercepted spam messages in 2011, 10 billion, and the first quarter of this year to intercept more than 4 billion, the second-quarter interception is more than 6 billion. Mobile phone (hardware) security is also not to be underestimated.  In addition to the loss or theft caused by direct economic losses, the phone address book, photos and other user privacy data value sometimes even more than the value of the phone itself. Besides, there's a hand.Machine privacy Security. Mobile phone loss, cell phone poisoning or other people peeping may cause the privacy of mobile phone data leakage, and because of the privacy of mobile phones caused by the "pornographic door" incidents occur repeatedly.  Whether it is the "CIQ spyware" incident that shocked the world at the end of last year, or "x undercover" and other mobile phone hacking Trojan, as well as more and more mobile phone applications and games to read, and even return the user's privacy data, and other events, all of the users face the threat of mobile privacy security  Who is "behind the scenes"? The evolution of broadband wireless communication technology and the popularity of smartphones have injected powerful impetus into the development of mobile Internet.  But advances in technology have also created a proliferation of mobile phone security problems. Professor Kuanwenpo of Renmin University of China believes that the advances in communication technology, the development and popularization of smartphones and software have facilitated the manufacture and spread of mobile viruses to some extent.  According to the June virus report released by Tencent Security Laboratory, the virus on the open Android platform has accounted for 84% of the total number of viruses. The profit-making of the main cell phone virus is an important pushing force. Tencent Wireless Security Products deputy General manager Hu Zhendong said, "mobile phone virus has formed a complete industrial chain, from the mobile phone virus manufacturing, to the final profit income, mobile phone virus manufacturers can from the gold chain to obtain huge profits." In turn, the form of mobile phone virus is becoming more and more diverse, malicious software, spam information, privacy disclosure, malicious deduction fees and so people to deal with anybody. Hu Zhendong introduced a close "partnership" between viruses and malware developers and illegal SP (mobile value-added service providers). Hackers through the technology to the illegal SP provided by the deduction of the number of pieces into the application to lure users to download, after the user infected with the suction software will use the illegal SP company's SMS Billing and service custom channel to generate costs, and then intercept operators to send users of the deduction of text messages, so that users can not find deduction of the behavior, so as to achieve long-term profits,  And in the production of tariffs, but also in accordance with unequal proportion to obtain profiteering. In addition, on the issue of privacy security, a current profit chain around the privacy interests of the resale industry has also been formed preliminarily.  Malware collects mobile phone users ' information through security vulnerabilities and uses reselling information for profiteering.  And the lack of legal regulations and regulatory measures, but also allow mobile phone virus manufacturers to take advantage of the mobile phone security market. The weak security awareness of mobile phone users is also a crucial factor in the security of their own phones.  Hu Zhendong points out that although mobile smartphone users are increasing, but the overall level of security awareness of mobile phone users is still low, many users do not realize the malicious software in the theft of personal information, eavesdropping, and other aspects of the harm, and do not understand the installation of mobile phone security software can reduce the virus, defend the health of How to defend the mobile phone security industry insiders pointed out that the future domestic smartphone security situation is not optimistic. On the one hand, the new mobile phone virus industry chain will be completely formed; on the other hand, mobile virus is accelerating to the rogue software directionInto, the user's smartphone will become the new battlefield of software competition. In a recent meeting of China's computer network security, the Ministry of Industry and Information Technology, Deputy Director of the Communications Bureau Xingshihao on mobile phone security issues, industry and Information Technology department will start related work: First, around the intelligent terminal, the application store brought about by the user information leakage, mobile phone malicious program and other issues to carry out According to the results of the evaluation of mobile Internet enterprises and manufacturers to propose rectification requirements. The second is to instruct Internet enterprises and technical institutions to carry out mobile internet malicious program monitoring, disposal, and purify mobile internet environment. Third, the mobile phone into the network licensing link, the mobile phone operating system and pre-installed applications to carry out security testing work to prevent mobile phone network. Four is to strengthen the mobile phone application store safety supervision, supervise the implementation of the application store operator security responsibilities, strengthen security checks.  Five is to support the development of mobile phone security industry, guide China Internet Association to strengthen the anti-network Virus Alliance construction, the establishment of mobile phone malicious procedures to report the mechanism to play the role of social and public opinion supervision. From the national macro level, Kuanwenpo that the government should vigorously foster domestic mobile phone operating system, which is to solve the problem of mobile phone security is one of the fundamental ways. "The current mainstream operating system is mainly Apple, Android, Windows Phone and so on, if there is domestic unrest, international conflicts, and even war, foreign hostile forces and hackers can easily steal personal privacy, corporate secrets, national security information." And for the day-to-day mobile phone security problems, it should be legislative, technical, moral, economic four measures for comprehensive treatment.  "The mobile phone security software has become the most effective solution for mobile phone security issues, from the user's personal perspective, for mobile defense viruses, anti-theft and harassment phones and spam messages." Tencent Mobile Security Laboratory for individuals to make the following recommendations: It is best not to buy mobile phones from dubious sources, especially shanzhai and parallel mobile phones. These mobile phones are currently feeding the trap of feeding the big hotbed, there are early implantation of various viruses, Trojans, rogue software may be, when downloading software, should go to the official website of professional software or well-known application market, targeted to choose a relatively good reputation, high evaluation of mobile phone security software,  To a certain extent, to circumvent the risk of downloading malicious software, users should be regularly to the mobile phone for physical examination and virus killing, timely update the virus library, and to develop a regular inquiry of the habit of billing details.  "Security manufacturers, operators and the industry, individuals, such as the formation of a joint effort, coupled with the adoption of relevant laws and regulations, can be from the source of mobile phone or mobile internet escort, to achieve sustainable development," Li said.  Reader feedback to promote the integration to achieve "1+1>2"--in response to the last issue of the new era of meeting mobile interconnection in the recent period, the rise of micro-blogging, micro-credit fully demonstrated the strong power of mobile internet and attractive prospects. To meet the new era of mobile interconnection, the need for multi-party cooperation and common fortification. At home, the integration of the three major operators is the main engine. The convergence of the three networks dominates the fate of mobile internetPulse, promote benign competition and orderly cooperation, this is to the traditional competition concept and mode of transcendence, is the inevitable choice to adapt to the situation development. First, the necessary cooperation should be deepened in the competition. To break through the situation alone, reduce unnecessary friction, internal friction and waste, the advantages of their own strengths and competitors to combine to maximize the strengths of each party to play out, not only to improve their own and enhance the competitiveness of others, to achieve resource sharing, joint development, mutual benefit and common win, resulting in "1+1>2" magic effect. Secondly, the core competition should be strengthened in cooperation.  We should continue to promote scientific and technological innovation, grasp the core technology, improve management, reduce costs, improve quality, do excellent service, through competition, cohesion and vitality, enhance the core competitiveness, open the "East not Bright West," "Vista" new situation. Wen, Neijiang, Sichuan Province
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.