Mobile Internet Information security hidden trouble a lot

Source: Internet
Author: User

Newspaper reporter Ben Ben kun

In recent years, the rapid popularity of smartphones, mobile Internet applications increasingly widespread, correspondingly, also brought new information security issues: the theft of user privacy, theft of traffic and other hacker behavior in a more covert, diverse manifestations of threats to users of mobile Internet application security. Rising company recently released statistics show that the 2012 mobile phone virus from the number and type of more changes, mainly in the following areas.

Two-dimensional code function problems

Two-dimensional code to the information of large, efficient identification, rapid response and other advantages to become the new favorite, people through the smart phone to scan quickly to get all kinds of information. Because the two-dimensional code is the picture, the Chinese character, the character and so on the electronic picture form storage, has changed the original content visually, therefore also provides the opportunity for the hacker.

Once the hackers put the toxic software, malicious Web site links and spam into the two-dimensional code, users scan, decoding will be poisoned, and may lead to malicious deduction charges. At the same time, poisoned mobile phone also may be to contact people in the address of the automatic conveyor belt poison file or fraud information, and delete system important programs, serious will cause the phone system crashes.

Not only that, the two-dimensional code can also be the user name, telephone, ID card and other information used as business cards, train tickets, air tickets identification, and many users in the processing of discarded bills, ignoring the above storage of the information on the two-dimensional code, the bill discarded, resulting in these personal information is easily access to criminals.

Malicious app threatens personal information security

Mobile devices, such as smartphones and tablet computers, bring convenience to the transmission of network information, and also face many information security risks. Some hackers make malicious apps to provide users with free downloads, and these apps will be given a predetermined command to send personal privacy information from users ' mobile devices to hackers, causing information to leak.

At the same time, a number of normal apps in the download run after the user needs to enter a large number of personal information, once the software is attacked, the information stored inside will be leaked. And some small software under pressure to survive, will be included in the program "rogue" behavior, resulting in normal software and gray software boundaries gradually blurred. Therefore, the security vendors can effectively control the malicious behavior only by identifying and intercepting the software behavior.

In addition, there are also a few cases where users encounter information security risks through public WiFi. Hackers tend to build a fake free public WiFi for users to use, when users in the "Black Net" in the network transaction or enter the privacy information, hackers can easily intercept all data.

Micro-letter becomes "dangerous letter"

Micro-letter as a new network social tools widely used, hackers use the stolen QQ account login micro-letter, to the address Book of relatives and friends in the phone recharge, remittance and other phishing information, many users are deceived. Many users like to use the micro-letter "shake" and "find nearby people" such functions, however, the micro-letter registration threshold is low, without real-name authentication, so when users chat with strangers to make friends, and can not understand the other person's true identity, and these people have a lot of ulterior motives, this creates huge security risks. These so-called friends often take personal privacy and bank account password for the purpose, the user once credulous, it is possible to be deceived.

Location Service exposes privacy

In applications for smart mobile devices, such as micro-letters, micro-blogging and so on are mobile positioning, even in some geographically unrelated applications can also collect the user's current location. This feature can also expose personal information when it is convenient for users to understand the surrounding information and find their current location. When a user publishes a message in a tweet or a recent photo, the open positioning function will automatically send its location to the Internet, quickly reflect the location, this information for the general people is not very useful, and for those with ulterior motives, it becomes a source of information can be used for crime.

Mobile payment security issues highlight

With the rapid development of mobile payment, users can make booking, payment, net purchase and deal with financial operations through mobile payment. NFC (near-distance wireless communication), as the representative mode of near-field payment in mobile payment, has been developed rapidly, and this kind of payment technology does not need to enter the mobile phone system to operate, and it can realize payment business through close distance data transmission.

Security experts, because the near-field payment needs to complete the operation through the mobile phone, so the mobile virus and malicious software will become a near-field security risks. Once a cell phone is stolen or hacked by a virus or malware, it can lead to privacy leaks, and all kinds of transaction information inside the phone can be hacked. Therefore, it is necessary to improve the personal safety consciousness and protect the privacy of the individual.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.