Mobile payment hidden dangers heavy mobile phone consumption still need to be careful

Source: Internet
Author: User
Keywords Mobile payment mobile payment
The current mobile payment seems to become a fashion, users "brush their mobile phones" by the subway, "Brush the phone" shopping, "brush mobile phone" Drink coffee, "brush mobile phone" to watch movies, and even "brush mobile phone" booking ticket ... There are signs that mobile payments have come to a new climax. But with the frantic rise in the amount of mobile payments, the hidden dangers of mobile payments are a cause for concern. To protect users from paying security, industry experts suggest that users should install secure, reliable mobile protection software on their phones. Security vulnerabilities risk, beware of mobile phone signatures, SMS fraud loopholes in the user's phone account money "inexplicable" was turned away, the bank card inexplicably be brush ... Now, the security issue caused by mobile phone payment is a lot of media reports. Gregg Dai, an expert on software security technology in the United States, says the mobile payment business has great potential for growth, but there are huge data security vulnerabilities in this way. At present, the vulnerability of signature and short message fraud is extremely serious, and the mobile phone signature loophole can make the malicious program modify the application without changing the signature of the mobile phone, and tamper with the application of the mobile payment tool or bank client to steal the user information. SMS fraud loopholes can enable criminals to send fraudulent messages to mobile phones to entice users to install Trojan horse or login phishing website, so as to obtain user account password, funds and other information. For the above security vulnerabilities, mobile security evaluation experts said that at present the market 360 mobile phone security guards, security butler, Baidu mobile phone security software almost set the corresponding protection functions, such as automatic phone number sent to the unknown the software will automatically identify, intercept and identify possible risks. virus prevention, protection, monitoring and industry professional evaluation experts said that each Android phone in the presence of 8-40 of different system vulnerabilities, so far to participate in the evaluation of the phone almost all of the system loopholes. Systematic vulnerabilities leave an opportunity for the virus to invade, and these viruses will become another big enemy of the security of mobile phone payments. According to the recent data released by the media, we can see that the main sources of mobile virus transmission in China include website forum, application market and ROM built-in, respectively accounted for 25.6%, 23.7% and 22.1%. In response to these impossible virus intrusion, mobile phone security software has put forward corresponding measures, such as the security butler to provide the killing Trojan, killing the money to pay the software function, Baidu Mobile Butler also used the monitoring of WiFi fishing function, and 360 mobile phone guards will be the theft of Trojan horse, killing the number of payment software Monitor WiFi fishing, identify the four main features of phishing Web site together to encirclement and suppression of the virus. Expert assessments show that 360 of mobile phone guards are more prominent in monitoring WiFi fishing and identifying phishing sites. CCTV reported in June, 360 mobile phone guards successfully intercepted the "stealth thieves" and its variants. Payment means a lot of security problems, "first pay" function to do the protection of mobile payment convenience to make life more convenient, thus more convenient two-dimensional code payment, bar code payments and other forms of payment also came into being, but at the same time also gave the criminals easily through the hijacking procedure, directly confirm the two-dimensional code, bar code for the opportunity to brush money. Previously reported that a woman Taobao transactions, the other side sent a two-dimensional code, the woman did not think much, with a mobile phone swept down, point the link, not long, Alipay, balance treasure in 180,000 yuan was turned away. No, the current means of payment diversification also adds more problems to the payment security protection. In response to the diversity of payments, many mobile phone security software provides users with the identification of malicious two-dimensional code services. Users can choose the convenient way of payment according to the demand, first scan and then login, and in the process of sweeping, users can use security software security scanning, although the user forgot to use a secure channel for scanning, mobile phone security software will automatically identify the malicious two-dimensional code to the user prompted. It is worth noting that, compared to many security software, 360 mobile phone guards also use the net to buy first compensation, telecom fraud first compensation function to the user shopping maximum security. Users in the network shopping, or by the telecommunications fraud, if because 360 security guards failed to intercept the fishing site or online shopping Trojan horse, which led to its loss of property, 360 Security Center will provide users with a single maximum of 2000 yuan of cash compensation. Mobile phone payment security problems, mobile phone security software Qi Qi plugging loopholes, encirclement and suppression of viruses, real-time monitoring of various means of payment to users a secure, comfortable payment environment, and 360 mobile phone guards with its excellent service to win the trust of users, according to the media Consulting (IiMedia) Data show that 2014Q1 China Mobile phone security software active user distribution, 360 of mobile phone guards continue to maintain a larger leading edge, active users accounted for 70.8%. (Source: China net)
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.