Mobile viruses can be spread by two-dimensional code: risk is easy to ignore

Source: Internet
Author: User
Keywords Spread neglect can pass
Web Capture-morning news reporter key in the current domestic mobile Internet domain, two-dimensional code has become a common access to information, but with such as mobile phone viruses, malicious programs, phishing, such as the spread of the two-dimensional code of the potential risk is also increasing.  The two-dimensional code scanning service provider and the mobile phone security manufacturer's common reminder that the face of the site to provide the source of unknown two-dimensional code, in the use of mobile phones to decode should be more vigilant. Two-dimensional code security risk is easy to ignore recently, "Guangzhou Network Police" official micro-blog alert said: Mobile phone virus can be spread through two-dimensional code, such viruses will be disguised as mobile phone chat software, and through two-dimensional code to provide download links, users do not see "code" on the brush.  This Weibo has aroused the attention of netizens. It is understood that two-dimensional code is a way of information encoding, but also a carrier, which stores text, images, audio and video content, using mobile phone camera scanning, with software decoding, you can get the corresponding information from the black and white tiles. At present, two-dimensional code is applied in many fields such as commercial activity or network link, such as scanning the two-dimensional code of the magazine, viewing the corresponding video material of the article, and by identifying the two-dimension code of the visitor's mobile phone to enter the ticket. "Use two-dimensional code to download software, make mobile phone poisoning in safe mode, download software can not be installed to open." The mobile phone up to ask for answers. "Weibo users" auspicious "recently issued a request for help information online." With the application of two-dimensional code in various fields, this kind of distress information is also increasing in the network.  Reporters to the industry learned that similar two-dimensional code security problems do exist. In this respect, the country's largest two-dimensional code scanning service provider Agile Company Marketing director Zhang He in an interview, said, according to some user feedback, they had in the process of scanning two-dimensional code encountered a malicious website.  But at present, the security risk of two-dimensional code has not attracted people's attention, some people out of freshness, see this black and white color block to take out the mobile phone scan, and ignore the two-dimensional code generation is reliable. Malicious behavior can kidnap two-dimensional code Zhang He For example, some malicious behavior will be accompanied by a virus program URL chain delivered into two-dimensional code, users will be scanned after the mobile phone link, if further open operation, will be connected to the status of mobile phone poisoning.  Once poisoned, it is possible to disclose the mobile phone on the memory of the Address book, bank card number and other privacy information, and even be a disorderly button, consumption of Internet traffic.  Zhang He said that the two-dimensional code usually contains text or URLs, if the scan is a simple text message, the process will not generally recruit; but if the decoding is a link or run the program, the user out of curiosity, and further point open operation, this step is the reason.  For example, if a drink bottle with a participation in the official award-winning activities of the two-dimensional Code, outlaws will be a confusing phishing site to generate two-dimensional code, covering the drink bottle, so that some careless consumers in the false web site to fill out some personal information. To prevent the recruit, can install security software reporter from 360 mobile phone security expertsDepartment learned that, from the current situation, the scanning two-dimensional code generated by the mobile phone security issues are very few, those through the spam message transmission virus is more common, but in the future with the expansion of the application of two-dimensional code, the relevant security issues should be brought to the attention. According to industry analysis, newspapers and magazines, well-known business posters on the two-dimensional code is usually safe, but compared to some of the published on the site of the two-dimensional code should be more alert.  So remember, do not encounter a two-dimensional code to brush, you should have a judge of the source of its generation. It is observed that the demand for security in the user market has stimulated the development of two-dimensional code scanning service providers and mobile security companies, for example, the above two-dimensional code has been in July this year with Tencent mobile phone butler to launch a security identification function, so that the system can encounter suspicious URLs when the two-dimensional code users to make security reminders. Experts said that the installation of such monitoring software is also to prevent the brush two-dimensional code poisoning necessary measures, the security software for two-dimensional code monitoring and analysis of it as a "malicious Web site" to deal with.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.