Nearly 30% of E-book software was exploited by hackers
Source: Internet
Author: User
KeywordsHackers
Reporter Qin Chuan Evening News recently, a large number of users reflected in the download of the mobile phone ebook implied suction trap, was forced to order SP business and consumption of Internet traffic phenomenon. Third-party data also showed that only in the last month, including "Panda reading", "Mobile bookstore", "Pocket book", "Boucoux bookstore" and other 20 balance software hackers use the spread of mobile phone virus, has been in the total number of E-book software accounted for 30% percentage. "At present, the popular mobile phone E-book category has been as high as hundreds of kinds of mobile phone virus has become the focus of attention to the object." Shihong, a cyber-qin mobile phone security expert, said that compared to other tool software, the design principle of mobile phone ebook software is simpler and easy to be "cracked" by hackers, and in which malicious code is implanted. Because of the number of mobile E-book downloads, some software stores, download sites and forums are mostly lack of security supervision, easier to lure users to download. Once the user downloads and installs it to the handset, these handset virus will start the malicious process in the mobile phone background, uses the mobile phone flaw to upload through the network, sends out the message and so on the way to carry on the destruction. Experts said that the current mobile phone E-book virus has entered a high issue. At the end of last month, a Symbian mobile virus disguised as a "panda reading" software appeared in several domestic mobile forums. Trick the user to download it will automatically open the phone "backdoor" to download malicious plug-ins, and in this process quickly consumes the user's traffic costs; Earlier this month, a disguised as "Dream book Bar" Android malware also turned out, cheat users to download can forcibly acquire the core control, through the remote server triggered by the mobile phone backstage to implement malicious deduction fee, upload privacy behavior.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.