Qihoo 360 is involved in the Enterprise mobile security field

Source: Internet
Author: User
Keywords Working
After a niche in the personal security market, Qihoo 360 tried to get involved in the enterprise-level security market. At the 360 Internet security conference yesterday, Qihoo 360 founder Zhou Hongyi said it was already developing mobile security products specifically aimed at corporate BYOD (employees with mobile devices), which will be released in the near future. Zhou Hongyi said: "Before many foreign internet giants to give employees the BlackBerry phone as a very glorious welfare, but as employees use mobile phones, tablet computers for Office, BYOD (staff with computing equipment) problem has become an enterprise information security a very headache problem, which will be a big problem of future security. Wu Hequan,, academician of the Chinese Academy of Engineering, yesterday revealed a group of data: 77% of U.S. employees use social networks at work, 33% of US companies are infected by some viruses through social networks, 2/3 work on social networks, and 1/3 of companies have been infected through social networks. Although the mobile operating system, like Andriod itself, has taken into account a variety of security factors, using a signature system to force users to confirm identity, but its certificate is not required by Google, hackers can still not issue Google proof. According to 360 Internet Security Center reports, the first half of the interception of new mobile phone trojans, malware and malicious advertising plug-ins 450,000, on average, add 2,500 daily balance of malicious software. 360 company chief scientist, Xiaoxian, a professor at North Lerona State University, said that the mainstream handset makers at home and abroad will almost always modify the original Android system, and malware can use these custom system vulnerabilities to gain system privileges, install applications silently in the background, and send phishing messages, 64% to 85% of the analysis's mobile phone Android system vulnerabilities are caused by custom systems.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.