Security vendors have been on the PC for more than 10 years, and now the war is on the move.

Source: Internet
Author: User
Keywords Mobile Security Main harm
Tags anti- anti-virus cloud cloud security data different display find

Security vendors have been on the PC for more than 10 years, and now the war is on the move.

Along with, the mobile security problem is more and more prominent, such as Jinshan Network, Tencent Security, Baidu, Qihoo 360, NetQin and other manufacturers are taking the opportunity to find new opportunities.

"Mobile security is a bigger problem than a PC. Jinshan Network Vice President Chen told reporters that 2010, the entire industry's mobile phone security incidents reached 10,000, and 2011, the number of viruses on the mobile phone reached 100,000, the virus grew very quickly.

From the Network Qin "cloud security" monitoring platform statistics show that in the third quarter of 2012, total killing to mobile phone malware nearly 24,000, the chain growth of 92.7%, the number of more than 2012 in the first half of the year. In the third quarter, a total of 9.91 million malware-infected smartphones.

November 13, in an interview with reporters, Tencent vice president Zengyu said the current mobile security market is like the 2005 PC market. There are a lot of mobile terminals on the market, but the anti-virus solutions of the security vendors have not been released in time. This makes the entire mobile security very rampant. At present, in the whole mobile phishing, 80% of Trojans are controlled by the top five virus industry chain.

And before the "virus, Trojan" mostly out of the hacker's mentality is different, now the motive behind the security incidents is economic interests. Because the mobile end deduction fee is more convenient, the economic effect is bigger, the threat of mobile virus to user's privacy will also have a bigger impact.

This is evidenced by the data published in the Asian Anti-Virus Conference (AVAR2012). The data show that spam messages, harassing phones, phishing (fraudulent) information become the first three major approaches to mobile terminal security, accounting for 71.43%, 50.45% and 48.67% respectively. The survey showed that in 2011, information leakage became the most important harm caused by the infection of mobile terminal virus, accounting for 80.77%.

With the development of security, the security industry is becoming more and more refined. "Kill is the foundation, the future is to kill the direction." "Zengyu that, due to the different samples, the safety of the antivirus focus will also be different, in the future, in anti-virus, Trojan, and so on, we will cooperate more."

Chen told reporters that mobile security is divided into 3 levels, at the system level, that is, Android,ios, as well as Windows platform. Among them, the Android Market security problem is more prominent, Apple iOS system is closed, and Apple will audit each software, security issues less. On the application tier, users may receive viruses in the process of downloading applications and installing applications. In the user layer, the user's use of the data generated during the process, as well as users and users of the data exchange, which carries a lot of opportunities.

And the security market behavior is "villains, outsmart", each other "leapfrogging" interaction behavior. Chen that these new changes, Jinshan Network has been mobile phones, tablets and other mobile end of the launch of their own products.

It is understood that at present, Tencent Computer Butler "Beyond the income", but as a strategic level of the basic products, but also in the state of happy enclosure.

Tencent Desktop Security Product Department deputy general manager Wu that in the future, the security market in the fine, high-intensity operation is increasingly important. Now, virus trojan change means and frequency is more and more high, need more detailed security industry chain division of Labor and cooperation, can guarantee the speed of response.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.