Who is the real killer of mobile phone security? Manufacturers are not to blame
Source: Internet
Author: User
KeywordsFactory the real killer
Some people say that there is no security in the mobile phone every day in the naked state, this analogy is not too much, so who layer of the dissection of our mobile phone's "condom", so that the mobile phone into a dangerous situation without retreat? Who is the real threat to our mobile phone information security? With 3.15 exposure to a series of mobile phone security problems, users in a number of spit and began to think rationally, mobile phone security problem where the original sin. In response to this problem, recently with the state officials micro-launched a "mobile phone security is the curse?" "Network investigation activities, before the launch of the vote, the same state staff after the industry survey will be suspected objects in four areas, 1, no security awareness of the mobile phone white users, 2, loopholes in the mobile phone operating system, 3, all kinds of mobile phone security guards, 4, mobile phone manufacturers. A lot of people may be puzzled, how to hit the face so wide? OK, today small make up with everybody together one comb these four aspects of original sin. 1. No security awareness of the mobile small white user "I am the user, I am the most do not want to encounter mobile phone security issues, how the original sin also combed me?" "A lot of people would think so. But in retrospect, it is our unintentional, the virus left an opportunity. For example, mobile phones are not used to setting passwords; Many app accounts use the Remember Password & automatic login feature (which, while convenient, is very risky for applications involving financial resources, such as mobile Banking, Alipay, Web Forms, etc.); Connect to untrusted WiFi in public To get a better mobile experience, brush machine, ROOT ... These are threats to mobile phone information security risk operation, is tantamount to the personal information into the hacker bag. So small white users need their own initiative to develop mobile phone security awareness, to avoid risk operation. 2. The loophole of the mobile operating system many users will say, as long as we choose a safe operating system is not good ... The most current operating system for mobile phone market share is Android and Ios,ios, and Android is open. It is no stranger to mention Android, but the survey found that a number of security vendors reported that users of Android phones are becoming the focus of the virus attacks, more than 90% of the mobile virus is aimed at Android systems, and the number of viruses is growing rapidly. The rapid growth of mobile phone virus, but also the use of consumer habits are changing, with the use of mobile banking, mobile shopping consumers more and more, these consumers have become the focus of mobile phone virus targets. 3. Various kinds of mobile phone security guard in view of the operating system itself, so most mobile phone users will choose mobile Security guardian. But users generally spit: "Affect the speed of mobile phone or other programs to run", "occupy a large amount of traffic," installed a long time, the feeling does not have much use "," abuse of authority, although they are security software, but also can get our communication rate, SMS and so on "," some Trojans can not effectively kill , still poisoned. " SoMobile security guards They seem to provide security, but in fact only provide limited security, security software is only to take into account the user needs, in the psychological control of small white users. 4. Pre-installed the truth, mobile phone manufacturers are the real killer? During the No. 3.15 period of major media have reported that the user's mobile phone has been malicious deduction of the situation, was quietly ordered some services, but the mobile phone can not see any charging procedures. After the investigation found that the mobile phone was implanted two malicious trojan, one can be installed remotely, uninstall the application software, the other can get personal information on the phone. Why is this malicious program on the phone, traced back to the original phone factory pre-installed software was implanted in these malicious code. Mobile pre-installed software is undoubtedly the most headaches for users, not only occupy this is not comfortable phone memory, also deleted also deleted, want to delete also dare not delete, because want to remove pre-installed software must root, and the consequences of root is no warranty qualification (most mobile phone manufacturers in the warranty will be canceled after the root of the mobile warranty), These pre-installed software virtually to the small white cell phone users set a dead loop. Who pre-installed the software? Who is the original crime of mobile phone security? It turns out that in order to get high usage rates and save expensive promotional fees, some app developers have reached an agreement with their handset makers to implement their software pre-installed on their phones by giving them money to put their software on the phone. An agreement with handset makers to put their own mobile phone software pre-installed into the phone is the guarantee that the software will always be on the phone. The manufacturer brushes the machine is the mobile phone malicious code implantation important channel, from Samsung, Millet, Lenovo, Huawei, to many shanzhai machines and a variety of parallel imports, almost all have the default brush machine This procedure, for these manufacturers, the application to promote the product to quickly shop, manufacturers brush machine channel is almost the quickest way. Users have been kidnapped to use a variety of applications and to assume the risk of mobile Trojan intrusion. CCTV 3 15 party exposure Datang High-hung, actually exposed the mobile phone software pre-installed Lake of the iceberg. It is understood that November 1, 2013, the National Ministry of Industry issued the "on the strengthening of mobile intelligent terminal into the network management notice", clearly put forward the demand for mobile phone manufacturers pre-installed software needs to pass the relevant department audit. Now the handset market software is pre-installed and embedded with malicious code, wanton theft of user information and traffic, phone calls, very rampant, from manufacturers to the application has formed a mutual concealment to encroach on mobile phone users mobile phone information security of the integrity of the "food chain", so back to the culprit of mobile phone security, handset manufacturers can not be blamed. 960 security phones will be released, leading the security of the mobile phone without pre-installed in view of the security of mobile phones, the chaos of the national information big naked, with the Chau Electronics has been committed to develop a truly secure mobile phone. It is reported that March 2014 25 with the development of electronic self-developed 960-series mobile phone 960E will be released in Beijing, the mobile phone is equipped with the Linux kernel based on the original operating system 960 security system, and can achieve dual system switching, that is, after the closure of the Android interface can also use 960 security systems. It is reported that inPress conference, Chairman Ming will explain the causes of mobile phone insecurity and the future trend of mobile Internet, industry insiders predict that 960 of security phones or will lead to a real mobile phone information security era, the phone will be able to set off a new mobile phone industry storm, and see the launch of the mobile phone after the sale of the market.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.