Joke Collection Website - Blessing messages - There will be a virus on the mobile phone. Really? How do I know there is a virus in my mobile phone?
There will be a virus on the mobile phone. Really? How do I know there is a virus in my mobile phone?
As far as the influence of mobile phone virus is concerned, it can be roughly divided into five categories: joking, disturbing, physical injury, money loss and confidentiality damage. The following will be divided into five categories to further discuss the different injuries and hazards caused by mobile phone viruses.
The influence of joking
This joke mobile phone virus will not cause physical or operational damage or influence to the mobile phone.
Mobile phone screen keeps flashing: for example, light virus.
Sensational words or scary icons are displayed on the screen: for example, the ghost virus will appear the message "Everyone hates you".
. Continuous beeping: For example, false alarm virus.
Small planes flying around appear on the screen: Sprite virus, for example.
. A formatted disk message appears: for example, a fake virus won't actually do any harm.
Pretend to download malicious programs, such as lonely virus.
. Automatically start telephone recording.
Disturbing destruction
The so-called virus that disturbs the mobile phone will not destroy or stop the physics or operation of the mobile phone, but it will cause trouble to the use of the mobile phone and even further prevent the update of the mobile phone software.
Sending and receiving spam messages: Many mobile phone viruses use a large number of spam messages to attack mobile phones. Although spam messages are not necessarily dangerous, they consume the recipient's precious time and add a lot of trouble. Moreover, spam messages are likely to hide viruses. Once poisoned, users may unconsciously become zombies or accomplices in spam messages. For example, samurai worms send messages containing viruses according to the recorded information in the victim's mobile phone.
Prevent any updates and downloads of mobile phones: For example, Fonda Trojan can prevent users from downloading new applications or other updates by destroying the program manager in the mobile phone system, and can also prevent mobile phones from deleting viruses.
The application doesn't work: For example, a Trojan horse with a skull will make the file system or application of the mobile phone unable to work, and the user must restart it.
Mobile phone power consumption: For example, the piranha (Cabir) worm keeps searching for other Bluetooth devices, thus consuming mobile phone power.
Blocking Bluetooth communication: Blocking the communication and connection between the mobile phone and any Bluetooth device, such as headphones, printers or other Bluetooth mobile phones.
Interrupt SMS service operation: Hackers launch DDoS attacks on MMS server, which leads to SMS service not running normally. Symantec said that the server of BlackBerry, which is very popular now, was attacked, which made users unable to receive emails normally for up to three hours.
Physical or operational damage
Physical or operational damage is a very serious result. Not only can users not continue to use their mobile phones normally, but the most important thing is that important data is destroyed.
Mobile phone crash: For example, hackers can use vulnerabilities in the mobile phone operating system to launch attacks, which will cause the operating system to shut down.
Automatic shutdown of mobile phone: frequent switching on and off may cause damage to mobile phone parts or affect service life.
Loss of file information: including the loss of phone book, address book, MP3, games, photos, ringtones and other files. Like the wooden horse with skull.
Paralyze mobile phone antivirus software: pretend to be the update code of antivirus manufacturer, trick users into downloading, and then paralyze mobile phone antivirus software.
Key functions of mobile phone are lost: for example, SYMBOS _ locknut Trojan horse.
Format the built-in memory: In the future, if the mobile phone has a built-in hard disk, it may also face the risk of being formatted.
Hackers gain access to the mobile phone system: Hackers can gain some or all of the system permissions without the user's consent through the loopholes in the mobile phone operating system. For example, the Brador backdoor program specifically for WinCE mobile phones, poisoned mobile phones will be downloaded remotely by hackers, and even execute specific instructions.
Burn the internal chip: It is said that once the Trojan horse is executed, the mobile phone will automatically shut down and even burn the internal chip. However, this information is unconfirmed and still hearsay.
Destroying the SIM card: Hackers directly destroy the SIM card through the vulnerability of the information access length of the early SIM card.
Currency loss
With all kinds of malicious attacks on PC linked to financial interests, this trend will inevitably develop on mobile phones, which will slightly increase the telephone cost and cause great losses in online transactions.
Increase the cost of SMS: As a "SMS spammer" controlled by hackers, the cost of SMS naturally rises. Such as flood hacking tools.
Automatic dialing: For example, in Japan i-mode, after receiving malicious multimedia messages, users keep dialing the Japanese emergency telephone number 1 10, which not only wastes social resources, but also increases the user's phone bill.
Transferred international calls: hackers directly tamper with the user's mobile phone address book through domain deception, which makes the user inexplicably transferred abroad when making a call, resulting in an increase in the user's phone bill.
Tampering with order information: Symantec said that more and more users are buying stocks through mobile phones now, so in the future, hackers may tamper with users' order information based on certain interests, such as speculating on specific stocks, which will lead users to buy wrong orders, resulting in investment losses.
Confidentiality damage
The ultimate goal of any security protection is to ensure the security of confidential information, so the disclosure of confidential information caused by mobile phone virus can be said to be the most destructive behavior.
Stealing calendars or address books: Disguise software or games with backdoor programs as genuine software or free software to trick users into downloading, thus stealing important data such as calendars or address books. For example, the hotel industry heard that the mobile phone address book of Hilton Paris was stolen under inexplicable circumstances. According to expert research, it may be caused by hackers invading through Bluetooth transmission pipeline.
Stealing private photos: In the future, hackers will not be excluded from stealing private photos of celebrities through Bluetooth, WiFi or other means to achieve the purpose of intimidation or deception.
Data leakage of online transactions: Now online banking or online transactions can also be conducted through mobile phones, so related data may also face the risk of mobile phone virus or hacker attacks.
- Related articles
- Huawei mobile phone (C8650) can't send short messages after swiping the card, but it can receive short messages normally. ...
- How to recover without oppo SMS icon?
- A lady hotel in Wuhu is going to transfer money to the swindler, and the police are shouting outside to stop it. How to prevent telecom fraud?
- How to turn off the automatic phone bill deduction of Apple mobile phone?
- What should I do if I am bombarded by SMS verification code?
- Is it useful to call the police when buying a car?
- How to add it back after hertz hacked each other?
- If the payment platform in Xuexin.com is fully equipped, how to pay?
- Are Scorpios also very slow to reply to text messages from the people they like?
- Autumn morning, warm message.