Joke Collection Website - Blessing messages - What is the mobile phone virus?

What is the mobile phone virus?

Mobile phone virus is slowly approaching and infiltrating into our lives. However, how much do you know about it? Do you know what a mobile phone virus is? Do you know how harmful the mobile phone virus is? Do you know how to prevent and remove mobile phone viruses? If you don't know anything about the author's question, read this special report on mobile phone virus quickly.

first, the concept of mobile phone virus

mobile phone virus is also a computer program, which is as infectious and destructive as other computer viruses (programs). Mobile phone viruses can be spread by sending SMS, MMS, email, browsing websites and downloading ringtones. Mobile phone virus may cause users' mobile phones to crash, shut down, data to be deleted, send out spam, make phone calls, etc., and even damage hardware such as SIM cards and chips.

II. History of Mobile Phone Virus

The earliest mobile phone virus appeared in 2. At that time, Movistar, a mobile phone company, received a large number of harassing short messages named "Timofonica" sent by computers, and the virus sent spam messages such as swearing to users in the system through the mobile system of Telefonica, a Spanish telecommunications company. In fact, the virus can only be counted as a text message bomb at most. The real mobile phone virus didn't appear until June 24, that is, the "Cabir" worm virus, which was copied by Nokia 6 series mobile phones, and then kept looking for mobile phones with Bluetooth installed. After that, mobile phone viruses began to spread.

So, what are the mobile phone viruses that appeared later? What harm do they have?

third, the working principle of mobile phone virus

The software and embedded operating system in mobile phones (the operating system solidified in chips, generally written in languages such as JAVA and C++) are equivalent to a small intelligent processor, so they will be attacked by viruses. Moreover, short messages are not just simple words, including ringtones, pictures and other information, which need to be interpreted by the operating system in the mobile phone and then displayed to the mobile phone users. Mobile phone viruses invade the mobile phone by virtue of loopholes in the software system.

for mobile phone viruses to spread and run, it is necessary for mobile service providers to provide data transmission functions, and mobile phones need to support advanced program writing functions such as Java. Nowadays, many mobile phones with the functions of surfing the Internet and downloading may be invaded by mobile phone viruses.

IV. Harm of mobile phone virus

1. User information is stolen.

Nowadays, more and more mobile phone users store personal information on their mobile phones, such as personal address book, personal information, schedule, various network accounts, bank accounts and passwords. These important materials will inevitably attract the "covet" of some people with ulterior motives, who will write various viruses to invade mobile phones and steal important information from users.

2. Disseminate illegal information.

Nowadays, MMS is very popular, which facilitates the initial spread of pornographic and illegal pictures, voices and movies.

3. Destroy the software and hardware of the mobile phone

The most common harm of mobile phone virus is to destroy the software and hardware of the mobile phone, which makes the mobile phone unable to work normally.

4. Causing communication network paralysis

If the virus infects the mobile phone, it will force the mobile phone to continuously send junk information to the communication network where it is located, which will inevitably lead to information blockage in the communication network. These junk messages will eventually paralyze the local mobile phone communication network.

V. Types of mobile phone viruses

Mobile phone viruses can be divided into four categories according to their virus forms:

1. Viruses transmitted through Bluetooth devices without red transmission "kabir" and "Lasco.A".

tip:

"Cabir" is a network worm virus, which can infect mobile phones running "Symbian" operating system. After the virus is found in the mobile phone, the Bluetooth wireless function will be used to scan other nearby mobile phones with vulnerabilities. After discovering the vulnerable mobile phone, the virus will copy itself and send it to the mobile phone.

like worms, Lasco.a virus spreads wirelessly to other mobile phones via Bluetooth. When users click on the virus file, the virus is activated immediately.

2. the mobile phone virus "mosquito trojan horse" aimed at mobile communication providers.

Tip:

The virus is hidden in the cracked version of the mobile phone game "Mosquitoes". Although the virus will not steal or destroy users' data, it will automatically dial and send a large number of text messages to numbers located in Britain, resulting in a sharp increase in users' information fees.

3. The virus "mobile hacker" for mobile phone bugs.

Tips:

Hack.mobile.smsdos virus spreads through short messages with virus programs. As long as users check the short messages with the virus, the mobile phone will be automatically turned off immediately.

4. The "Mobile.SMSDOS" virus that attacks by SMS or MMS is a typical example of the "Mobile.SMSDOS" virus that appears against Siemens mobile phones.

Tips:

The virus "mobile. smsdos" can be spread by SMS or MMS, causing errors in the internal programs of the mobile phone, thus causing the mobile phone not to work normally.

common mobile phone viruses and their toxic symptoms

virus name

symptoms of mobile phone poisoning

EPOC_ALARM

The mobile phone keeps giving out warning sounds

EPOC_BANDINFO.A

Change the user information to "some fool own this"

EPOC _ fake.a

. Not really

EPOC_GHOST.A

Displaying "Every one hates you" on the screen

EPOC_LIGHTS.A

Keep the background light flashing

EPOC_ALONE.A

This is a kind of malignant viruses, which will invalidate the key operation.

Timofonica

sends poisonous emails to mailboxes in the address book, and can also send a large number of short messages to mobile phones through the short message server.

Hack.mobile.smsdos

will cause the phone to crash or shut down automatically.

Unavailable

When there is an incoming call, the word "Unavailable" or some strange characters are displayed on the screen. If you pick up the phone at this time, you will get a virus and lose all the information in your mobile phone.

Trojanhorse

malicious virus, which will use the address book to make outgoing calls or send emails when the virus breaks out. Even called the police.

VI. Spreading mode of mobile phone virus

1. Spreading by Bluetooth

In December, 24, "Kapoor" virus was discovered in Shanghai, which would modify the system settings of smart phones, automatically search neighboring mobile phones for vulnerabilities through Bluetooth and attack them.

2. Infecting mobile phone executable files on PC

On January 11th, 25, Velasco virus was discovered. After the virus infected the computer, it would search SIS executable files on the computer hard disk and infect it.

3. Use MMS multimedia message service to spread

On April 4th, 25, a new mobile phone virus spread mode appeared, which was spread by MMS multimedia message service.

4. using the BUG of mobile phone to attack

this kind of virus generally runs on the "EPOC" of portable information equipment, such as "EPOC-ALARM", "EPOC-BANDINFO.A", "EPOC-FAKE.A", "EPOC-GHOST.A" and "EPOC-Alight".

VII. Targets of mobile phone viruses

1. Attacking Internet content, tools, service items, etc. that provide services for mobile phones.

2. Attacking WAP server makes WAP mobile phone unable to receive normal information.

3. attack and control the "gateway" and send spam to the mobile phone.

4. directly attack the mobile phone itself, making it unable to provide services.

VIII. Prevention of mobile phone virus

1. Scrambled SMS and MMS, delete them.

garbled text messages and multimedia messages may contain viruses, so delete them immediately after receiving them to avoid being infected with mobile phone viruses.

2. Don't accept strange requests.

When using wireless transmission functions such as Bluetooth and infrared to receive information, you must choose a safe and reliable transmission object. If a strange device requests a connection, it is best not to accept it. Because as I said before, mobile phone viruses will automatically search for devices within wireless range to spread the virus.

3. Ensure the security of downloading.

At present, there are many resources on the Internet to provide mobile phone downloads, but many viruses are hidden in these resources, which requires users to ensure that the download site is safe and reliable when downloading various resources by mobile phone, and try to avoid downloading from personal websites.

4. Select the background that comes with the phone.

Beautiful background pictures and screensavers are pleasing to the eye, but it's unpleasant to have viruses in the pictures, so users had better use the pictures that come with their mobile phones to set the background.

5. Don't browse dangerous websites.

For example, some hackers and pornographic websites are very dangerous in themselves, which contain many viruses and Trojans. It is very dangerous to browse such websites with mobile phones.

IX. Removal of mobile phone viruses

Now, the best way to remove mobile phone viruses is to delete short messages with viruses. If the mobile phone is found to be infected with virus, it should be turned off immediately. If it crashes, you can take off the battery, then take out the SIM card and insert it into another model of mobile phone (the brand of mobile phone is preferably different). After deleting the suspicious SMS stored in the SIM card, insert the card back into the original mobile phone. If it still can't be used, you can contact the mobile phone service provider to sterilize the mobile phone through the wireless website or through the IC access port or infrared transmission interface of the mobile phone.

resources: /Article_Show.asp? ArticleID=244