Joke Collection Website - Blessing messages - What exactly is a mobile phone virus?

What exactly is a mobile phone virus?

1. The implementation principle of mobile phone viruses

Mobile phone viruses are actually the same as computer viruses. They can be executed by computers and send random text messages to mobile phones. Strictly speaking, a mobile phone virus should be a computer virus. This virus can only be spread on the computer network and cannot be spread through mobile phones. Therefore, the so-called mobile phone virus is actually a computer virus program that activates a service of a telecommunications company, such as The function of email to mobile phone text message, and it sends documents to the mobile phone, there is no destructive power at all. Of course, some mobile phone viruses are quite destructive. Once they occur, they may be more powerful than personal computer viruses, and their spread speed may even be faster than the "I love you" virus. Viruses that invade Internet-connected mobile phones will automatically activate the phone recording function and transmit the recordings around. The virus will also automatically make calls, delete file contents on the mobile phone, and create huge phone bills. Because some mobile phone viruses are spread through automated phone calls, and because mobile phone networks are so well connected, they have a wider impact than computer viruses. In the future, as mobile phone designs become more complex and their functions become more diversified, the disasters caused by viruses will also increase. Wider.

In addition, because mobile phones have other data communication methods, such as short messages and WAP services, on the one hand they can really bring us convenience. We can change the LOGO by just pressing a few keys and download the one you like. ringtone. But it is precisely these functions that can write instructions into the system or memory. The saboteur only needs to find the gap, send a poisonous short message, and use Assembly Programming to change the machine code of the system and hide the instructions. In the memory, and then open the phone book of other mobile phones, the virus spreads wildly, attacks within a certain period of time, and destroys the boot system of the mobile phone.

2. Mobile phone virus attack methods

Nowadays, many mobile phone users are worried that WAP mobile phones will become an important target of hacker attacks. Because it is simpler and easier to attack WAP mobile phones directly through the network than to attack GSM mobile phones. In this regard, some experts have pointed out that because this type of technology is very difficult and most mobile phone network operators have set up security systems in WAP servers and "gateways", ordinary users basically don't have to worry.

If hackers attack mobile phones, there are usually three ways of expression: First, they attack the WAP server so that the WAP mobile phone cannot receive normal information. The second is to attack and control the "gateway" and send spam messages to mobile phones. The third is to directly attack the mobile phone itself, making the mobile phone unable to provide services. This method of destruction is relatively difficult, but it is still difficult to achieve at the current technical level.

Based on the above attack methods, WAP mobile phones and other products related to computer information system networks will face new security requirements. All this at least tells us that the demand for anti-virus products based on WAP "gateway" has been generated. Concerned mobile phone manufacturers and telecommunications companies should put this issue on their agenda. For WAP mobile phone users, they should also pay attention to new information at any time to take precautions before they happen.

3. Main types of mobile phone viruses

There are currently 6 types of viruses on the market. They are:

A. First The first is "EPOC_ALARM", which always makes a warning sound. Although it is not harmful, it is quite annoying;

B. The second is "EPOC_BANDINFO.A", which will cause the user to The information changes to "Somefoolownthis";

C. The third type is "EPOC_FAKE.A", which will display the screen of the mobile phone when formatting the built-in hard drive. There is no need to panic, because in fact the mobile phone does not Will perform formatting operation;

D. The fourth is "EPOC_GHOST.A", which will display "Everyonehatesyou" on the screen;

E. The fifth is "EPOC_LIGHTS.A", it will make the background light BackLight flash continuously;

F. The sixth type is "EPOC_ALONE.A", which can disable the keyboard operation; etc.

The first five of these six viruses are not very harmful and have a taste of mischief, but the sixth "EPOC_ALONE.A" is a malignant virus. When the computer executes a poisonous program, it will display the screen displayed when the infrared communication receives the file, and at this time the virus will be quietly hidden in the memory. When the virus sets up camp in the memory, a "Warning-Virus" message will be displayed on the computer screen, and the phone will not accept any keyboard operations thereafter. When you find it, you can enter "leavemealone" to remove the virus.

4. Measures taken against mobile phone viruses

A. Turn off garbled phone calls

When the other party calls, the screen should show the incoming call phone number, but it displays other words or strange symbols. If you encounter the above situation, the person who answers the phone should not answer or turn off the phone immediately. If you answer an incoming call, you will be infected with this virus, and all new terms and settings in the machine will be destroyed.

B. Download information from the Internet as little as possible

If a virus wants to invade, it must first break the protection system of mobile phone text messages, go through complex encoding procedures, and then transmit it on the mobile network , is not that easy, but with the advent of 3G, mobile phones tend to be like small computers. If there are computer viruses, there will be mobile phone viruses. Everyone should be more careful!

C. Pay attention to viruses that may exist in short messages

The sending and receiving of short messages has become an increasingly important method of mobile communication. However, short messages are also an important way to infect mobile phone viruses. . Information revealed at last year's Asian Anti-Virus Conference showed that the development of mobile phone viruses has transitioned from the incubation period to the destructive period, which has attracted the attention of all walks of life. Once a mobile phone user receives a text message with a virus, vicious mobile phone viruses such as the mobile phone keyboard will be locked or even destroy the mobile phone IC card after reading it.

D. Check for viruses on your mobile phone. There are currently two main technical measures to deal with mobile phone viruses: one is to anti-virus on mobile phones through wireless websites; the other is to anti-virus through the IC access port or infrared transmission port of mobile phones.

Of course, mobile phone viruses have not yet reached that terrifying level, because the current digital processing capabilities (capacity and computing) of mobile phones are not powerful enough to handle and spread viruses independently. Therefore, viruses can only harass mobile phones through computers, WAP servers, and WAP gateways, but it is technically very difficult to cause substantial damage to the mobile phone itself (destroying smart cards, random dialing, etc.).