Joke Collection Website - Public benefit messages - What is the harm of mobile phone virus?
What is the harm of mobile phone virus?
What is the harm of mobile phone virus?
1. Once the mobile phone is invaded by virus, it will make the mobile phone users unable to use it normally. The virus attacks mobile phone users by relying on their software system vulnerabilities.
2. Mobile phone viruses mainly spread to our mobile phones through third-party software. We can avoid cell phone poisoning by avoiding receiving some spam messages of unknown origin.
3. More and more mobile phone users store personal information on their mobile phones, such as personal information, schedules, personal address books, various network accounts, bank accounts, passwords, etc. Some criminals will write various viruses to invade users' mobile phones and steal some important information.
4. If the mobile phone is infected with virus and forced to send spam messages to the communication network, it will inevitably lead to the congestion of the communication network information, and these spam messages will eventually paralyze the local mobile phone communication network.
How to deal with mobile phone virus
Mobile phone virus is a malicious program that can run in the operating system of mobile phone platform. Different from viruses in computers, mobile phone virus attacks not only destroy the system itself, but also maliciously operate and destroy the unique functions and components of mobile phones, which seriously affects the normal use of mobile phones by users.
First, you need to log in to official website, the mobile phone manager of Tencent, and download and install the latest version of the mobile phone manager on your mobile phone. After downloading and installing, open the phone manager and click "Open Now" at the bottom to enter the main interface. Click Security Protection at the bottom of the screen, and then click Virus Detection.
In the "Virus Detection" interface, click the "Settings" button in the upper right corner of the screen. In "Settings", you can choose "virus scanning mode", in which "smart scanning" is to intelligently select fast or comprehensive scanning according to the situation of the mobile phone; "Quick Scan" is the key position of scanning, and the software has been installed. "Full scan" is to add malicious file scanning, which takes a long time. In general, "full scan" can better detect viruses.
Click "Update Virus Database" to scan the latest viruses on the market most accurately after the update. After completing the relevant settings, choose to return to the "Virus Detection" interface to perform "Virus Scanning". Wait for the scanning process and get the scanning results: one result is security, and the other result is the discovery of dangerous software. If you encounter dangerous software at this time, click "uninstall" to remove the virus.
Further reading
Mobile phone virus is an infectious and destructive mobile phone program, which can be detected by anti-virus software or uninstalled manually. Mobile phone viruses can be spread by sending SMS, MMS, email, browsing websites, downloading ringtones, using Bluetooth transmission, etc. , it will cause users' mobile phones to crash, shut down, delete personal data, send spam, reveal personal information, automatically make calls, send short (color) letters, etc. , and even damage the hardware such as SIM card and chip, resulting in the abnormal use of the mobile phone.
Development history
At that time, the mobile phone company Movistar received a large number of harassing text messages called "Timofonica" sent by computers. The virus sends spam messages such as swearing to users in the mobile system of Telefonica, a Spanish telecommunications company. In fact, the virus can only be regarded as a text message bomb at most. The real mobile phone virus didn't appear until June 2004, that is, the "Cabir" worm virus, which was copied by Nokia s60 series mobile phones, and then kept searching for mobile phones with Bluetooth installed. Then the mobile phone virus began to spread. Mobile phone viruses are inspired and influenced by PC viruses, and there are also so-called mixed attacks. According to the survey of McAfee, an IT security vendor, in 2006, the number of mobile phone users who were attacked by mobile phone viruses reached about 83%, a five-fold increase over 2003.
principle of operation
The software in the mobile phone, embedded operating system (the operating system solidified in the chip, generally written in JAVA, C++ and other languages) is equivalent to a small intelligent processor, so it will be attacked by viruses. Moreover, short messages are not only simple words, but also include ringtones, pictures and other information, which need to be interpreted by the operating system in the mobile phone and then displayed to the mobile phone users. Mobile phone viruses invade mobile phones by virtue of loopholes in software systems.
In order to spread and run mobile phone viruses, mobile service providers need to provide data transmission functions, and mobile phones need to support advanced programming functions such as Java. Many mobile phones with Internet access and download functions are likely to be invaded by mobile phone viruses.
mode of transmission
Spread through Bluetooth: Kapoor virus will modify the system settings of smart phones, and automatically search whether there are loopholes in neighboring mobile phones and attack them through Bluetooth.
Infecting mobile phone executable file on PC: After Velasco virus infects computer, it will search SIS executable file on computer hard disk and infect it.
Spread using MMS multimedia messaging service:.
BUG attack by mobile phone: This kind of virus generally runs on the "EPOC" of portable information equipment, such as "EPOC- alarm" and "EPOC-BANDINFO". One ","EPOC-fake. " "EPOC-ghost. A "and" EPOC- ignition. One ".
Attack object
1. Attacks Internet content, tools and services that provide services for mobile phones.
2. Attacking WAP server makes WAP mobile phone unable to receive normal information.
3. Attack the control "gateway" and send spam to the mobile phone.
4. Directly attack the mobile phone itself, making the mobile phone unable to provide services.
5. Destroy the mobile phone application, try the software or the game can't run normally.
6. Stealing mobile phone privacy information and infringing on personal privacy.
harm
1. User information stolen.
Nowadays, more and more mobile phone users store personal information on their mobile phones, such as personal address book, personal information, schedule, various network accounts, bank accounts, passwords and so on. These important materials will inevitably attract the "covet" of some people with ulterior motives, who will write various viruses to invade mobile phones and steal important information from users.
2. Disseminating illegal information.
The popularity of MMS promoted the initial spread of pornographic and illegal pictures, sounds and movies.
3. Destroy the mobile phone software and hardware
The most common harm of mobile phone virus is to destroy the hardware and software of mobile phone, which leads to the failure of mobile phone to work normally.
4. Causing paralysis of communication network
If the virus infects the mobile phone, it will force the mobile phone to send junk information to the communication network where it is located, which will inevitably lead to information congestion in the communication network. These spam messages will eventually paralyze the local mobile communication network.
- Related articles
- Brief introduction of "Zhang Die" incident
- How do 360 security guards recover short messages?
- How to make a printed copy of the online verification report of the student status of the Ministry of Education?
- How does BOC personal online banking open SMS reminder for deduction?
- Where is Luoyang SMS platform? Ask for recommendation
- How to check the balance of funds and credit cards?
- How to make an appointment for 2022 Neijiang Tomb-Sweeping Day Cemetery (Neijiang Qingming Memorial Appointment)
- Article 80, paragraph 2, of the Anti-Terrorism Law
- Among the C network SMS rates, what is the rate standard for MMS?
- Email SMS verification exceeded 126.