Joke Collection Website - Public benefit messages - How does the mobile phone virus attack the mobile phone? How to prevent viruses?
How does the mobile phone virus attack the mobile phone? How to prevent viruses?
Virus SMS or garbled phone calls
This is the main attack mode of mobile phone virus at present. At present, mobile phone viruses mainly attack mobile phones in the form of "virus messages", which makes mobile phones unable to provide certain services. When attacked, the virus will send out a series of virus short messages composed of strange characters. A garbled phone will display garbled code in the caller ID. Once you receive a garbled call, you will be infected with a virus, and all the settings in the machine may be destroyed.
Prevention: Please don't open the short message sent by strangers easily, let alone forward it, and delete it in time. If the keyboard is locked, you can remove the battery and start it before deleting it. If you still can't delete it, you can try to delete the mobile phone card on another model. If the virus keeps occupying memory and cannot be removed, you can take the phone to the manufacturer's maintenance department to rewrite the chip program. When an incoming call shows a vague phone number, the user should not answer it immediately or turn it off.
Trick users into downloading and running.
On August 6th, 2004, Boulaudat virus was discovered. Using the "Broda" virus, the attacker can not only steal the phone number and email in the poisoned mobile phone, but also remotely control the mobile phone and run various dangerous instructions.
Precautions: When using the internet function of mobile phone, try to download information from regular websites, try to download pictures and ringtones from unknown small websites as little as possible, and don't register mobile phone numbers on some websites at will to avoid being infected with mobile phone viruses. Mobile phones that can browse the web should try not to browse personal, hacker or pornographic websites. Don't install mobile phone programs of unknown origin at will.
Spread through bluetooth
In June 5438+February 2004, Kapoor virus was discovered in Shanghai. This virus will modify the system settings of smart phones, so that users will run this virus first every time they turn it on. At the same time, it will automatically search the neighbor's mobile phone for loopholes and try to attack it through the Bluetooth module of the mobile phone. In addition, the virus will release multiple virus bodies in the system directory of Symbian operating system.
Note: Mobile phone users with Bluetooth function can set the Bluetooth function attribute to "hidden" to avoid being searched by viruses. When using Bluetooth, infrared and other "wireless transmission" functions to receive information, we should pay attention to selecting safe and reliable transmission objects. If there is a strange device search request link, it is best not to accept it.
The virus infects the mobile phone executable file on the computer.
On June 5438+1October1day, 2005, "Velasco" virus was discovered. After the virus infects the computer, it will search the SIS executable file on the computer hard disk for infection.
Prevention method: Virus experts advise users to scan SIS files with anti-virus software before sending them to their mobile phones, and then run them after confirming that they are non-toxic. In addition, users try to avoid downloading mobile phone programs and games from informal websites.
Use MMS multimedia messaging service to spread.
Recently, a new way of virus transmission has been discovered. On April 4th, 2005, an American anti-virus manufacturer, F-Secure, said that mobile phone viruses used to spread through Bluetooth, but now they can also spread through MMS service.
Prevention method: Virus experts said that users only need to enter the main menu of the mobile phone, prohibit the application function of CommWarrior, and then delete the directory where the virus is installed, so as to remove the virus. Security companies F-Secure and McAfee have given the directory location where CommWarrior virus is installed in infected mobile phones.
Use BUG (vulnerability) attacks in mobile phones to directly destroy the functions of mobile phones.
This kind of equipment runs on the "EPOC" of portable information equipment such as mobile phones, such as "EPOC- alarm" and "EPOC-BANDINFO". One ","EPOC-fake. " "EPOC-ghost. A "and" EPOC- ignition. One "and so on. , the main performance is constantly issuing warnings; Change the user information to "some fool owns this"; When the formatted built-in hard disk is displayed on the screen of the mobile phone, the screen is just a display; Keep the background light flashing continuously; The most serious thing is to lose the keyboard operation function of the mobile phone.
Prevention method: For users who will buy mobile phones, it is best to know which models of mobile phones have bugs before buying, and try not to buy mobile phones with serious bugs. Since there is really a mobile phone virus (that is, there are few viruses that directly attack mobile phone vulnerabilities), don't worry too much.
Of course, mobile phone virus software has to be mentioned as a preventive measure for mobile phone viruses. Users can download and install mobile phone antivirus software directly from well-known domestic antivirus websites such as Jinshan and Rising. Some mobile phones have already purchased mobile phone virus software, and mobile phone users can omit this step. If the user has been infected with the mobile phone virus, please immediately delete the virus application and reinstall the infected application. If it still can't be used, you should contact the mobile phone service provider as soon as possible to disinfect the mobile phone through the wireless website or through the IC access port or infrared transmission interface of the mobile phone.
Respondent: yihzq- scholar level 3 4-22 12:47
Is mobile phone virus the same as computer virus?
Mobile phone virus, like computer virus, is also a computer program, which is contagious and destructive. Accurately speaking, computer virus is a close relative of mobile phone virus, which is connected by blood. Cell phone viruses are as harmful as computer viruses.
Theft of important information: If the mobile phone is infected with a virus, the information on the mobile phone may be stolen. Mobile phone virus will delete or reveal personal address book, personal information, schedule, various network accounts, bank accounts, passwords and other important information. Stored on the mobile phone.
Spreading illegal information: The MMS function of mobile phone can bring us a lot of fun, but it also opens the door for the spread of pornography, illegal pictures, sounds and movies.
Damage to software, hardware and network: the biggest harm of mobile phone virus is to damage the software and hardware of mobile phone, which may cause the mobile phone to fail to work normally, and may force the infected mobile phone to send information to the network continuously, resulting in information congestion in communication network and paralysis of local network.
As far as some mobile phone viruses are concerned, although they are not as harmful as computer viruses, they are increasingly threatening us. With the development of mobile phone technology, mobile phone virus and computer virus are likely to become a complex, regardless of each other.
Will mobile phone viruses spread as widely as computer viruses?
In addition to computer viruses, mobile phone viruses have many sources of infection. In addition to sending emails and browsing websites, you can download the infection, and you can also spread it by sending short messages, multimedia messages and downloading ringtones.
Moreover, at present, mobile phone viruses have begun to spread automatically and widely like computer viruses. The mobile phone infected with mobile phone virus will automatically send SMS and MMS with virus to all numbers in the phone book. Mobile phone users will be infected once they view this information.
- Related articles
- Can Huawei watch gt2 be used alone without a mobile phone?
- Block text messages
- What is the telephone number of Qingdao Tianyi Ren and Smart City Marketing Center?
- Entrustment agreement for sending short messages on behalf of others
- Party branch general election slogans
- How to find a week's short message?
- What are the men's sports brands?
- What is the classic aesthetic mood of the Spring Festival background picture?
The Spring Festival is a new beginning of the year. Every spring festival is the time for us to go to the old and we
- Classic SMS
- How many days is the May Day holiday?