Joke Collection Website - Public benefit messages - What are the security problems of mobile phones?
What are the security problems of mobile phones?
What are the security issues of smart phones?
phishing
Phishing means that criminals send a large number of deceptive spam messages or short messages or instant messaging messages claiming to come from banks or other well-known institutions, to lure the recipients to provide sensitive information (such as user name, password, account ID or credit card details), and then use these information to impersonate the victims to conduct fraudulent financial transactions, so as to obtain economic benefits.
Trojan horse virus
Trojan horse is a hacker tool based on remote control. It is usually disguised as software packages, compressed files, pictures, videos, etc., and lures users to download and install through web pages, emails and other channels. If users open this kind of Trojan horse program, their computers or mobile phones and other electronic devices will be controlled by criminals who write Trojan horse programs, thus causing harm such as information files being modified or stolen and funds in electronic accounts being stolen.
Pseudo base station
Pseudo base stations generally consist of a host computer and a laptop computer. Through the pseudo base station, criminals can search for mobile phone card information in a certain range around the equipment, and pretend to be the operator's base station, pretending to be any mobile phone number, and forcibly sending short messages such as fraud and advertisements to the user's mobile phone.
information disclosure
At present, some small and medium-sized websites have weak security protection ability and are vulnerable to hacker attacks, so many registered users' usernames and passwords are leaked. However, if the user's payment account is set with the same user name and password, it will be easily stolen.
Decompilation modification
APP is equivalent to installing a set of software on the user's mobile phone, which cannot be self-contained. It must call the interface of the server to obtain data before it can be displayed on the mobile phone. Users who have installed the APP have the opportunity to decompile and modify it, so as to deeply study and understand the business logic of the system and obtain any data of the server at will. But the program files of B/S architecture are all installed on the server, and the client can't get any code. The server is protected by firewall, intrusion prevention and other software and hardware security measures, so it is impossible for ordinary users to get several system program files. From this perspective alone, APP applications have no security at all.
Illegal software intrusion
Because mobile phones belong to individuals and are networked, various illegal software may be installed unconsciously in the process of browsing the web and downloading applications. Some unscrupulous manufacturers automatically implant their backdoor software in the background during the process of installing mobile phone applications. These softwares unconsciously steal and eavesdrop on data information in the background, and users may have obtained, analyzed and used these data without knowing it.
Man-made malicious theft of data
Many people in the unit, especially the leaders, are not familiar with complicated installation and configuration operations such as andriod and ios, and often need system administrators or other skilled people to assist them in installation and configuration. If the system administrator is out of his mind and quietly installs eavesdropping or Trojan horse software on his mobile phone, the phone number and work approval of this leader will be illegally obtained in the future, and his personal and even the whole unit will have great security risks.
The security and confidentiality of data are not guaranteed.
People are generally used to setting up automatic login when using mobile APP applications, so that once the mobile phone is used or lost by others, the internal data or confidential information of the office system will undoubtedly be leaked.
The spread of confidential information in this unit is uncontrollable.
Because the mobile phone is mobile, the communication signal is very unstable. All mobile APP applications will generally download system data to the mobile device for storage, so as to realize the continuity of the system. In this way, documents, materials, approvals, etc. , can only be circulated within the unit, and may spread to any place because of mobile phones, posing a threat to the information security within the unit.
The technology accumulation of smartphone operating system is not enough, and there are many loopholes in the system.
Smartphone operating system is full of loopholes. Therefore, mainstream operating systems such as andriod and ios will launch a big version upgrade plan in less than one year, and mobile apps generally cannot be modified and updated in time. If there are security loopholes, it will cause losses to the company's information security.
Expansion: Nine Frequently Asked Questions of Mobile Phone
First, it can't be turned on.
Because turning on the phone is a complicated process and needs to be handled very complicated, this problem will be sent to the maintenance point for specific inspection and handling.
Second, automatic shutdown.
There are many reasons for this situation, such as poor battery contact, abnormal motherboard and too large scenic spots, which will also cause automatic shutdown.
Third, the phone crashed.
Because the cpu utilization rate is too high, it can't dissipate heat in time, which is the cause of the crash. This is because there are too many open programs, and it is also caused by SMS bombing.
Fourth, the mobile phone can be turned on and off normally.
But the service can't connect. There are many reasons involved in this module, and this will happen when there are problems in receiving, transmitting, frequency synthesizer, cpu and software.
5. The SIM card cannot be detected.
This is because the contact area of the card is too small or the card is inserted in a reasonable place.
Sixth, the cell phone signal is good or bad.
Regardless of the interference from the battery and the outside world, it may be that the internal welding of the mobile phone is not firm or broken, or it may be due to the system software (the mobile phone system has not been upgraded but the external one has been upgraded).
Seven, the battery life is shorter.
It may be because the battery is under-charged, the battery capacity becomes smaller, or the battery quality is too poor. The mobile phone is leaking electricity. The frequency of using mobile phones has increased.
Eight, the other party can't hear the sound or hear the sound is very small.
This is because the microphone of the mobile phone has poor contact with the internal circuit board.
Nine, the information was not sent successfully.
This is generally because the information center is not filled in correctly. For China Mobile, the number of SMS center starts with +86 1380, followed by four digits of the area code (telephone area code) where the number is located, such as 057 1 (Hangzhou), and finally it is generally 500. For areas with an area code less than four digits, the area code should be supplemented by 0 in the fourth digit, such as Beijing 0 100.
- Related articles
- Common social hidden rules
- Can nucleic acid be displayed as negative or positive on the national government platform?
- How to isolate the visited epidemic-related risk points?
- Bai Hua sent a text message, and the contract will be returned when it expires.
- How do faithless people take the high-speed rail?
- Can Apple 6 and Samsung s7 synchronize their call records?
- Make sentences with a swift horse
- Comforting sentences
- Do you want to return the Spring Festival greetings?
- Dear friends, please send me some articles about rebirth! ! ! !