Joke Collection Website - Public benefit messages - Is your mobile phone information safe?
Is your mobile phone information safe?
What information may be leaked by mobile phones?
1. Address books, passwords, text messages, phone calls and photos may all be stolen.
2. Personal information on the mobile phone includes location information, communication information, account password information and stored file information. Among them, communication information includes address book, call record, short message, etc. The file information stored in the mobile phone includes photos, recordings, videos and other files. In addition, some hardware information of mobile phone, such as INEI number, Mac address of wireless network card and hardware configuration information, also belong to the category of personal information.
Experts warn that "infringing on the personal information security of mobile phones" is not only stealing users' address books, text messages and photos. At present, some applications secretly collect users' location information, mobile phone online records and other information, which seems inconspicuous, but in fact, analyzing users' habits based on these information has great commercial value and may also become the target of infringement. Moreover, this kind of infringement is relatively hidden and should not be detected.
What are the leakage channels of mobile phones?
1. Mobile Trojans and malware are the most dangerous: privacy stealing Trojans will monitor and upload to total recall, and some seemingly ordinary software may read private messages.
2. According to Li Tao, vice president of 360 Internet Security Company, the main ways of infringing mobile phone information at present include not only buying mobile phone user information offline, but also obtaining personal information through fraudulent phone calls, mainly through mobile phone Trojans and malicious software. The latter is becoming an important way for criminals to obtain personal information of mobile phones.
3. In addition to malicious fee deduction, stealing users' privacy has also become one of the main hazards of Trojans. Some representative privacy stealing Trojans steal private information such as SMS, IMEI, browser accounts, spy on and monitor users' actions, and sell relevant information to related businesses.
4. Improper handling of used mobile phones will also lead to information security leakage.
What security problems will be brought by mobile phone viruses and Trojans that users are most worried about?
1. Deduction and suction fees. 2. Steal all kinds of account information. 3. damage the mobile phone. 4. Steal personal privacy, such as address book and SMS records. 5. harassment. 6. Forwarding a large amount of spam or forwarding information containing viruses.
So, how to protect the security of mobile phone information?
Don't easily check the received spam messages, MMS, emails or click on the links in the above information; Install firewall, antivirus software, etc. When wireless transmission functions such as Bluetooth are not applicable, try to turn it off, and choose a trusted access point when surfing the Internet through WIFI to reduce the risk of hackers invading through Bluetooth or WIFI; Don't let untrustworthy people or institutions install software at will, don't download and install software on unreliable websites, and update the software to the latest version; Avoid giving your mobile phone to others for safekeeping, and it is best to set your mobile phone password or PIN code.
Nowadays, people use mobile phones more and more frequently, so how to deal with these unused old mobile phones? Don't throw away or sell old mobile phones at will. Especially those confidential old mobile phones, they may have problems, and you plan to sell or throw them away. Don't do this, some people can recover your data, and there are hidden dangers that you can't predict.
Don't send verification code to others at will. Nowadays, many mobile payment will get the verification code and send it to your mobile phone. At this time, don't trust others. Verification code can be said to be an important line of defense for confidentiality. If it breaks through, there may be great consequences waiting for you.
- Related articles
- How much is the salary of Nanchang subway station attendant?
- Statements like leadership learning.
- With what, express delivery can not be delivered to your door?
- China Postal Savings Bank sent me a text message on 20 15 12 19 and deducted my account. How much is the social insurance fee in 240 yuan? I haven't handed it in myself.
- Thank you for what you said at the party.
- How to get to Suzhou blood station from Luzhi
- Congratulations on the renovation of the new house.
- I am Unicom card. I can answer the phone and receive text messages, but I can't send text messages. What happened?
- How to cancel JD refund application
- Advantages of Internet marketing, how can enterprises achieve accurate drainage with the help of the Internet platform?