Sunday, November 3, 2013

Unaware become wiretap phone

Side of the phone to become unaware wiretap ; thought Apple security sweep of a two-dimensional code, hackers capture the moment ; Renren account with their own landing " sing " APP after application , account information immediately be stolen. Third ongoing Shanghai Information Security Week , this two-day exposure of an individual who may be present around information security "time bomb" , shocking .

( Have you ever thought that when you 're chatting with family or friends, intimate words, his looks that Taiwan is still in the black state of quiet phone, but is playing the role of a wiretap , your conversation will be transferred to the other end of the :

[ I am now the phone is dialing to it , has now switched on . "Hey " , you see it 's interface is virtually no reaction , in fact, live sound I could hear in the distance . We can check again, this interface is also no actual call log. 】

Fudan University , Dr. Young -Min in the scene complete with two Android phones eavesdropping demonstration, also make up a word :

[ General application developers can do this effect , it has become a very low technical threshold . 】

Malicious code , viruses , these non-porous non- hacker technologies fall into more than just Android , and even Apple is not immune . Acer earthquake security research team leader Wang Qi did show some hacker site :

[You just saw in the street there is a two-dimensional code that tells you that you play a game, you can get a prize, you have come to sweep , and now we see that it is the pictures you took it ? ( Yes, yes ) . 】

Apple cell phone at the moment in the move all the photos are displayed on the other side on the computer screen . Moreover , when this phone QQ software , enter the user name and password, the other end of the computer has all the numbers you enter are shown out.

[ This malicious code can do more things further , we have all the problems encountered on the PC , are likely to reproduce the same on the intelligent terminal . 】

Non-formal channels to buy the phone brought pre-installed software , like to download all kinds of APP application , or often use microblogging, letter , QQ account login variety of third-party software , free to scan two-dimensional code , links to strange WIFI these actions are likely to make your smartphone into a hacker 's accomplice. Kaspersky East Sales Director Jiang Jiang Yu reminder , get rid of bad habits and installing mobile phone security software to protect personal information are the most basic protection. In addition, for the lost phone like " after the move " is also very important :

No comments:

Post a Comment