mobile malware took off in 2011 . that is when hackers began serious attacks on mobile phones,says David EMM,principal security resears At手机恶意软件从2011年开始迅速发展。网络安全公司卡巴斯基实验室(Kaspersky Lab)的高级安全研究员David Emm表示,当时黑客们开始乘机反击手机。“at that point,the data became worth stealing,and since then growth has been exponential,Mr EMM says . he estimates 1m new malicial”“the actual number of attacks is much bigger than this beces Rogram tends to be used many times。”当时手机数据似乎有被盗的价值,此后手机恶意软件迅速增长到了圆形指数级,”埃姆说。
他估计,2015年期间发现了100万个新的手机恶意代码。”实际反击次数要比这个大得多。因为每个程序经常被多次使用。
“Early attacks focused on causing handsets silently to call premium rate numbers . then hackers diversified into phishing-creating spoof www早期的攻击方式集中在手机秘密电话费用昂贵的电话号码上。之后黑客们换乘网络钓鱼3354,利用欺诈网站公开账号和说明资料。
phishing still accounts for the overwhelming number of attacks on mobiles,says Mr EMM,Although ransomware-locking data and demandie埃姆表示,虽然网络钓鱼仍然占手机反击的大部分,但勒索软件(针对数据,拒绝支付人才)的比例也相当大。卡巴斯基的研究显示,勒索软件占涵盖所有平台的恶意软件的17%。most phone attacks are on handsets that use the Android operating system because of its large market share and flexible,Open technology.apple大部分对手机的反击都是以装有Android操作系统的智能手机为目标,苹果(Apple)Iphone上搭载的系统使用专有技术沦陷的可能性更大。
”Android is like having a room with lots of doors as opposed to a cave with a single entrance,“Mr emmsays.but apple is not immune但是苹果也不是免疫系统。In 2015是Many app developers unwittingly downloaded a malicious version of Xcode-apple ' s official tool for building apps-from a fromalthough apple vets The apps sold through its app store,The infected programs were not initially detected . they were made available and widely unit mobile phone security is challenging because devices are designed to connect in many different ways,says Ben Johnson,Chief security strays“whether it is a text message,email,web browsing,Bluetooth or near-field communication(NFC)connectivity,each message安全软件“文本短信、电子邮件、网页、蓝牙或近距离通信技术(NFC)等所有通信方式都有可能沦为反击路径”。
as human interaction is the main purpose of a mobile device,Mr Johnson adds,There are more chances to trick users。“people are much More likely to click on malicious images or videos sent to a mobile phone than to a PC,Because It Feels More Familiar and Natural约翰逊表示,人们之间的互动已经成为移动设备的主要目的,因此在手机端有更多的机会收购用户。
“与电脑相比,在手机页面上故意拍照或视频的可能性更高。因为更了解,一起选择。”phones are also often set to connect automatically and display quick preview images,Data or text。“this makes it possible to exploit a system without the recipient opening or ' clicking ' anything”Mr Johnson San导致恶意软件不被收件人关闭或进入‘page’页“约翰逊称之为‘page’。
“defending against the most serious attacks is difficult,says Ian Evans,A vice-president and managing director at VMware airwatch。”if the main source of the threat is a nation state agency,You ' re best to just throw your phone away。
“VMware airwatch公司副总裁兼董事总经理伊恩埃文斯(Ian Evans)表示,很难抵抗技术含量最低的反击。”如果主要威胁来源是什么国家机关,你最不能扔手机。“霍华德,Simple steps can help against more common hackers . you should use a passcode or complex pin on your device to protect it in case of loss or theffand it is best to avoid connecting to public wifi networks . if the wifi is not encrypted,Somebody could intercept data including passwords . if yood“这是阻止连接到公共WiFi网络的最坏情况。如果wifi不加密,其他人可以屏蔽个人数据,包括密码。
如果你强迫公共wifi连接,请确保它总是用于连接虚拟世界专用网络(VPN)中脆弱的资源。”Also,do not " jailbreak " your mobile devices,He says . this is a process where by users remove operating system restrictions so thate“jail breaking negates your warranty and exposes you to more potential malware,says keiron shepherd,Senior security specialist at”还说不要从——“逃离”移动设备,逃离意味着退出售后服务权利,将手机暴露在更好的潜在恶意软件中。
“网络安全公司F5 Networks的高级安全专家Geiron Shepherd称之为“Keiron Shepherd”。phones with hardware-based encryption tend to offer stronger protection than software encryption,Says Mr evans。“the encryption key is stored on a chip,which acts like a safe。”but Android handsets continue to lack dependable hare "加密密钥像保险柜一样存储在芯片上。
"但是根据他的说明,Android手机仍然缺乏可靠的硬件加密手段。some times phones are compromised during production,As happened in 2014 when a factory-installed“trojan horse”was found on the star就像2014年Star N9500智能手机发现笔记本电脑“特洛伊木马”一样,手机在生产过程中也有已经植入恶意软件的情况。
(威廉莎士比亚、特洛伊木马、特洛伊木马、特洛伊木马、特洛伊木马、特洛伊木马、特洛伊木马)这款Android手机产自中国,在亚马逊(Amazon)和易趣等平台销售。黑客可以通过特洛伊木马远程操作手机,但特洛伊木马在映射工厂笔记本电脑的软件中无法整理。the next battle ground between hackers and phone owners will be biometric data such as thumb prints,iris or voice profile.at present,heCause there are many easier paths,Says Mr shepherd。
“this is likely to change。the problem is that if your password is discovered you can quickly change it,Whereas once biometric data are compromised,that's it .黑客和手机用户之间的下一个战场将是生物特征数据,如拇指、虹膜和语音。Shepherd表示,目前黑客很少利用生物特征来突破手机安全障碍。
因为有很多更容易的突破。“这种情况很有可能会改变。问题是,如果你的密码被别人知道,你可以迅速更改密码,但一旦提供生物识别信息,就结束了。
本文来源:开云官网手机登录-www.51400vip.cn