All articles(网络文学目录) All Pictures(图片目录) All Softwares(软件目录)

 
“Eavesdropping thieves“ second generation Trojans were intercepted,

Writer: qq Article type: IT Message (IT资讯) Time: 2014/6/15 9:07:11 Browse times: 306 Comment times: 0

“Eavesdropping thieves“ second generation Trojans were intercepted,


Head photo

Go homepage
Upload pictures
Write articles

"Eavesdropping thieves" second generation-eavesdropping thieves caught Trojans second generation Trojan, Trojan-IT news "Eavesdropping thieves" second generation Trojans intercepted

"Eavesdropping thieves" were intercepted before the second generation, new variants of Trojans. The Trojan disguised as including WiFi, dial-up, and the master key as many as 141 popular applications such as Taobao, eavesdrop on phone calls, QQ chats, can even intercept mobile phone screens.

Mobile security experts have found that after a mobile phone users to download and install these malicious applications, mobile desktop and no new icon, malicious programs impersonating system applications, through post restart, timer triggers, triggered SMS implementation in three ways-hacking evil.

According to understanding, and "eavesdropping big stolen" generation compared to, II generation not only can stole recorded phone user calls and upload, also can will contact list, and calls records, and SMS, and pictures, and location information together packaged away, what, "eavesdropping big stolen" II generation also will timing interception phone screen and upload, once phone user is entered bank card, and micro letter, and micro Bo, account and password, was "eavesdropping big stolen" II generation cut screen gets sensitive information, consequences will contemplate.

In addition, "hacking thieves" second generation can still steal QQ chat messages, groups, messages, friends lists, mobile QQ users ' privacy was swept away.

"Eavesdropping thieves" second generation is very deceptive to users. Mobile security expert points out that the Trojan used the normal cheat mobile phone users to download software name, and disguised as a system pre-installed applications, looks like this is the most basic functions of mobile phones, mobile phone users of abnormal, may also hesitate to delete.

Mobile security experts caution that if mobile phone users to find phone traffic is a voracious consumer of such anomalies should be vigilant, likely the eavesdropping Trojan King.





There are 0 records,
Comment:
Must be registered users to comment(必须是注册用户才能发表评论)

Disclaimer Privacy Policy About us Site Map
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.