All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
Samsung Note7 van 3 deaths caused by the explosion on the way? The truth is,
阿里巴巴投资苏宁,国美股价涨了 - 阿里巴巴,苏宁,国美
你愿意吗?充电不要钱但会看到广告 - 充电桩
“汉语拼音之父”周有光111岁生日:年纪老了,思想不老 - 周有光,汉语拼音
从黄章到周鸿祎,雷军的敌人为何这么多? - 雷军,周鸿祎
Tiananmen Square not only running, Zuckerberg also went to the great wall, Temple of heaven ... ...,
Facebook和苹果做新闻,是在砸媒体的饭碗 - Facebook,苹果,新闻
Online reportedly owed to merchant deposit company, responded: the contract was amended,
海淘党福音,亚马逊Prime会员八折限时出售 - 亚马逊,海淘
股市回暖,科技股普遍上涨 - 科技股,A股,港股
Reading number is top 10 pictures
中国女孩大胆自拍,显露完美身材3
A man's favorite things6
两个妞在等世界上最短的火车
西游日记1
The money of more than 100 countries and regions19
Group of female porn in 《westwards》, uninhibited woman threatened to not the bottom line
Summer is most suitable for young people to travel in China1
Go to the national museum3
Forced sex girl living abroad1
含苞欲放的素颜美少女3
Download software ranking
Eclipse 4.2.1 For Win32
Kung fu panda - the secret of the teacher
Boxer's Top ten classic battle6
C语言教程TXT
Eclipse 4.2.2 For Win64
Boxer's Top ten classic battle2
Boxer Classic video2
Boxer's Top ten classic battle4
jdk1.5
C#编程思想
published in(发表于) 2016/10/9 13:49:55 Edit(编辑)
In this world, there is no “uncrackable“ mobile phone,

In this world, there is no “uncrackable“ mobile phone,(这世界上,根本没有“不可破解”的手机,)

English

中文

In this world, there is no "uncrackable" mobile phone-mobile phone, hack-IT information

Hackers frequently made headlines in recent days, even the United States has become a victim of the Central Committee of the Democratic Party, it cannot help but let us worry about your information security. Meanwhile, we also came up with a question, this world really can't break security cell phone?

Answer, I am afraid it is clear that no matter how manufacturers of smallpox propaganda, absolute secure phone is blowing hot air. Imagine now than 20 years ago, supercomputers are 10 times times more powerful, its installed software by tens of millions of code written into, the developer behind level has reached millions of people, and these developers are the existence of hackers. Therefore, to find vulnerabilities in mobile for the intrepid hacker is not a problem .

Hackers targeting mobile devices

In recent years, cyber crime gangs were targeted towards mobile devices, threaten the safety of consumers and enterprise users, in order to solve this crisis, new mobile security market came into being.

No matter what phone you use, download application how long all in mind. For example, hackers recently developed with malicious monitoring software of the Pocket Monsters GO, once you've accidentally downloaded, may become a hacker's lunch.

Users to build awareness of self-protection are indeed very important, after all, in front of the landing Mall, again filtered scan only hard to exclude all risk. In addition, the malicious application picked security personnel found a loophole to drill, people caught off guard. Meanwhile, a large number of weak regulation of the app store, it is a hotbed of this kind of application.

In addition to a variety of malicious applications, the silent threat of more terror, they just send you a message or mail, delayed once you link, it will trap for hackers. Unfortunately, such attacks are found only after the hacker succeeded in General, security personnel have been unable to prevent, has been the criminals lead you around by the nose. Therefore, before a hacker can exploit is blocked against a large number of users.

Android and iOS are not absolutely safe

Is in need of attention, based on the Android platform called "secure encrypted" phone are wide of the mark . Android is Google's carefully crafted mobile operating system, but the platform vulnerabilities will not be less than 500 each year. Even if Google continues push to block loopholes, this trend there is no sign of slowing down. With the increase of Smartphone applications and features, hackers found vulnerabilities in the future will be more and more.

Data show that only in August this year, An Zhuoping 42 vulnerabilities are exposed on the stage, and diligent in upgrading Nexus devices are not immune. In July this year, the vulnerability is as high as 54.

However, loopholes can't blame Google, because the study found that half of these vulnerabilities has nothing to do with the Android operating system, hackers are found in their firmware. These firmware vulnerabilities in software running, through which hackers can hijack the phone's camera, WiFi, sound volume, screen, Bluetooth or USB interface. Because vendors use different parts, so security personnel not to exclude these issues one by one.

In addition, due to the fragmentation of the Android camp is serious, 65% machines are running older versions of the system, and the lack of maintenance of these systems, vulnerability a lot.

IOS system although the situation a little better, but cannot escape the hacker's clutches, Apple can only run to patch the vulnerability. For example, only in July of this year, Apple patched the 29 holes, solved 46 questions. In August this year, hackers are using Israel company NOS spyware infiltration into the iPhone and stole a large amount of data.

Keep in mind the most important

For those of you who likes to rub at the airport and the hotel network, danger is everywhere. Hackers will steal your certification via a Web page e-mail, passwords and Web browsing records. Therefore, travel must be alert, do not connect these anonymous networks.

However, these reminders for network security can only be a drop in the bucket, pervasive hackers will always find a breakthrough. So don't believe what manufacturers call "uncrackable" mobile phone information, usually keep an eye out than what works when using mobile phones.


这世界上,根本没有“不可破解”的手机 - 手机,破解 - IT资讯

最近一段时间各种黑客事件频频登上头条,就连美国民主党中央委员会都成了受害者,这不禁让我们担心起自己的信息安全。同时,大家也萌生了一个问题,这世界上真的有破解不了的安全手机吗?

答案恐怕很明显,无论厂商如何天花乱缀的宣传,绝对安全的手机都是吹大话。想像一下:如今的手机比20年前的超级电脑都要强大10倍,其安装的软件由数千万条代码写就而成,背后的开发者达到了百万人级别,而这些开发者中就不乏黑客的存在。因此,想要找出手机中的漏洞对强悍的黑客来说根本不是问题

黑客盯上移动设备

近些年来,网络犯罪团伙正在将目标逐渐转向移动设备,威胁着普通消费者和企业级用户的安全,为了解决这一危机,新的移动安全市场应运而生。

无论你用的什么手机,在下载应用前都应该多长个心眼。举例来说,黑客最近就开发出了含有恶意监视软件的《口袋妖怪GO》,一旦你不小心下载了,可能就会成为黑客的盘中餐。

用户建立起自我防范的意识确实非常重要,毕竟在应用登陆商城前,只进行一遍过滤扫描很难将所有危险排除在外。此外,那些恶意应用专挑安全人员没有发现的漏洞钻,让人防不胜防。同时,大量监管薄弱应用商城的存在,更是成为此类应用的温床。

除了各种恶意应用,那些无声的威胁更加恐怖,它们只是发送给你一条信息或邮件,一旦你误点链接,就会中了黑客的圈套。不幸的是,此类攻击一般在黑客得手后才会被发现,安全人员无法进行预防,一直被罪犯们牵着鼻子走。因此,黑客可以在漏洞被封堵前侵害大量用户。

安卓与iOS都不是绝对安全的

需要注意的是,那些以安卓平台为基础的所谓“安全加密”手机基本都不靠谱。安卓虽然是谷歌精心打造的移动操作系统,但每年该平台新增的漏洞不会低于500个。即使谷歌在不断努力封堵漏洞,这一趋势也没有放缓的迹象。随着智能机应用和功能的增多,未来黑客能发现的漏洞会越来越多。

数据显示,仅仅是今年8月,安卓平台上就曝出了42个漏洞,勤于升级的Nexus设备也无法幸免。而在今年7月,漏洞则高达54个。

不过,漏洞多也不能全怪谷歌,因为研究发现,这些漏洞中有一半都与安卓操作系统无关,黑客是在固件中发现了它们。这些固件中的漏洞影响了软件的运行,黑客们可以通过它们劫持手机的相机、WiFi、音量、屏幕、蓝牙甚至USB接口。由于各家厂商采用不同的零部件,因此安全人员无法一一对这些问题进行排除。

此外,由于安卓阵营碎片化严重,65%的机器都在运行老版本的系统,而这些系统缺乏维护,漏洞颇多。

iOS系统虽然情况稍好,但也逃不出黑客的魔掌,苹果只能疲于奔命的对漏洞进行修补。举例来说,仅仅是今年7月,苹果就修补了29个漏洞,解决了46个问题。今年8月,黑客则利用以色列公司NOS的间谍软件渗透进了iPhone并盗走大量数据。

自己留个心眼最重要

对于那些喜欢在机场和酒店蹭网的人来说,危险更是无处不在。黑客们会通过网页认证偷走你的邮件、密码和网页浏览记录。因此,在旅行中一定要机警起来,不要连接那些无名网络。

不过,以上这些提醒对于网络安全防范只能是杯水车薪,无孔不入的黑客总是会找到突破口。所以,别再相信厂商所谓的“不可破解”手机的宣传了,平时使用手机时留个心眼比什么都管用。





添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.