Popular Posts

Tuesday, September 13, 2011

Two new vulnerabilities in "Somali pirates involved" attack of tablet pc (figure)

Beijing August 28--rely on nov.19 violence exorbitant profits, the typical when the Somali pirates. Nowadays, mobile phone and began to follow the Trojan horse "violence aesthetics", obtained through illegal means after management authority can complete control of your mobile phone. Recently, the 360 mobile phone cloud security center intercepted the first use of Android GingerMaster holes of the latest attack "Somali pirates" trojans, 90% of smart phones and part two tablet computer will be under attack. At present, 360 mobile phone guards already can complete cure and intercept.

It is reported, GingerMaster vulnerability is Android system is the latest in holes, exists in Android 2.2, 2.3 and 3.0 three platform. Android 2.2 and 2.3 version is the Android smart phones, accounting for mainstream series version of Android smart phone, more than 90% of the terminal. Android version 3.0 is including acer, asus, MOTOROLA, high-end Android tablet computer parts of the system, that is, most of the Android smart phones or even part of the tablet computer will have been "Somali pirates" Trojan attacks.

360 mobile phone security expert introduction, this found "Somali pirates" Trojan horse is the first use of GingerMaster holes of Trojan, very serious harm. Not only can be illegal for mobile phone access, forced boot from root start, forced interconnection, steal and upload the IMEI phone users, SIM card information IMSI, privacy, will also be virus disguised as a component PNG image, continuously from the background mass download, install malicious plug-ins. The whole process without any hint, the user doesn't know, cell phone traffic is much at the same time, even to damage the system integrity, affect the normal use of mobile phones.

At present, 360 mobile phone guards has set up a file in the first time killing and completely, the user as long as update to intercept the virus or download the latest version of the 360 mobile phone guards can completely eliminate Trojan intrusion.....

To this, the 360 mobile phone users to put forward the following Suggestions, can effectively avoid men: mobile phone

1, buy the phone please try to choose large regular stores, in the counter to try the phone please use at present only can effectively killing firmware Trojan 360 mobile phone guardians of mobile phone security scanning, ensure oneself buy a mobile phone is not exist suck fee Trojan;

2, in the choice of application download sites, should try to choose large credible, such as Google official site or 360 mobile phone market such as necessary after artificial detection absolute safety of software, and form the habit of physical examination; often mobile phone

3, the openness of the Android platform to provide the conditions of the Trojan horse concealed, if users need to solve obtain root access to mobile phone brings greater freedom, so had better install 360 mobile phone has cloud security guards intercept function mobile intelligent security software, a key defense initiative and killing, not give Trojan favour.

Add: "Somali pirates" Trojan harm

Malicious use Android system vulnerabilities, obtain root privileges;

No hint it without the background, IMSI, SIM card IMEI information, cell phone hardware configuration parameters such as information privacy;

The background to download and install a silent spam, serious consumption, mobile phone flow influence the running speed of the cell phone;

Remote access server instructions, installation and unloading server designated procedures, without any hint;

Will the virus disguised as a component, i.e. the PNG image automatically run the script, realize automatic operation, long-term open background service, serious to slow down the system operation;

The background for frequent connections for domain name. Mustmobile.com of Trojan server for attack instructions, continues to cause harm to the mobile phone users.

No comments:

Post a Comment