Xinhua News Agency, Tianjin, November 27 (Reporter Zhang Jianxin) The National Computer Virus Emergency Response Center recently discovered through the Internet in the net operation that nine illegal mobile applications exist in the mobile application publishing platform, and the main hazard involves malicious deduction. , privacy theft, malicious transmission, tariff consumption and rogue behavior.
These illegal and harmful mobile applications are as follows:
1, "E malicious deduction" (version V6.6.0) This mobile application, without the user's knowledge, through the covert execution and other means, ordering various types of charging services or using mobile terminals to pay, resulting in user economic losses.
2, "1000 kinds of death law" (version 1.1.2), "every day candy cane elimination" (version 2.1.2) two mobile applications without the user's knowledge, obtain user personal information, resulting in user privacy leaks .
3, "Little Pig Peggy's Story" (version V2.3), "MX Live" (version V1.1.1) These two mobile applications have dangerous behavior codes, privately spread through replication, infection, etc., seriously interfere with mobile phones Normal use may result in user tariffs.
4, "ScreenHero" (version V2.1.5) This mobile application, without the user's knowledge, privately make calls, send text messages, etc., resulting in user traffic consumption and tariff losses.
5, "Green Corps" (version V1.0), "Pellet Bubble Ball" (version V1.02), "Elevation" (Version V5.1.30) three mobile applications contain malicious advertising plug-ins, anonymous pop-ups Push ads, which seriously interfere with the normal use of mobile devices.
In response to the above situation, the National Computer Virus Emergency Response Center reminds mobile phone users not to download these illegal mobile applications first, and to avoid unnecessary security threats to the mobile operating system. Secondly, it is recommended to open the "real-time monitoring" function of the anti-virus mobile application in the mobile phone to actively defend the operation of the mobile phone, so that the unknown virus intrusion can be monitored at the first time.
0 comments:
Post a Comment