Tuesday, December 7, 2010

Mobile evil trick and deal with big soft totals

As the popularity of the Smartphone and mobile phone applications, people's lives become increasingly dependent on cell phones, and also with no troubles, privacy is stolen, call flow of inexplicable consumption, mobile phone, for no panic, they mostly got trouble to malware and malware spreads are made visible to the camouflage, allowing users to identify its authenticity.

I. name confusion users

1. in a similar system component named

Such rogue software the most typical characteristics is dazzling, the variety names obtained, so that people could not out what features of the software, such as the "Bluetooth" and "process management" and "player", and so on.

Such malware name at first glance like a mobile phone function on a system, which on intelligent machines do not know much of the little white user blind effect is very high.

This type of software in the deleted will pop up a similar prompt "do you remove system components, if you remove the handset resulted in a number of bad impact etc., little white users see with such name when prompted by the software and will question in mind, this thing should not be deleted from the deleted? no phone function is not working properly? system software is generally no problem right? so doubt let such malware muddle through, they secretly in the background, send text messages.

2. usage of the addon English name, as in the following figure is the usage of the Nokia system plug-in name of malicious software

Problem software

2. fishing software

The so-called phishing software is the same as the name and official software, the interface also identical, have reached confused as real ones, and then wait for the user hooked, to steal user account passwords and other personal information, similar to a phishing Web page.

To a phony QQ reading of malicious software, for example, the following figure:

Compare official QQ reading software.

On the surface, has been very difficult to distinguish which one is true, which is false, then how to differentiate the? malware regardless of how camouflage, publishers cannot be disguised, through security program management see Steward.

Compare phishing software QQ reading and the official publisher of the QQ reading, Maoni watch out:

Third, safety steward on malware response

(A) install the protection key lock

For this class of malicious behavior, launch locks key protection, which is installed in mobile phones-spare locking, blocking all program online (online whitelist program) and installation, if a program attempts to lock key networking or installation, safety steward will be terminated, and pop the keyboard lock, as protection of the log, the two figure housekeeper in safety key lock terminated during a Setup behavior and networking behavior:

(2) Publisher blacklist

Security Manager through the hundreds of thousands of users to report information is consolidated and repeatedly tested, finishing a Publisher blacklist, these publishers issued a large number of malicious software, give users a great harm.

If the user has installed on the mobile phone is included in this blacklist software, safety steward program management will display the following behavior description to alert the user.

(3) severe critical software strangling mechanism

1. installation protection safety steward in severe critical software installation will terminate its installation, the following figure:

2. If the phone has been equipped with severe malicious software and in the background is running after you install security housekeeper into safe housekeeping main interface will pop up hints:

3. If the phone has been equipped with severe malicious software, and in the background is not running, then enter safe housekeeping program management interface will pop up hints:

Through the above mechanism, to the maximum guarantee users from severe critical software.

No comments:

Post a Comment