Traditional common malicious code on the Internet, that is, we often mention the "worm", is looking for a new "host."
As mobile phones become increasingly powerful, malicious code attacks on a serious threat to these devices is growing, and computer criminals and further proof of this --- they used an improved version of iPhone (mobile Internet), the shortcomings, spread a programming theft Bank Information worms. Some experts said the worm may mark the invasion of criminals are more mobile devices access.
Crack version of iPhone has been a small number of "worms suffering"
Several researchers reported that the security firm, called "Ikee.B" or "Duh" of the new worm, can be installed on the iPhone using an improved version of the software's default password to spread. Once the equipment victim, the worm begins to crawl text messages, and search the bank for at least a bank authorization code, then the code sent to a central server. Earlier, another iPhone worms have appeared. Fortunately, it is only using the same password flaw to spread itself, but it does not attempt to steal personal information.
"The bank (attack) on the mobile device is very strange", antivirus company Sophos senior security consultant Charles Tovissi Kwasniewski (Chet Wisniewski) said. "It walk through your cell phone, get all your text messages and send them to a server in Lithuania."
It is understood that the worm will only cause inconvenience to a few people. Because of its attack affects only a small part of the content is modified, the software can be run on the ratified "cracked" version of iPhone. However, this does not mean that most of the iPhone is absolutely safe. Some researchers said the worm proved that their attacks can also "evolve" to harm more terminals. In addition, computer criminals are targeting portable devices, personal information and financial information to make such software more dangerous.
Smart phones more vulnerable
This summer, the Las Vegas Black Hat security briefing meeting, the Independent Safety Evaluation Association (IndependentSecurityEvaluators) consultant Charlie Miller (CharlieMiller) shows a cell phone text message to a remote attack by the methods iPhone. Miller said the goal of computer criminals to find out cell phone is only a matter of time, it will greatly expand the potential size of the virus.
"A more powerful worm will appear in Google's Android phones, Apple iPhone, and all other mobile phone. As more criminals involved in the invasion of how mobile phone platform, these devices will be attacked." Charlie m Le says.
Select smart phones, you should be prepared to bear such risk. iPhone and other smart phones, easily become a lawless molecular force's aim is similar to mini-computers --- they are often connected to the Internet, run third-party applications, and storage for computer criminals have the potential value of information.
Worms, all-pervasive
"Worms 'development' will continue." Miller said, although current research iPhone attack code, until a major outbreak of the worm is still a long way to go, such as the new worms are easily found, but in addition to the wireless network to transmit data, aggressive to infection than other phones, it can quickly consume the phone battery victims.
"Duh mentioned above Ikee.B or worm, the earliest dating back to 2000. To 2004, the first mobile phone worm Cabir special attack release. It can automatically between the Nokia Symbian mobile communication systems."
In 2006, the University of Toronto and Microsoft researchers showed that even among the close-and short-term mobile phone Bluetooth connection, in theory, can also be used for wireless worms. "Once the open Bluetooth, found loopholes in the outbreak of the worm is easy. An infected device in a busy shopping district in the city, in theory, can be opened by other Bluetooth-enabled mobile phones, to explore a large number of potential victims." Researchers so said.
Recommended links:
Smooth surface reflection effect oval button making techniques
Dreamweaver's CSS layout examples ul and li
Liu Liu Jiren, Etc. On New Overseas Opportunities: Pie Or Trap
Best Install And Setup
Recover your sim contacts
How to strengthen the promotion effect of media and public relations?
MKV To PSP
Hot SCIENCE Education
Chen Mei: The Change In Self-perfection
Articles about Games Simulation
Clocks And Alarms Guide
The fate of Sina and Sohu, Sina too poor to only ads
Open-source Third-polar World
On The Issue Of AutoCAD Customization In The Linear
RM to AVI
AVI to FLV
No comments:
Post a Comment