In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
In recent years, security threats and attacks against mobile phones have become more and more frequent. All kinds of malicious programs, Internet fraud and privacy theft occur around us every day.
According to the data released by the 2022 China Mobile phone Security report, in 2022, a security software intercepted about 24.079 million new mobile malicious program samples, intercepted about 132.2 billion malicious program attacks, and identified and intercepted about 233.9 billion harassing calls.
Data from Kaspersky Lab also show that from January to September 2022, there were 800,000 spyware attacks on smartphones worldwide, an increase of 29% over the same period last year.
In the face of such a grim situation, how should we carry out mobile phone security protection?
Today, Xiao Zaojun will provide you with some practical suggestions.
1. The rational use of passwords for mobile phones is the most basic, important and effective means of security protection, which must be set.
Many middle-aged and elderly mobile phone users lack security awareness and are not familiar with the operation, so they will not set a password. It is recommended that relatives and friends around you give assistance and guidance.
When setting digital passwords, try to use complex passwords, do not use simple passwords such as "123456" and "666666". Also try not to use birthdays as passwords.
Digital passwords and pattern passwords are easy to be peeped into the screen by others, resulting in leakage, so it is recommended to use biological information passwords (fingerprints, facial scans). Fingerprints are the best to use, and there are too many restrictions on facial scanning.
For common App (low security level) and critical App, it is recommended to use different passwords.
Now many mobile phone manufacturers provide password manager application, unified management of each App password, can be used as appropriate, reducing the burden of memorizing passwords.
For important App applications (such as game accounts, bank accounts), it is recommended to change passwords regularly, or you can use special password tools, such as General NetEase orders.
2. Strengthen software control at the level of mobile operating system software, the operating systems of mainstream mobile phone companies are more mature, more secure, and less prone to problems.
In the past, people used to brush their machines and third-party systems, which is very risky and easy to implant Trojans, backdoors and viruses. Now there are relatively few, basically all the native systems pre-installed by manufacturers.
What often goes wrong is the application of App-like software.
MALWARE, malware
App of unknown source, never install it! Try to install App through the app store that comes with your phone. Some App will apply for other App. It is recommended that all permissions be turned off.
To apply for the authority of App, you should be more careful and grant as little as possible. In particular, it is the most sensitive to apply for permission to read and write documents. Arbitrarily apply for permission of the App, resolutely delete. Unknown software, it is strongly recommended not to install.
3, the anti-fraud source does not answer the phone, the text message does not read, the link is not the main point, this is the basic operation. The National Anti-Fraud Center App must be installed.
Wechat received inexplicable news or blessing links, do not point. All the canvassing links, none of them.
At present, most mobile phone systems have a harassing phone identification function, which can be turned on. If you receive a harassing call, you can also mark it and contribute a little. Operators also have harassment interception function, it is recommended to open as soon as possible.
There is another way to prevent number leakage and harassment of phone calls:
Prepare a rarely used secondary card and fill in the secondary card number every time you fill in the information. In particular, buy and rent houses, engage in decoration, buy building materials and other scenes, try not to use their own main number, otherwise they will be repeatedly sold information, the main number will basically be invalidated.
After renting and decorating, the number can be cancelled. In this way, the main number will not be exposed.
Or, it is recommended that everyone try the cloud mobile phone business.
Cloud mobile phone is equivalent to a virtual mobile phone, with an independent number, you can install applications such as Wechat separately, which is equivalent to creating another identity for yourself. (look here: what on earth is a "cloud phone"? )
4. Regular antivirus use the security software that comes with the system, or the well-known security software in the industry, to protect the mobile phone.
Conduct safety scan of the whole mobile phone regularly (once a month) to clean up hidden dangers.
5. Network side defense in terms of network security, at present, 4G / 5G and other cellular mobile communication networks have high security and are not easy to cause problems.
At present, the threat of pseudo-base stations only exists for 2G GSM networks. Pseudo-base station attacks are most likely to occur at night, so it is recommended to turn off the phone or turn on the flight mode at night. (about pseudo-base stations, see here: in-depth revelation: what on earth is going on with pseudo-base stations? )
Compared with operators' networks, short-range wireless technologies such as Wi-Fi, Bluetooth and NFC are more likely to cause problems.
Wi-Fi in public places can't be trusted, so try not to connect. The Wi-Fi of your own home or company must have complex access passwords and administrators to prevent network intrusion and hijacking.
The Bluetooth and NFC functions of the phone, as well as some functions such as airdrop (spaced drop), should be turned off as much as possible when not in use.
6. Privacy protection in terms of privacy protection, we must have a sense of protection.
When chatting, don't disclose personal information casually (especially to strangers or new friends). When posting on moments, try to avoid revealing your address and whereabouts. Sometimes, when you think of a simple picture, others can interpret a lot of information.
When sending photos, you should pay attention to deleting the EXIF (the parameter attribute of the picture, Wechat chat is deleted by default) information, which sometimes contains information such as shooting equipment and location, which will also be used by people with ulterior motives.
In the chat record, try to avoid the word "password" and avoid being found. Even if the password is sent, it is recommended that the other party know it and withdraw it quickly.
It is recommended to make good use of the friend grouping function of Wechat. Do not open your moments to unfamiliar contacts and newly added friends.
We should learn to use the encrypted folder function of the system to encrypt and hide important data.
Cloud synchronization is very common nowadays, but it is also easy to disclose privacy. When deleting local files and photos, pay attention to whether they are deleted synchronously in the cloud.
To prevent data from being stolen, we must pay attention to the protection of privacy when we make phone calls. Walls have ears, and important information should be prevented from eavesdropping.
Nowadays, the handset of many mobile phones is leaking seriously. During the call, the voice of the other party can also be heard by the side, so it is recommended not to buy it.
It is even more undesirable to blindly turn on sound playback by making phone calls in public places, which belongs to the behavior of giant babies.
7. Once the mobile phone is lost, the mobile phone number will be shut down as soon as possible to prevent the other party from receiving CAPTCHA messages. Mobile phone payment function, banking and financial App, but also try to freeze customer service calls as soon as possible.
At ordinary times, it is recommended to enable the mobile phone search function in advance (the cloud account password of the system bound to the phone must be complicated and keep in mind to prevent it from being cracked and locked by others). It is also recommended to back up the mobile phone data regularly in the cloud to prevent data loss after the phone is damaged or lost.
If you can't find your phone, be sure to log in to the mobile phone manufacturer's cloud platform and remotely erase the data.
When you change your phone normally, you need to log out of the system account and initialize the phone (it is not enough to delete App). Or use reliable replacement software to erase the data completely.
8. Bear-proof children nowadays many parents will give their mobile phones to children to play with. This will bring risks and hidden dangers. Children may click on links randomly, delete important App or data, post Wechat messages indiscriminately, or even send private photos.
At present, in addition to educational guidance and dissuasion, there is no good protective method.
I have seen some mobile phone manufacturers put forward the "visitor function" before, that is, when you log in to the phone with a specific password, you can only turn on a few functions and cannot see private data such as photo albums. I think we can consider promoting it.
9. Mining mobile phone security functions after you buy a new mobile phone, you should pay more attention to the security protection and privacy protection features of the mobile phone.
At present, mobile phone manufacturers provide a lot of technology in the aspect of security, and the consideration is very comprehensive. The Find N3 mobile phone released by OPPO a few days ago also has an independent state secret security chip, which is expected to become a trend in the future.
Rational use of these security protection technologies (some App and functions) provided by mobile phone manufacturers can not only facilitate the use of mobile phones, but also improve the security of mobile phones.
All right, these are Xiao Zaojun's suggestions for the safe use of your mobile phone. If you do it all, your phone will be safer than 99.99% of people.
This article comes from the official account of Wechat: fresh Jujube classroom (ID:xzclasscom), author: Xiaozaojun
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.