recently, the Chinese Industry and Information Technology Ministry (hereinafter referred to as the “MIIT”) formally issued on the mobile terminal into the network management “(draft), mobile phones and mobile Internet industry caused widespread attention.
the notice expressly provided in applying for a network license, the mobile communication terminal manufacturers to pre-installed application software and instructions, manufacturers shall not be preset in the mobile terminal contains malicious code without the user’s consent unauthorized collection and modify the software of the users’ personal information, nor preset without the prior permission mobilize the terminal communication function, resulting in traffic consumption, costs incurred and software information disclosure.
Currently, the Internet giant Baidu, Alibaba the Qihoo 360, including a grand, have announced its entry into the mobile space, and to develop their own system and application presets to your phone . In addition, there are a large number of mobile phone manufacturers in the mobile phone factory pre-installed application. The Ministry of Industry and this is also considered will be intensified domestic smart phone pre-installed heat generated binding.
new era ills reproduce
World Telecommunication Day on May 17 this day, Ai media network organization to edit according to user complaints to download smartphone software testing, and found that many malicious chargeback software.Chang, CEO of
Ai media consulting to the reporter recalled: At that time, they downloaded a cottage Zombies software, and suddenly a window pops up when the user finger “crackling” to play the monster in the game on the screen, the user simply too late to see what the above is not careful to go. After a few seconds, the user receives a text message, suggesting that they had been deducted a few dollars.the
Similarly, there are a number of cottage-cut fruits software when users cut fruit cut is pleased rather abruptly will pop up a window, allowing users to point into and deducted fees.
but when the matter of complaint to the operator, the operator’s customer service is the feedback that is the user’s own point of a provision of the application only when deductions can not be accepted. This is a typical malicious software against the consumer. Chang pointed out that the malicious deductions over five games software.
In addition, the Android smart phone is that there is a big loophole, user information can easily be theft by unlawful elements. For example, when the user installed micro-letter street street chat software, it is entitled to implant something in your phone underlying the transfer of the phone. This is a natural vulnerability, some criminals may try to listen to the call of the user to exploit this vulnerability.
reporters had interviewed some of the Android system developers, and they think this is the natural vulnerability of the Android system, system developers are often caught in a dilemma: If we plug these loopholes, then the micro letter m talking of these software can not be used, if not stuffed, the system must have security vulnerabilities.
“This is like in your home decoration to someone else a key, others can come at any time.” Chang said.MediaTek, Spreadtrum smartphone chip solutions mature, large numbers of the past to do the cottage feature phones manufacturers began to enter the field of smart phones, these companies are malicious chargeback play of the past era of feature phones brought to smart phones smoking costs the software, malware began to multiply.
Previously, malicious smoking costs the software function on the phone was once rampant. Prior to this, in December 2010, the Ministry of Industry had sent called “notice” on the the further remediation phone to smoking fee “file, which states that strictly regulate the phone built-in software.
while the Ministry of the introduction of new regulations, the first smartphone in the lawless application make constraint, the “notice” is still in exposure draft stage.the new
compliance or “rule was certified dead”
Reporter survey found that malicious software in the mobile phone smart mobile phone manufacturers produced and rare, large vendors are not significantly affected.
the new regulations of the Ministry of Industry may be the main constraints of small and medium cottage mobile phone manufacturers, because many manufacturers past SP deductions to the rules of the game taken to the smart phone up. “has extensive experience in the field of mobile software pre-installed High German, vice president of cleft Jianjun said.
Qie the army that large manufacturers operating on a fairly standard, such as the Gao Germany map you want to load Samsung, Motorola, Huawei is a big mobile phone manufacturers to go through many tests, because the users to use mobile phone software trouble, will blame The mobile phone manufacturer, the product is poor, a lot of trouble, so these large mobile phone manufacturers in the pre-installed software is quite cautious, and there will be more stringent testing process.including Baidu, Alibaba, 360, grand
including Internet giants announced its entry into the mobile phone
areas, and develop their own systems and applications preset into the phone, the new regulations may also have some constraints.
“like Qihoo 360, Tencent company, their practices relatively more standardized, and the competition between them would be each other’s rogue means of exposure, each other, there will be greater pressure.” Yunting pointed out that the new regulations on Tencent, 360 large manufacturers such behavior will produce a certain constraint, because the notice gave them a clear legal and illegal, clearly defined, intellectual property lawyer.In the “rule”, the clear mobile phone manufacturers should not be pre-installed “and not to the user expressly agreed to by the user, the unauthorized collection, modify users’ personal information software. CEO of a mobile phone ROM manufacturers to reporters analyzed, if carefully investigated together, the market most of the mobile phone software to collect users’ personal information, in the end how to define whether the violation? Ministry of Industry also needs to give specific details.
Yunting also believes that the notice for the specification of small and medium-sized mobile phone manufacturers and other cottage manufacturers. But the problem is that this provides manufacturers of small and scattered, whether there is a practical rigid capacity constraints, but also worth the wait, the introduction of the Ministry of Industry under the “more” treatment where he died a small. He pointed out that out of this first step on the industrial development to help in the fledgling stage of the mobile Internet.
who exaggerate the mobile security?In contrast, the problems that exist in the mobile phone factory pre-installed software is not that much, but rather the Brush channels and third-party application store channels in the cell phone software more
Chang.when users get a mobile phone, the phone may be brush several Road – in the National Assembly there may be brush a one-generation in the province where they are playing a wait until a cell phone store warehouse. may be brushed one. Brush one, there are people trying to make money through pre-installed software, a process, just the malware flooding the soil.
However, the industry has warned that to prevent a small number of vendors the opportunity to take mobile security to make a fuss, in order to achieve their own commercial purposes.
“In my opinion, there are a small number of vendors exaggerating security threats on the phone.” large-scale mobile application store, the CEO of anonymity, told reporters that a small number of cell phone manufacturers do everything possible to get their own safety software onto the user’s mobile phone to occupation of the mobile Internet portal.
his own store will be tested, and excluding those suction charges, malicious collect user information application. “We also promise to consumers, if consumers here to smoking costs the software, the resulting loss of our stores.” The CEO pointed out.
Informed sources told reporters, Qihoo 360 had tried to control their own security is implanted into the country a large store, which to download a software to scan, identified by 360 is responsible for which piece of software is a rogue software, but the direct refusal of this application store.
since 360 began a large-scale promotion of the “360 special for the machine”, by the way pre-installed in the mobile phone factory direct occupation of the security field in the user’s mobile phone, 360 CEO Zhou stressed on many occasions to phone safety issues, and publish China Mobile Security Report. ”Mobile Internet Conference held not long ago, Tencent CEO Ma has repeatedly stressed that the future mobile security is a big problem, Tencent launched its own mobile phone security products, and news that Tencent is trying to many mobile phone manufacturers Tencent’s security products in the mobile phone operating system implanted.
Tencent mobile security laboratory each quarter will be released mobile security report, reminding the user currently on the market of mobile phone viruses is rampant. According to the laboratory of the 2012 first quarter, mobile security report, the number of the first quarter of 2012, mobile phone viruses package is almost close to 2011 half of the year, while Android-virus software package over the whole of 2011 virus package 3/4, while the phone ROM built-in and the software bundle-like virus a sharp rise, accounting for more than 20%.
“In fact, mobile phone viruses are not as people think so much.” The App Store CEO pointed out that current mobile phone models is a considerable range, and the Android version upgrade frequently, the virus spread between the different models is far difficult than the year of the PC.
Disclaimer statement: This article represents only the personal point of view, and Phoenix. Its originality, as well as in the statements and content without the site confirmed on this article and in which all or part of the contents of the authenticity of the text, completeness, timeliness, without any guarantee or promise, the reader is for reference only, and requests verify their own content.
cottage – Google News