First, mobile phone virus prevention should pay attention to the main points
With the maturity of WAP technology, accessing the Internet to obtain a large amount of information has become one of the important functions of WAP mobile phones. Of course, this also increases the probability of WAP mobile phones being infected with viruses. Because it is relatively simple to directly attack WAP mobile phones through the network, WAP mobile phones have become an important target of computer hackers.
There are usually three ways to attack WAP mobile phones: one is to attack WAP server, which makes WAP mobile phones unable to receive normal information; The second is to attack the control "gateway" and send spam to mobile phones; The third is to directly attack the WAP mobile phone itself. Viruses attacking mobile phones may not only automatically start the phone recording function, automatically make calls, delete data on mobile phones, but may even "create" a huge phone bill.
Therefore, in daily use, in addition to downloading information from the Internet as little as possible, we should always be careful of virus infection and monitor the abnormal situation of mobile phones at any time in order to find viruses in time.
1. Monitor garbled code. When the other party's phone is dialed in, the incoming number is usually displayed on the screen. If other words or strange symbols are displayed, it may be attacked by a virus. If this happens, the user should not answer or turn off the phone immediately. If you answer an incoming call, you will get a virus, and all the settings in the machine may be destroyed.
2. Monitor SMS. As an important way of mobile communication, sending and receiving short messages is also an important way for WAP mobile phones to be infected with viruses. Once a mobile phone user receives a short message with a virus, after reading it, the mobile phone keyboard may be locked, and even the mobile phone IC card may be destroyed. Therefore, for the short messages sent by strangers, please do not open them easily, let alone forward them, and delete them in time.
Once the mobile phone is found to be poisoned, you should turn off the mobile phone as soon as possible (if the mobile phone has crashed, you can take out the battery directly), take out the SIM card and insert it into another type of mobile phone (preferably a different brand), delete the suspicious short messages stored in the SIM card, and then insert the card back into the original mobile phone. If it still can't be used, you should contact the mobile phone service provider to disinfect the mobile phone through the wireless website or through the IC access port or infrared transmission interface of the mobile phone as soon as possible.
Second, how do consumers know and guard against mobile phone viruses
1, Xiao He just illustrates the current situation and history of sharp corner-mobile phone virus.
Mobile phone virus, the legendary "mobile phone killer", finally came to Beijing. On April 9, some users reported that the mobile phone automatically turned off after receiving an unknown text message. Mobile phone virus spread widely in Europe last year and also appeared in other provinces and cities in China at the beginning of the year. But this is the first time in Beijing. When viewing a message with poison, the phone will suddenly turn off. Restart the phone to check the SMS, and the phone will automatically turn off.
In fact, the mobile phone virus was born long ago and only recently came to us. The world's first mobile phone virus "VBS. Timofonica was published in Spain in June 2000. The virus sends abusive short messages to any user in the mobile system of operator Telefonica, so the short message bomb can only be regarded as a prank at best.
But not all viruses are so slow. In July of 20001year, a Japanese hacker sent a malicious email to13 million I-mode wireless data service users. When users open e-mail, their mobile phones inexplicably dial 1 10. On June 5438+ 10, 2002, researchers from the Dutch security company ITSX found that some models of Nokia's mobile phone operating system had design defects. Hackers can use this security flaw to send a malformed text message with the length of 160 characters to the mobile phone, thus crashing the operating system. This short message virus mainly damages Nokia 33 10, 3330 and 62 10 mobile phones. There is also Hack.mobile.smsdos, which specifically attacks various models of Siemens mobile phones. This virus can send virus programs to Siemens mobile phone users through the Internet or mobile phones in the form of short messages. According to foreign media reports, at least 3 million mobile phones in the United States were attacked by short messages containing malicious code.
2. Everything happens for a reason-how does the mobile phone virus work?
In addition to hardware devices, mobile phones also need the support of upper software. These upper-level software are generally developed in JAVA, C++ and other languages. They are embedded operating systems (that is, the operating system is solidified in a chip), which is equivalent to a small computer. So there must be the possibility of being attacked by malicious code. At present, SMS is not only a simple text content, including ringtones, pictures and other information, which can only be used after being "translated" by the mobile phone operating system. At present, malicious short messages take advantage of this feature, aiming at the loopholes of a mobile phone operating system, write short messages and attack the mobile phone. If the compiler is tall enough to be familiar with the underlying operating system of the mobile phone, it can even compile a virus that destroys the chip of the mobile phone and make the mobile phone completely scrapped. Here, mobile phone virus will be an inevitable trend, and it will get worse.
Different mobile phone manufacturers have different development tools, and the upper-layer software of mobile phones is different. This is like the relationship between Window system and Linux system, so malicious short messages cannot complete cross-mobile phone attacks. This is why only a few mobile phones will be attacked at present. Because most mobile phones do not support the operation of foreign software at present, these short message viruses have not been found to be contagious, but only attacked one by one.
There are two basic conditions for the spread and attack of mobile phone virus. First, mobile service providers should provide data transmission functions, and mobile phones should support advanced programming functions such as Java. At present, all mobile phones with internet access and download functions meet the above conditions, while ordinary non-internet mobile phones are unlikely to be infected.
Third, the detoxification method of piranha mobile phone virus
Step 1: Stop the virus program (1. Select the application caribe, 2. Ending the Caribbean)
Step 2: Manually delete the malicious program (1. Download the file manager to the poisoned mobile phone, 2. Delete the following files)
% System drive %:\ System \ apps \ caribe \ caribe . app
% System drive %:\ System \ apps \ caribe \ flo . MDL
% System drive %:\ System \ apps \ caribe \ caribe . RSC
c:\ System \ SYMBIANSECUREDATA \ CARIBESECURITYMANAGER \ CARIBE。 app; application
c:\ System \ SYMBIANSECUREDATA \ CARIBESECURITYMANAGER \ CARIBE。 The Royal Shakespeare Company.
C:\System\RECOGS\FLO。 Master Data Library (master data library)
c:\ System \ SYMBIANSECUREDATA \ CARIBESECURITYMANAGER \ CARIBE。 elder sister
(%System drive%: is the default system directory, usually the default value is C:\).
If you have Bluetooth, you'd better not turn it on at ordinary times, but turn it on when you use it. Many viruses are spread through Bluetooth.
Now there are many mobile phone virus killing software, you can try it.