Ahmed nayeem

More actions

Forum Posts

Ahmed nayeem
Jul 30, 2022
In Welcome to the Forum
The Internet has become one of the indispensable "necessary conditions for survival" in modern life. Whether it is to obtain information through the Internet, or to use various services to bring convenience to work and life, it is our daily life. The networking of these types of devices also brings a lot of information security hazards. Many information security threat incidents are not necessarily because the user "steps on the thunder" to be recruited, but more of a crisis that comes to the door proactively, causing you to be violated unknowingly, and the system of the device slows down, It is easy to crash, and at worst, all private information is leaked, and important digital assets disappear overnight! Smartphones are the largest "private personal resources". Have you taken precautions? Most of the well-known information security attack methods such as viruses, Trojan horses, and malicious programs take the personal computer platform as the main attack target, in order to steal the user's data for industry email list profit; however, as smart phones gradually become popular The most reliant tool, which naturally also stores a huge amount of user private data, including contacts, photos, videos, various types of Internet service / social platform accounts, and even credit card, mobile payment or financial transaction information etc., thus becoming an important target for hackers to target. For information security protection on the computer side, most people know to install antivirus programs, firewalls and other tools to some extent, but in contrast to the smartphones we use every day, there is no equivalent information security awareness, so hackers have Lots of opportunities to take advantage of. do you know? As early as 2004, before the advent of smart phones, the first virus called Cabir appeared on the mobile phone, sending a large number of value-added service SMS through the infection system, causing the users to lose blood. Later, in just ten years, the number of malicious programs on mobile phones qu
The distance between us and the hacker... closer than you think? Inventory of common information security risks of smartphones content media
0
0
1