With the popularization and widespread application of network information technology, the problem of network information leakage still troubles people. On July 7, the reporter learned from the latest mobile malicious program report released by market analysis company G Data in the first quarter of this year that nearly 5,000 malicious programs appear on the Android platform every day. The report also revealed that the total number of malicious programs increased by 6.4% compared with the fourth quarter of last year and increased by 21% compared with the same period last year. 500,000 new malicious programs in the first quarter Recently, market analysis company G Data released a report on mobile malware in the first quarter of this year. The data in the report showed that a total of 500,000 new malicious programs were discovered. On the Android platform, a new malicious program was born every 18 seconds, which means about 5,000 new malicious programs are born every day. It is reported that compared with the iOS platform, the Android platform is more likely to be embedded with malicious programs or applications. Previously, there was a report that 97% of malicious programs are targeted at Android devices. According to the data in this report, the total amount of malicious programs increased by 6.4% compared with the fourth quarter of last year, and increased by 21% compared with the same period last year. According to Zhao Zhanling, a well-known Internet rights protection lawyer, the Ministry of Industry and Information Technology once issued a document stipulating that mobile terminal product manufacturers must undergo network access testing and network access permits before selling their products. When obtaining network access permits, the product will be tested to see if it has the following problems: first, it cannot collect user privacy and personal information without authorization; second, whether communication functions are called without authorization; and third, whether there is any content prohibited by laws and regulations. "The problem now is that some software that has passed the network access test may still charge fees or collect user privacy, which means they can evade inspection during the network access test." Zhao Zhanling pointed out that in addition, there are many software that are not pre-installed but are downloaded directly or indirectly by users during use. There are currently no relevant laws in the country to regulate software that is directly downloaded by users but may threaten information security. It is reported that the main purpose of malware attacking devices is to steal data, damage devices or disturb users. Attackers trick users into installing malicious programs or exploit device vulnerabilities to gain unauthorized remote access rights. Malware based on mobile smart terminals has become one of the most serious security issues in the mobile Internet. In fact, as instant messaging, social networks, e-commerce, and Internet finance based on network information technology enter people's daily lives, the threats to network and information security are also increasing day by day. The latest statistics from the China National Information Security Vulnerability Database (CNNVD) show that 637 new security vulnerabilities were added in June 2015, with an average daily number of new vulnerabilities of about 21. By the end of June, the total number of CNNVD vulnerabilities had reached 76,268. Experts suggest building a systematic security system In the Internet age, how to ensure information security and establish a network security system? In this regard, the reporter learned that at the beginning of this month, at the closing meeting of the 15th session of the Standing Committee of the National People's Congress, the new National Security Law was passed with a high vote. The law proposes to build a security system to maintain national network security and information security. Experts pointed out that only by building a three-dimensional, coordinated and dynamically developing personal information security system from multiple levels such as the legal system, self-discipline mechanism, management standards, organizational structure, and technology application can the systemic risks of personal information security in my country be fundamentally curbed. In an interview with the media, Xiao Fengcheng, a professor at the School of Law of China University of Political Science and Law, pointed out that the core technologies, key infrastructure and important areas of cyberspace, including large servers, optical cable systems and their related hardware facilities and equipment and software systems, as well as networks and information systems in important industries such as finance, telecommunications, energy, and transportation, are undoubtedly the foundation and key to network and information security. Zhao Zhanling pointed out that in order to protect the security of personal information, users should first not download things casually. If they want to download, it is recommended to download applications through stores with stricter review, and at the same time download well-known applications with good reputation, because they are relatively standardized in collecting and protecting personal information. Zhao Zhanling stressed that users who use online banking and online shopping accounts on their mobile phones need to have a sense of security and master some security knowledge to avoid mobile phone poisoning or improper operation to leak personal information. "Some application software secretly collects user personal information, and ordinary users have no way to prevent it. This mainly depends on law enforcement agencies to increase the intensity of law enforcement inspections." "Improving network and information security protection capabilities cannot rely on certain aspects alone. It is necessary to build a security assurance system covering all aspects of security technology and security management." Professor Xiao Fengcheng also pointed out. |
<<: Follow the following principles and stop worrying about Xcode code signing issues
>>: iSO development skills—Notification and multithreading
As one of the control standards for many games, t...
Author: Xue Qingxin, member of Chinese Nutrition ...
For operations , user volume and revenue are the ...
Since Baidu launched Aicaigou, many webmasters ha...
As of May 11, 2014, the official stable version of...
The global semiconductor industry's revenue f...
The parameter configuration of Shanghai Data Cent...
Whether it is young cubs Or middle-aged and elder...
Today, the new version of iQiyi APP is available ...
The picture shows the Jimu-1 III airship in front...
Produced by: Science Popularization China Author:...
With the strong development of "Internet+&qu...
How to do user operations ? In fact, most colleag...
Excerpted from: Inside and Outside the Classroom ...
On May 21, Ren Zhengfei, founder and president of...