Sitting far away typing Your phone can hear everything you say No need to unlock I can see your face remotely. Pick up your phone and chat with others All chat content can be viewed in real time A scene straight out of a movie It's really happening around you If you think about it carefully, isn’t it “terrifying when you think about it”? In modern people's mobile phones Stores everything about a person Personal communication information, photos, consumption data … Mobile phone information security Personal privacy and property security Closely connected But someone was watching This information on the phone Exploiting system vulnerabilities to create Dedicated tools To steal other people's information for illegal profit recently The reporter found on the social platform Someone is selling it publicly Tools that can spy on other people's privacy In the chat group, the group owner released a variety of monitoring tools, claiming that it only takes one minute for them to monitor the phone screen of the person you want to monitor, record audio and video, and even eavesdrop on the sounds around the other person's phone in real time. The seller said that if it is an Android phone, all functions can be realized for only 2,000 yuan, and the simplest operation only requires knowing the other party's mobile phone number; even if it is an Apple phone, you can receive the other party's WeChat messages synchronously, and it will not show the login on other devices. The seller then showed the reporter a demonstration video, which showed that the tool would first send a remote push notification to the other party, prompting the other party that there was a software update required. Once the user clicked on it, an automatic authorization message would pop up on the phone, and then the phone would completely become a surveillance camera for the other party. To verify After the reporter paid the fee The other party sent two mobile phone installation files After testing, it was found that after the controlled mobile phone opened the file, the software could automatically set the required permissions in less than 1 minute. Then click to hide and the program would disappear from the desktop. When checking the tasks running in the background, it would be difficult for ordinary users to notice anything unusual. After installing the second installation package on the controlling mobile phone, the controlled mobile phone can be monitored in all directions, and it is difficult for the owner of the controlled mobile phone to find anything unusual. According to network security experts, this program exploits a vulnerability in the Android system. Even if WeChat, TikTok and other software use encrypted communications during transmission, malicious programs can still be used locally to read other APP data, activate cameras and microphones, and perform other operations. In addition, some mobile phone models lack obvious prompts when relevant permissions are called, making them more easily exploited by these unscrupulous businesses to engage in illegal activities. Legal experts pointed out that merchants who sell such products online are suspected of providing programs and tools for invading and illegally controlling computer systems. If the buyer involves some financial information in the system and then uses this financial information for profit, it may involve financial crimes. According to relevant laws and regulations, selling related programs to damage the interests of others, and purchasing such programs to monitor the behavior of others may constitute crimes. If the collected videos, recordings, etc. are also used to commit other crimes, they will also face multiple punishments. How to avoid These situations occur? Experts say that timely upgrading the mobile phone system to the latest version through official channels can significantly reduce the possibility of system vulnerabilities being exploited by attackers. At the same time, mobile phone application software installed and updated through regular official application markets are also relatively more secure and trustworthy. Police Tips: Citizens' personal privacy is protected by law and cannot be violated. Illegally obtaining other people's information and violating personal privacy are both illegal acts, and those who constitute a crime must bear criminal liability. Platforms and relevant departments should also strengthen supervision to safeguard the bottom line of information security for the people on the Internet. Source: Shanghai News Radio, News Workshop |
In the past few years, the SUV market has grown r...
[[141369]] Do you still have unanswered questions...
The refreshing Beginning of Summer has passed, an...
Author: Nine-pointed Star popular science author ...
Generally speaking, the contrast of a TV is a ver...
% ignore_pre_1 % When talking about traffic now, t...
Technology is advancing at a rapid pace, which ra...
An interview question and answer for an Uber oper...
When it comes to user growth , most people will t...
Introduction: Generating traffic and users is not...
As a traditional household appliance, television ...
On Tuesday, Microsoft updated the technical previ...
In marketing psychology, herd mentality, greed fo...
JD.com's 618 promotion has just ended, Suning...
Users, as one of the most important factors in pr...