While the development of smart mobile devices has brought convenience to users, it also faces various attack threats, including: Botnet, privacy theft, phishing attacks, etc. According to Juniper reports, the number of mobile malware last year (March 2012 to March 2013) reached 276,259. Driven by economic interests, attackers usually write malware targeting mobile terminals to bring direct monetary gains. For example, Lookout statistics show that 78.5% of malicious attacks targeting Android systems will cause user accounts to be maliciously charged. In addition, since network operations on mobile terminals usually require payment, malware usually embeds code that causes network traffic in the background to cause traffic to be deducted from user accounts. This method is also easy to implement. When faced with complex and diverse security threats, users can use the following methods to monitor malware in mobile devices depending on the operating system of the mobile device (here we mainly explain iOS and Android):
( 1) iOS series mobile devices, including iPhone, iPad, iPod Touch and other Apple mobile devices. Without jailbreaking, these iOS mobile devices can only install third-party software from official online stores, so the probability of malware in the device is very low. However, many iOS users choose to jailbreak. Some hope to install plug-ins to give iOS more functions, while others hope to use free paid applications after jailbreaking. If it is a jailbroken iOS device, then certain measures are needed to protect the security of the device. First, you need to change the password of the jailbroken iOS root user, because many iOS malware uses the default root user password (alpine) to carry out attacks. Many users choose to install third-party software through the Cydia store after jailbreaking. There is no permission prompt when installing these software, so you need to pay attention to the "source" of the plug-in. You can add different "sources" in Cydia, which is equivalent to different application stores. Please try to choose well-known sources and try to avoid installing unknown sources. There is almost no actual security software on iOS. This is because before jailbreaking, iOS gave third-party software very little permission, not enough to support standard security or anti-virus software. Moreover, it is almost impossible for iOS devices before jailbreaking to be infected with viruses, so there is no need to install anti-virus software. After jailbreaking, the security of iOS is reduced, but jailbroken users are mentally prepared for this, so there is almost no market for jailbroken security software.
(2) For Android users, there are more choices. First of all, Android users can carefully check the permission list listed by the software when installing each third-party software. If you encounter permissions that you don't want the software to have, such as reading contact information, you can refuse to install the software. If there are some well-known software, users must use it, but they do not want the software to obtain corresponding private information. In this case, you can install some rights management software. Some of these permission management software directly prohibit designated third-party software from accessing certain permissions, but this can easily cause the third-party software to crash. So these rights management software also offers another option: virtual private information. When third-party software wants to read some private information (such as contact information), these management software will return the corresponding virtual private information to the third-party software instead of the user's actual private information. In this way, users' information can be protected without causing the managed third-party software to crash. Finally, there are a large number of security monitoring software and anti-virus software on the Android market, which can help users monitor and protect against malware on their Android mobile devices. It is recommended to choose a well-known security software to install.