Cell phone users are attacked simultaneously
New year 2006 has not yet begun for several days, but mobile phone users have suffered from several attacks of Trojan programs at the same time.

The only good news is that the danger level of these Trojans is still low.
Since the beginning of January, Symantec has identified nine new Trojan programs targeting Symbian operating systems installed on mobile phones.These "vandals" take down the phone, find ways to install other malicious software into the system or steal data stored in the computer, secretly sending it to a predetermined device.
On the market today, Symbian is still the most popular operating system for smartphones.Nokia, the world's number one mobile phone maker, has also opted for Symbian for its high-end products.Two-thirds of smartphones shipped in the third quarter of last year were operating on Symbian, according to research firm Gartner.
In the face of the growing threat of mobile phones, Nokia signed a contract with Symantec last October, whereby all of its Series 60 smartphone models are equipped with anti-software software. Symantec Mobile Security virus.In addition, two other big names, F-Secure and McAfee, have also started to trade in security products for mobile phones.
According to Symantec, all 9 newly discovered Trojans are spread via Bluetooth, wireless shortwave technology that most smartphones are equipped with.In particular, Cdropper has 5 variants, two versions of Pbstealer, two "Sendtool" Trojans and "Booton".
While Pbstealer seeks to send address books, notepad content, work schedules and business memos to other Bluetooth devices, the Cdropper attempts to install versions of Cabir worm and Locknut into electricity. phone.
However, the most dangerous and destructive must mention Booton, the Trojan has just been discovered last week.When successful, it will cause the phone to reboot, but the boot process fails, as Booton has released several "destructive" files into the system.
Even so, Symantec reassured customers not to panic.Although the number of attacks has increased, the real risk remains low.Most Trojan programs require users to open a file received via Bluetooth, after reading a warning from the system that the file is sent from an untrusted source.
Not so optimistic, many security experts still predict mobile phone viruses will inevitably become an increasing headache this year.
Thien Y
You should read it
- The best web browsers for 'cricket'
- Nokia officially bid farewell to Symbian and MeeGo
- Which mobile phone has the most virus?
- The virus extends money to phone users
- Opera launches Opera Mini browser 6.5
- Ways to keep mobile devices safe
- Symbian S60 attack appears again
- Google Chrome accused Symantec of granting more than 30,000 digital certificate certificates that did not meet the quality standards
May be interested
- How to use Focus Cell to highlight Excel dataexcel focus cell feature is one of the useful features, highlighting the row and column of the active cell, helping you keep track of your location in the spreadsheet for easier reading across rows and columns.
- CELL function to look up information of a cell in Excelcell () returns the format, position, or content information of a cell depending on your needs. when you need to look up a cell's information, cell () is the most used function.
- What is a laptop battery cell? Is it good to replace the battery cell and reuse it?when buying laptop batteries, we often hear terms like 3 cell, 4 cell or 6 cell batteries. so what is a laptop battery cell? is replacing an old battery cell as good as before?
- How to convert formulas to values in Excelin some cases users just want to display the calculated value in a cell instead of leaving the formula there. because you don't want to change the data, the cell's reference cell will be changed, or you simply don't want to show the cell's formula to others. you can do how to convert a formula to a value in the following ways.
- How to Tell if Your Phone Is Tappedif you have reason to believe that your cell phone or landline phone might be tapped, there are a few clues you can look for that can support your suspicions. many of these indicators can be caused by other sources, though, so you need to...
- eBay was attacked by hackers, user accounts were revealedebay has just announced it is being attacked by hackers on its database. at the same time, it is recommended that users should quickly change the password to access the system.
- P2P worms attack Skype usersthe most popular voip service provider for skype users is being attacked by a new worm that spreads through the p2p chat feature of this internet phone software.
- How to Set Up a Free Wi Fi VoIP Home Phone with an Old Android Cell Phonedays when phone calls are only available through lines are long gone. with the innovations of mobile phones and the internet, you can practically make a call using whatever gadget you have. yes, even some cameras—particularly those that r...
- How to name an Excel cell or data area - Define Name feature on Excelin excel, users can name each individual cell or certain cells to easily remember the address of the corresponding cell when referring to the data area.
- Create a method to accurately determine the age of the cella new method developed by johns hopkins university can pinpoint cell age rather than current traditional methods.