Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)qq
published in(发表于) 2014/6/15 9:07:11
“Eavesdropping thieves“ second generation Trojans were intercepted,

"Eavesdropping thieves" second generation-eavesdropping thieves caught Trojans second generation Trojan, Trojan-IT news "Eavesdropping thieves" second generation Trojans intercepted

"Eavesdropping thieves" were intercepted before the second generation, new variants of Trojans. The Trojan disguised as including WiFi, dial-up, and the master key as many as 141 popular applications such as Taobao, eavesdrop on phone calls, QQ chats, can even intercept mobile phone screens.

Mobile security experts have found that after a mobile phone users to download and install these malicious applications, mobile desktop and no new icon, malicious programs impersonating system applications, through post restart, timer triggers, triggered SMS implementation in three ways-hacking evil.

According to understanding, and "eavesdropping big stolen" generation compared to, II generation not only can stole recorded phone user calls and upload, also can will contact list, and calls records, and SMS, and pictures, and location information together packaged away, what, "eavesdropping big stolen" II generation also will timing interception phone screen and upload, once phone user is entered bank card, and micro letter, and micro Bo, account and password, was "eavesdropping big stolen" II generation cut screen gets sensitive information, consequences will contemplate.

In addition, "hacking thieves" second generation can still steal QQ chat messages, groups, messages, friends lists, mobile QQ users ' privacy was swept away.

"Eavesdropping thieves" second generation is very deceptive to users. Mobile security expert points out that the Trojan used the normal cheat mobile phone users to download software name, and disguised as a system pre-installed applications, looks like this is the most basic functions of mobile phones, mobile phone users of abnormal, may also hesitate to delete.

Mobile security experts caution that if mobile phone users to find phone traffic is a voracious consumer of such anomalies should be vigilant, likely the eavesdropping Trojan King.




If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759