Information security risks is to share the biggest problem charging treasure three strokes prevention

Information security risks is to share the biggest problem charging treasure three strokes prevention

Summary

The difference between shared charging and other shared economies is that the use of it means that the security of the data and information on the handset may be at risk. Now that our mobile phone stores too many important personal information, our main purpose is to help business managers to enhance their knowledge of IT and IT technologies, recognize the risks and values ​​of technology, and always put information security in the first place One

The difference between shared charging and other shared economies is that the use of it means that the security of the data and information on the handset may be at risk. Now that our mobile phone stores too many important personal information, our main purpose is to help business managers to enhance their knowledge of IT and IT technologies, recognize the risks and values ​​of technology, and always put information security in the first place One

The emergence of "Shared Charging Po" has been accompanied by controversy, but the result is that the more controversial, the more it fires. In 2017, a number of shared charging companies have received a total of 1.2 billion renminbi of venture capital investment within 40 days of its founding. This shows that capital has a preference for it.
三招防范共享充电宝信息安全隐患

As long as the battery technology has not been revolutionized in the day, the shared charging treasure still has its specific needs and usage scenarios. However, based on the accumulated experience in enterprise information security management in these years, I must point out that the biggest problem of sharing charging treasure lies in the information security risk .The recent wannacle virus that rages around the world is actually a variant of Everlasting Blue, a networking tool in Snow Prism's "Prism Project." (Oops Cloud He Yang | 2 Minutes To Understand Hacking Ransomware Incidents Prevent). In the Prism Project there is another terrible eavesdropping device called Cottonmouth, which is based on the USB interface, Cottonmouth plug in the USB interface, you can sneak into the target device to install malicious programs.
三招防范共享充电宝信息安全隐患

Many people may not know that although most smart phones charging port looks not the same with the traditional USB interface, but in fact it is just another USB interface standard only, they are essentially the same.Here, a friend may think of: whether to implant Cottonmouth (and its variants of the virus), so as to achieve the purpose of controlling the phone and the inside information?Unfortunately, the answer is yes.There are already hackers on the Internet who have disclosed how to implant Trojans in a rechargeable treasure. Hackers showed us a way to insert a Trojan virus into your phone and get a real-time screenshot of the Android phone from your computer's control console. If you use a QR code payment function similar to Alipay , Payment two-dimensional code will be hackers, resulting in Alipay and bank card account cash stolen.
三招防范共享充电宝信息安全隐患

Even more creepy is that such a a Trojan virus once implanted, even unplug the charging treasure, you can still run. Moreover, the cost of illegal acts of similar behavior is very low, the cost of implanting a monitoring chip in the charging treasure is only a mere 300 yuan only.Even Apple's iOS system, can not be immune to the implanted Trojan virus.I've seen some implanted treasure trove of charging treasure, plug in the iPhone pops up a window, such windows are usually confused or disguised on the prompt, many people click on the "trust" in the case of unknown, All the data in the iPhone will be synchronized to the hacker.Of course, this does not mean that using a shared treasure must be a blessing, but at least the above hacking proves the existence of this possibility.This makes people have to consider, is it right? Some people use the shared charge Bao's "shared" feature, the treasure will take the first walk, "reprocessing", and then back to other people to use. insert the phone USB interface for charging characteristics, determines the shared charging treasure enterprises need to constantly, passively charged to deal with external threats. all, for shared charging treasure enterprises, both in terms of security technology and from the point of view of trust, all doomed this is a marathon.
三招防范共享充电宝信息安全隐患

The difference between shared charging and other shared economies is that the use of it means that the security of the data and information on the handset may be at risk. Before sharing Charging Po did not completely solve my security doubts, I personally hold on to it. And this is why I mentioned at the beginning of the article did not choose to use shared charge treasure, but their own buy another new charge treasure reasons.Now our mobile phone stores too much personal important information, at this stage for cell phone power problem best solution is to buy a big brand of charging treasure at any time with you.Our main purpose is to help business managers to enhance their knowledge of IT and IT technology, recognize the risks and value of technology, and always give top priority to information security.
三招防范共享充电宝信息安全隐患

Finally, there are three tips to use when you are charging treasure to share:First, the mobile phone system is firmly determined and need to charge Po said NO!I insisted that a good charging treasure will only do "charging" this one thing, all touches the phone system permissions are acts of rogue. If you use any of the following circumstances occur when charging treasure, immediately unplug the data cable: 1, suggest that you open the Android system "debug mode"; 2, you need to trust in the iOS system.Second, to install a reliable mobile anti-virus software.Traditional anti-virus software is a passive protection, and the virus often use anti-virus software to analyze the time difference of destruction. In any case, reliable anti-virus software to maximize the isolation of known threats when you use rechargeable treasure, so that your phone to maintain a relatively healthy state.Third, enterprise file storage and transmission applications, it is recommended to use a private cloud to protect business secrets.For business users, before using an unknown rechargeable treasure, I strongly recommend that you keep confidential files from your cell phone in a private cloud. Currently on the market of advanced private cloud products, the use of not only light and easy to use, more comprehensive security mechanisms that can make your cell phone confidential documents have all-round protection.