Charging for 1 minute, the phone is controlled | Public places with charging treasure to be careful - Xinhuanet

'When the charging cable is connected, your mobile phone has been quietly installed with software with virus' 'I have not agreed, how can you install it?' ... ...... Mr. Chen is hard to believe, but he used the scene The charging treasure, the mobile phone was planted a Trojan virus, and the personal information displayed on the screen made Mr. Chen have to be convinced - this is the scene of the 'Network Security Publicity Week Youth Day' held on the morning of the 22nd.

On the first day of the Mid-Autumn Festival, many parents came here with their children to learn the cyber security knowledge while playing games. The easy-to-understand, interactive experience method successfully transmitted simple cybersecurity knowledge to teenagers and parents. Let them experience a 'danger' process on the spot.

Experience: Charging for 1 minute, the phone is controlled

The public charging treasure in the restaurant, the charging pile in the airport can often solve the urgent need of the mobile phone without electricity, but the risk is often the charging treasure that can be used at any time. 'The mobile phone is connected to the charging pile in the public place for charging, maybe The charged pile is quietly injected into the Trojan program. The hacker can remotely control the mobile phone, and then obtain the mobile phone address book, text message, and even control the camera to take a sneak shot, control the recording device to eavesdrop. 'At the event site, the staff exhibited a charge. Pile, and show participants on the screen what might happen after the phone is poisoned.

How can citizens be 'handed out' if they are not careful?

At the scene, Mr. Liu inserted the mobile phone into the charging post and charged it for about one minute. The staff started remote control of the mobile phone on the computer. 'After picking up our charging pile, your information is easily mastered by us.' Some words have aroused the interest of the audience. Mr. Liu is alert, he likes to use WeChat to chat with friends, or to communicate on the job. Will these WeChat chat records be monitored? Mr. Liu’s worry I got the confirmation from the staff. 'After the mobile phone was injected with the Trojan virus, all the WeChat calls in the phone were quietly forwarded to the hacker's monitoring phone, but you may not know about it. After the hacker gets your message or photo , you may be cheating on you. '

Parents: Such activities are more effective than learning at home.

In public places, will there be such a safety hazard in the regular charging treasure? The staff said that the hacker can modify the regular charging treasure and quietly implant the Trojan virus. 'I don’t think this public charging treasure is so big. Safety hazards, I still have to bring my own treasures in the future. 'When Mr. Liu spoke, the surrounding teenagers were also eager to try, want to try the trick of public charging treasure.

In addition to network security science activities, teenagers also experienced the network 'black technology' on-site, including VR virtual shopping, AR scene experience, etc. Through painting security guards, watching security publicity videos and sitcoms, participating in event challenges, etc. I learned cybersecurity knowledge with my parents and improved my daily safety awareness. Parents present at the scene said that such group activities can make children fully participate in communication, which is more effective than learning cybersecurity knowledge at home.

2016 GoodChinaBrand | ICP: 12011751 | China Exports