Web browsers on the Android and IOS platforms, including Chrome, Firefox, Safari, and browsers with similar kernels, are at risk of hacking. Because mobile browsers are the most effective channel for hacking, by exploiting browser vulnerabilities, hackers can bypass many system security measures.
2. Android will be subject to remote device hijacking, eavesdropping
With Android devices selling in huge numbers, and hundreds of millions of people using smartphones around the world, remote device hijacking will likely trigger the next round of security issues, as there are a large number of applications in many smartphones that can evade review and certification by Google's security team. At the same time, the number of man-in-the-middle attacks will increase dramatically, due to the fact that many new smartphone users often lack the necessary security awareness, such as allowing their devices to automatically access unsecured public **** WiFi hotspots, and thus fall prey to and fall victim to hacker man-in-the-middle attacks.
3. The IoT crisis will continue to deepen
Today, there are many slogans about "IoT opens up our smart life", but whether the underlying data architecture supporting IoT systems is really safe and perfect is rarely mentioned. Too much of our personal information. Strictly speaking, all IoT devices and apps that connect to the Internet via Bluetooth and WiFi are not secure, and no one's life is more at stake than remotely accessible medical devices. For example, a large number of ultrasound scanners and other medical devices use default access accounts and passwords, which can be easily exploited by unscrupulous people.
4. Trojan horse virus, SMS and telephone fraud will be a joint
Common telecom fraud, such as precious metal wealth management fraud, fake bank customer service number fraud, online shopping refund fraud, 10086 points redemption fraud, etc., basically by the Trojan horse virus, text messages, phone calls in a variety of ways to complete the joint. This fraud is more intelligent, systematic and visualization, fraudsters can even control the infected user's communication social relationship chain, often leading to huge financial losses.