Who stole your mobile phone traffic? Revealing five traffic traps

通过admin

Who stole your mobile phone traffic? Revealing five traffic traps

Recently, Wuyun website, a security research and vulnerability reporting platform, issued a security warning, pointing out that the mobile phone software has been tampered with, and the phenomenon of stealing traffic in the background of random advertisements has become increasingly serious. The news that mobile phones may steal traffic has caused quite a stir among many smartphone users, with more than 30% netizens reporting that mobile phones have stolen traffic.

As for the reasons for traffic stealing, some respondents who have a certain knowledge of mobile phones said that they would use traffic monitoring software to test, and found that many softwares that stole traffic were downloaded in the third-party software market, and they were "repackaged" by hackers and written into malicious code. In fact, this is just the "tip of the iceberg" of traffic stealing, which can be regarded as a malicious part. In addition, there are also some "unintentional" traffic sneak away. Experts suggest that you want to completely put an end to traffic stealing unless you turn off the data function. Otherwise, give up your smartphone.

You can’t avoid stealing traffic when surfing the Internet.

"Mobile phone steals traffic", according to the usual situation, mostly refers to the unknown traffic and even expenses caused by mobile internet access without consumers’ knowledge.

In today’s information society, smart phones have almost become a necessity for people’s lives. According to the 32nd Statistical Report on Internet Development in China recently released by CNNIC, in the first half of 2013, mobile phones became the first source of new netizens, accounting for 70% of the new netizens. Affected by it, as the largest application of the Internet, instant messaging (WeChat products) has also performed well on the mobile phone side, with a netizen scale of 397 million and a utilization rate of 85.7%. With the instant messaging application gradually changing from a single chat tool to a comprehensive platform, its market potential has also been stimulated.

Unlike SMS, instant messaging software sends information through traffic. That is to say, if there is no cell phone signal, you can send messages as long as there is a wifi network. Nowadays, more and more people are beginning to use WeChat instead of SMS. In this way, mobile Internet access has become an essential part of life.

If in the era of functional machines, mobile phones can surf the Internet. Because they are all single-task operations, there is basically no problem of stealing traffic. In the era of smart phones, it is not the case. Some mobile phone experts said that they want to stop stealing traffic unless they turn off the Internet access function. But in this way, the smart phone will be useless, so it is not realistic to throw it away.

"However, even if it is stealing traffic, there are two kinds of’ intentional’ and’ unintentional’." The expert said that most traffic stealing is unintentional, and telecom operators will not share the profits from traffic with application developers, so even if they steal traffic intentionally, the purpose is to pop up more advertisements or realize in-house purchases and other charging items. "The meaning of drunkenness is not wine."

Five traps of traffic "stealing"

Mr. Chen, who lives in Xincheng, not only used up all the traffic in the package overnight, but also owed more than 700 yuan. According to Mr. Chen, he forgot to turn off the data traffic service before going to bed. When the traffic in the package ran out, he did receive a reminder message from the operator, but he was sleeping at that time and saw the message the next morning. In this regard, Mr. Chen is very helpless and confused: How was my mobile phone traffic stolen?

According to reports, many reasons may lead to "traffic stealing", but there are five most common ones.

The implementation of push function must be based on network connection, so as to detect software updates and message reminders. Therefore, even if you don’t take the initiative to surf the Internet, you will work in the background under the condition of network connection, which will inevitably generate certain traffic.

Once the user accidentally downloads the malicious software with virus to the mobile phone, the Trojan will open the Root privilege for background networking, download the software for malicious promotion and simultaneously consume the user’s traffic, resulting in traffic stealing.

When the wifi signal is unstable and weak, the smart phone has the function of automatically searching and switching to the 2G/3G network and continuing to provide Internet service. If users don’t notice, when they continue to use services that consume traffic, they may generate high traffic charges.

Nowadays, many mobile phones have cloud synchronization function, which can help users to automatically back up information such as contacts, text messages or even photos to the cloud, but it will consume a lot of traffic, especially when the picture synchronization upload function is turned on.

Many game softwares running in users’ mobile phones are not as simple as they seem. In addition to the game services provided to users on the surface, they often collect personal information such as users’ models and geographical locations in secret. At this time, the traffic has quietly escaped.

Android traffic stolen? Please see here for the solution!

As we all know, whether it is the software that comes with the Android system or the software that we installed ourselves later, some software will always "steal" our traffic without our knowing it. Today I will tell you how to prevent this from happening.

First, control your GPRS port. Every Android phone will have a GPRS port. You can turn off the port through Settings-Wireless Network-Mobile Network. When you are finished with the function of surfing the Internet, close the port, and the software can’t steal your traffic without your knowing it. If you find it troublesome, you can close the port with one click by means of auxiliary software. This newspaper recommends several models here: 360 mobile guards, Android optimization masters and so on.

Second, monitor real-time traffic through software. Users who have installed 360 mobile guards may find that 360 will have a function of monitoring network traffic in real time. Using this function is very useful to avoid the theft of mobile phone traffic. Of course, sometimes because the algorithm is different from that of the service provider, the data monitored by the software is inaccurate. At this time, you can query your accurate traffic through 10086, and then correct the traffic through the software.

Third, use the task manager skillfully. When you feel that your mobile phone traffic is inexplicably increasing, you open the task manager to see what programs are running. Directly end the unrelated process.

关于作者

admin administrator