watch out! Personal information for mobile phone power

Because the user can’t see the structure under the shell of the power bank, it looks like a power bank on the surface. In fact, the internal structure may have been changed into a device with Trojan horse device by illegal elements. Once the power bank is plugged in, the information of the mobile phone will be directly “read” by the external device, and in serious cases, the account password on the mobile phone will be stolen directly. < / P > < p > the second one Data is synchronized, just like a power bank with a built-in hard disk. When such a power bank is connected to your mobile phone, it is possible to synchronize the data of the phone to the built-in hard disk without your knowledge. < / P > < p > the third way is through wireless transmission. Some power banks are equipped with wireless settings. Once connected to the mobile phone, you do not need the built-in hard disk Wire network, which transfers your data to criminals. < / P > < p > in the past, there have been news reports such as power bank eavesdropping and power bank positioning. However, the situation of power bank leakage and Trojan horse implantation has nothing to do with businesses. < / P > < p > 2. Install software with less “permission”: when installing app, do not easily agree to obtain personal information permission. You should also frequently open the mobile phone permission management, check the permission opening of mobile application, and close sensitive permissions such as call record, SMS, address book, etc. < p > < p > 3. Social circle of friends: all kinds of open circle of friends should have the right to view, and their personal status and photos are likely to be used by interested people. Those who need to be typed should be typed and uploaded as much as possible. Public WiFi: it is better not to use the public free network without password. It is easy to be hacked into and steal your phone number, home address, bank card number and other personal information. WiFi connection mode should also be set to manual. < p > < p > 5. Choose a secure download platform: now a variety of mobile phone apps emerge in an endless stream, many of which are installed into the mobile phone inadvertently. Some software carries viruses, which not only consumes traffic, but also maliciously deducts fees and steals users’ privacy. The best way to download mobile phone software is to choose a regular and safe download platform. Don’t click the link on the SMS or web page. American companies begin to give up R & D: who should pay for corporate research?