What kind of harm does the SMS bomber software do to our mobile phones?

Updated on military 2024-07-16
11 answers
  1. Anonymous users2024-02-12

    Now in the era of Internet big data, mobile phones and other electronic products emerge in an endless stream, network activities involve a wide range, to a large extent to facilitate people's lives, but also gradually reveal some security risks, people often receive a lot of **sales**, receive strange advertising text messages, and even encounter telecommunications fraud, which causes serious consequences of the incident is not a few. Nowadays, many apps, apps, apps, and mini programs require users to register before they can be used normally. When registering, ** generally need to fill in some personal information, and even some require real-name authentication, which requires more detailed information.

    If these platforms do not guarantee the security of user information, there is a high possibility that personal information will be leaked.

    We must take strong measures to protect the security of citizens' personal information. First, relevant laws and regulations must be further refined and standardized, and the perpetrators of network information security incidents must be punished in a timely manner to protect the vital interests of citizens. Second, information security is no trivial matter, and users must enhance their awareness of information protection.

    Be wary of abnormal operations and suspicious emails, do not reply to or click on email links to avoid falling into traps, and install anti-virus software in time. Third, the collection and use of user information by the platform shall follow the three principles of "legality, legitimacy and necessity". Security protection measures shall be taken for the collected user information, and once a leak occurs, remedial measures must be taken in a timely manner, otherwise they may face administrative penalties or lawsuits from users.

    It is urgent to protect citizens' personal information and privacy, and it is necessary to ensure that people enjoy the convenience and speed brought by big data in a safe environment.

    Xu Jinwei, a lawyer at Beijing Yingke (Guangzhou) Law Firm, told the New Express reporter that citizens' personal information and peace of work and life are protected by law in accordance with the law. "Any unit or individual who, without the consent of the citizen, repeatedly sends commercial information, spam harassment information, or continues to call the citizen's personal ** and affects the normal work and life of the citizen, may face administrative detention, fines and other public security administrative penalties. He suggested that if citizens are harassed, if it is determined that the sender can collect evidence such as ** audio recordings and negotiate with the sender; If the sender ignores it, he can go directly to the public security organ to report the case.

  2. Anonymous users2024-02-11

    It may try our mobile phone card to cause serious deductions, as well as personal information such as mobile phone text messages.

    The risk of being leaked is still quite large.

  3. Anonymous users2024-02-10

    If the SMS bomber recruits this, you will not be able to use the mobile phone text messages normally, it will be sent non-stop, and your mobile phone will always be stuck.

  4. Anonymous users2024-02-09

    The mobile phone will not receive the verification code text message for no reason, generally because the mobile phone number has been leaked, used by criminals, using SMS bombardment, in a short period of time to send verification codes and other spam text messages to the mobile phone number; Here's a closer look:

    1. Generally speaking, the verification number is only valid if it is correctly sent to the corresponding mobile phone login, if you receive a lot of verification numbers inexplicably, it may be due to some reason that your mobile phone number is leaked.

    2. Or due to some reasons, your mobile phone number is bombarded by criminals with text messages, and constantly sends verification codes and other spam messages to your mobile phone number; You can try using a third-party Phone Manager.

    and other software, set up harassment interception, and reduce harassment text messages as much as possible.

    Major hazards. 1) The illegal and criminal activities of using text messages for extortion and fraud are becoming rampant (such as winning the lottery, marrying, blackmail, etc.).

    2) Because some people with ill intentions and ulterior motives use text messages to spread false news and rumors, it has caused a large area of panic among the masses and stirred up panic.

    3) A small number of criminals use it to spread pornographic information and poison the social atmosphere.

  5. Anonymous users2024-02-08

    1. Being blackmailed

    The crude blackmail method is to select those "mobile phone numbers" to bomb, threatening the owner to continue to harass without paying. Usually, these owners have a lot of money and often choose to compromise in order to save trouble and avoid losses in other businesses. However, this can only be stopped for a short time, and the interval will be used by criminals as an ATM to withdraw money.

    2. Stolen brushes

    Hide the real captcha information in bombardment text messages.

    in the ocean, so as to carry out the act of piracy.

    There are two ways to steal the behavior, one is to "modify the bound mobile phone number", and the other is to "hijack the text message" Before that, the thief will also use software to bombard the user's mobile phone, and dozens of verification code text messages of various platforms will pop up at once, the purpose is to confuse the user, and then hide the verification code of the theft platform. The average user will only think it is harassment and will not open the account to view the information.

    Modify the bound mobile phone number

    The swiper will call the customer service with a new number, saying that his original phone is lost, as long as he provides his ID card.

    You can change your phone number after your bank card, recent delivery address, purchased items, and other information.

    Intercept SMS

    Hackers through text messages, beauties**, red envelopes, social software.

    and other forms to send SMS blocking viruses to the user's mobile phone.

    Once installed, the SMS will be completely supervised by the hacker, and any verification code received by the user will be sent to the email address bound to the scammer at the same time, or the user will directly intercept the SMS so that he will not receive it at all. Once you have the verification code, the scammer can use your balance and your overdraft limit to buy and buy with impunity.

  6. Anonymous users2024-02-07

    1. Unbinding the mobile phone number involves property.

    If the personal information is mastered by criminals, and the mobile phone number is paralyzed through SMS bombardment, harassment** and other means, the criminals may take this opportunity to modify the user's mobile phone service password, credit card password and other information, and steal property. Therefore, if the mobile phone is bombarded with malicious text messages, first of all, you must recall clearly that the mobile phone number is bound to involve property, such as bank cards, Alipay, credit cards, etc., although it is troublesome, but in any case, take defensive measures first to avoid financial losses.

    3. Install mobile phone software to block malicious text messages.

    The detailed operation steps are as follows:

    2) After entering the "Harassment Interception", click on the "SMS" column to add the SMS number to the blacklist;

    3) In the blacklist, you can manually enter the number to intercept, you can also add blocking keywords, and add numbers from the address book;

    4) Yu Jutong Butler also provides 4 interception modes for users to choose, and users can also set personalized interception modes according to their own needs, such as intelligent mode - intercepting blacklist numbers to achieve intelligent interception of garbage SMS;

    5) The "blacklist and whitelist backup and recovery function" provided by the housekeeper is convenient for users to restore the blacklist and whitelist in one step after changing the mobile phone, saving the trouble of re-operation.

  7. Anonymous users2024-02-06

    The so-called "SMS bombing" refers to the use of online platforms by criminals to send a large number of text messages to the target mobile phone number in a short period of time, which annoys the owner. What should I do if my phone is bombarded with text messages?

    After being bombarded by text messages, you can pull the other party into the blacklist, and the Apple number can be set to "block this caller ID". However, SMS bombardment is usually done with multiple numbers, and the blocking effect is poor in a short period of time.

    Installing mobile phone security software can also block some spam bombardments.

    If the other party continues to bombard the text message for a long time, it is also a good way to change the mobile phone number and temporarily deactivate the original mobile phone number for a period of time.

    Report to the police organ. After being bombarded with text messages, report the case to the public security organs, so that the lawbreakers can be punished by law.

    Call your telecom operator's customer service and ask them to help Mohe block text messages from non-mobile phones. However, this will affect your ability to get the real code.

  8. Anonymous users2024-02-05

    Personal mobile phones are attacked by SMS bombers, and the following measures can be taken:

    1. The harassed person can choose to report to the police or go to the court to sue.

    2. Contact the customer service of the operator corresponding to the mobile phone number to apply for the "emergency communication guarantee" service.

    3. The owner can turn on stranger interception or set a keyword database to filter and intercept it through professional security software, and timely detect and kill mobile phone viruses. Phone Manager will actively intercept scams, harassment or advertising text messages of the nature of **. The attacker can enable stranger interception through Phone Manager to block all the verification code messages sent by these ports.

  9. Anonymous users2024-02-04

    If you are often troubled by harassment** or spam text messages, you can try to install Tencent Mobile Manager to intercept and defend harassment** and spam text messages. The housekeeper can blacklist the nasty number. The details are as follows.

    2.After entering, you can view the SMS or click the SMS under the "SMS" column to "delete, report, and more" on the SMS number, as shown in the figure

    3.At the same time, blocked harassment** and blacklisted call logs can be viewed in the "**" column:

    4.In the blacklist, you can add numbers to intercept by yourself, and you can add three ways manually in "Other Add Methods":

    a. In addition, the butler also provides 4 interception modes for users to choose, and at the same time, you can also set a personalized and customized interception mode according to your own needs.

    b. In the "Interception Tone", the housekeeper also provides 4 kinds of interception reply tones for you to choose from.

    c. The "blacklist and whitelist backup and recovery function" provided by the housekeeper is convenient for you to easily and effectively restore the blacklist and whitelist in one step after changing your mobile phone, saving you the trouble of re-operation.

  10. Anonymous users2024-02-03

    This is illegal.

    According to article 42 of the "Public Security Administration Punishment Law of the People's Republic of China", those who repeatedly send information that interferes with the normal lives of others are to be detained for up to 5 days or fined up to 500 RMB; where the circumstances are more serious, they are to be detained for between 5 and 10 days, and may be concurrently fined up to 500 RMB. Therefore, the victim may retain the evidence and report the case to the public security organs, which will punish the perpetrators in accordance with law.

    If the perpetrator's act of sending a message is so serious as to interfere with the normal life of citizens, it is suspected of infringing on citizens' right to tranquility and constitutes a civil tort, and the victim has the right to sue the people's court in accordance with the provisions of the Tort Liability Law. The victim may demand that the perpetrator immediately cease the violation.

    If the loss is caused (for example, the mobile phone fails due to continuous receiving SMS and needs to be repaired), you can also claim compensation for the loss; If the victim suffers serious mental damage, he or she may also be required to claim compensation for moral damages.

    Although the victim can choose to report to the police or go to the court to file a lawsuit, sometimes the infringer is not clear, and the victim may not be able to identify the defendant, so it is necessary to contact the public security organ to collect further evidence.

  11. Anonymous users2024-02-02

    The point is that no one cares, and technically you can't find it at all, but you can guess it, and then bomb it.

Related questions
14 answers2024-07-16

SMS bomber is also a non-stop text message to the recipient, causing the mobile phone to be unable to receive information and unable to answer**, which will cause the mobile phone user to be unable to use the mobile phone.

4 answers2024-07-16

<> "British Victor Bomber.

The Victor was the last strategic bomber owned by the Young-Eda Smile Country, and was decommissioned in 1993 as the last British strategic bomber. >>>More

7 answers2024-07-16

The stealth capabilities of the B2 are classified, and in fact the B2 itself is the top secret of the US Air Force. The specific stealth capability of B2 is impossible to disclose, but it can be speculated to a certain extent, now the radar reflection area of the American F18E can be 1 square meter, the radar reflection area of the F117 is about square meters, the radar reflection area of the F22A is definitely smaller than that of the F117, the radar area of the American predator is less than the square meter, and the radar reflection area of the B2 as the most advanced bomber is definitely smaller than the F117, at least comparable to the F22.

10 answers2024-07-16

No, because it is necessary to exist. The cost-effectiveness ratio of fighter-bombers and pure bombers is not the same. One bomber can carry the ammunition of several fighter-bombers. >>>More

18 answers2024-07-16

4 sets of General Electric F118-GE-110 afterburnerless turbofan engines, each with a maximum thrust of 1,000 N. Installed in pairs between the outside of the ** cabin and the wing structure, chlorofluorosulfuric acid is sprayed into the exhaust to eliminate the visual wake of the engine.