NCC announced the results of the 110-year-old mobile phone built-in software information security sampling test, only the iPhone 12 passed the test once – yqqlm

Since people rely on smart phones nowadays, data security is a must. NCC conducted software asset testing for 10 models with high sales volume in the first and second quarters of 2010 that have not obtained information security certification, as well as 5 mobile phones of Chinese brands. An random test, although the last 15 mobile phones passed the re-inspection, but only the iPhone 12 passed the test once.

NCC said that this random test focuses more on the personal information protection and encryption mechanisms that application software and communication protocols should have. From the “Information Security Test Specification for Smartphone System Built-in Software” announced by the Taiwan Information and Communication Industry Standards Association (TAICS) in 110 , select “Built-in software should store account numbers, passcodes, or keys in protected areas of the operating system or in encrypted form”, “Built-in software should avoid chat ID retransmission attacks”, “Connect with paid feature servers” 10 information security items such as “safe encryption algorithm should be used”, “sense data should not be stored in system log files during execution”, “user’s consent should be obtained before accessing sensitive data”, etc. .

Among them, only the Apple iPhone 12 passed the first test, and other mobile phones also passed the review with the cooperation of manufacturers, including Asus ZenFone 7, HTC Desire 20+, Samsung Galaxy A42, Sony Xperia 5 II, OPPO A72, OPPO There are 14 models including Reno 5, Realme X50, Realme C3, SUGAR T30 64/3G DUAL LTE, vivo Y20, vivo Y50, Redmi Note 9T and Redmi Note 9.

The NCC also emphasized that information security incidents are emerging in an endless stream and attack methods are changing with each passing day. The mobile phone that passes the test cannot guarantee the future security. If there is an updated version of the built-in software of the mobile phone, the mobile phone manufacturer should re-test and verify the updated part to maintain its passing status. Information security level, when there are information security loopholes or risks, the manufacturer should make timely repairs.

In addition to the built-in software in mobile phones, there are also risks in the software installed by users and their usage habits. The public should be vigilant and choose trustworthy brands, and develop good usage habits, including not browsing suspicious websites and not connecting to suspicious Wi-Fi , do not forcibly obtain administrator rights and other “three nos”; and regularly update passwords, update software programs and backup data, close unused Wi-Fi/Bluetooth/NFC interfaces, and enable encryption for connected Wi-Fi “Five essentials” measures such as protection and deletion of sensitive data when the phone is no longer in use.

Citing source:National Communications Commission

Leave a Replay