Joke Collection Website - Blessing messages - Popular science article: How to prevent mobile phones from being stolen?
Popular science article: How to prevent mobile phones from being stolen?
One is that the mobile phone is lost or stolen. If the ID card and bank card are stolen together, there is a high probability that they will be stolen. Of course, even without your ID card and bank card, your information can be easily bought online. At this time, the liar got your mobile phone card. Most people don't have a SIM card lock, so they can use it normally by changing their mobile phones. Of course, Android phones can also directly swipe their cards or set passwords. Most people's passwords are simple. After unlocking, you can register new accounts in many apps, and then use these new accounts to apply for loans on all online lending platforms you know and don't know, such as JD.COM Bai Hua, Baitiao and Meituan Loan. Some loans are directly transferred after approval, and more are purchased virtual goods, prepaid cards and game equipment, and then transferred.
As for how the thief bypassed the censorship, it is not known. If it is not the owner's own audit, then the loss caused by this situation can be paid by this third-party platform.
How do ordinary people prevent it?
The best way is to add a password to the SIM card. After this operation, every time the mobile phone is restarted or the SIM card is pulled out and inserted into other mobile phones, the password of the SIM card needs to be entered to communicate with the base station normally. Until this step is completed, the thief will never know the phone number of this SIM card, and of course he will not receive the short message, so that we will be safe.
If there is no password, the first thing to do is to report the loss of the mobile phone, and emphasize to the operator that it has been stolen, so that its speech cannot be released in a short time.
Unlike what I can perceive after being stolen, I still have a mobile phone on me, and my assets are inexplicably gone. Except for the prank of the insider, this situation is mostly caused by the leakage of the mobile phone verification code. Most of the leakage of mobile phone verification code is caused by the inadequate management of its own rights.
The specific operation process is also very simple.
It is normal for many apps to require permission to store and picture their phones when they are installed. However, some applications even have the right to read and delete messages. As long as you have this permission, and the photos that may be stored in your mobile phone have bank card and ID card information (scammers may also buy your information from other places). At this point, your name, ID card, mobile phone number, verification code, bank card and other information. With these things, it is basically no different from losing your mobile phone. And it is more convenient to operate. You're completely unconscious. When the message came, he recognized it and deleted it automatically. So the first step of protection is to find the permissions in the settings and close the permissions related to SMS.
One more thing?
Compared with Android phones, Apple phones are more secure, and the security is not a little bit. This major difference is mainly because Apple and Android phones have completely different ways of setting permissions.
All Apple devices are connected to a central server, and your account is on that server. Moreover, this account is bound to the motherboard chip on your Apple mobile phone, so as long as you log in to the account, 100% can determine whether the hardware equipment bound to your account can be used normally. After the traditional thief steals the Apple mobile phone, he can only sell it at the price of the removed parts. (Of course, he will get your APPID through various methods. If it is stolen, look for the locked mobile phone directly in the mobile phone. Don't give anyone APPID password)
The highest authority of Android phone lies in the phone itself, so it can be sold as a full-featured phone after brushing.
This is also the fundamental reason why there are fewer loopholes in iPhone software and less competition for system resources, because every software is put on the shelves after strict review by Apple.
- Related articles
- How to cancel the Bank of Communications credit card on the app?
- How to Restore Deleted SMS
- Good morning in autumn
- Problems existing in the registration of Beijing hospital appointment registration platform
- Is the health code offline?
- Are you tired of Shandong Chengze Metal Technology Co., Ltd.
- How can I get a refund without deducting money from the ticket of the US Mission?
- High temperature greeting
- Thank you for your business reception information.
- What should I say if others don't accept red envelopes?