Joke Collection Website - Blessing messages - Ways of personal information disclosure
Ways of personal information disclosure
First, human factors, that is, employees of companies and institutions who have information actively resell information.
Case:
According to Beijing Evening News, from 2065438 to March 2005, six employees of education and training institutions in Beijing were tried and pleaded guilty by the court for illegally buying and selling a large number of personal information of students and parents, totaling more than 2 million pieces.
One of the defendants, Yang, a 25-year-old high school student, came to Beijing to work from the Oroqen nationality in Inner Mongolia. According to him, at 20 1 1, he went to work in an education and training institution and found that the company had a lot of parents' information, so he secretly copied some for sale. Yang has worked in at least three such institutions and obtained more than 2 million personal information of students and parents. Yang sold information in bulk on the Internet, with a profit of * * * 1000 yuan, with an average of 5 cents for each piece of information.
Another defendant, Xu, aged 37, holds a master's degree. He started a company on 20 1 1 and needed to enroll students. He just received a text message saying that he had data about the parents of the students. After contact, he spent 2000 yuan to obtain the parents' information of seven primary schools in Haidian, including the primary school attached to the University of Science and Technology. After that, he found a short message agency to send a large number of spam messages at a price of 5 cents each, which can increase the registration volume by 25% every year. At the same time, he increased the price to 20,000 yuan and sold some information to his peers.
The second is the information leaked through mobile phones. There are mainly the following ways: mobile phones have Trojans; Use the hacker's fishing WiFi, or your own WiFi is hacked; Mobile phone cloud service account is stolen (weak password or database conflict or service provider vulnerability). ); APP vendor servers with privacy rights were dragged by hackers; Visit phishing websites through SMS of pseudo base stations. , leading to the leakage of important account passwords; Use hacking devices such as malicious charging treasures; GSM network is monitored by hackers. Third, computers are infected with malicious software such as virus Trojans, which leads to the disclosure of personal information.
While enjoying the convenient and quick functions of the Internet, netizens accidentally infected malicious software such as virus Trojans, which led to the disclosure of personal privacy and important information. If you believe in fake Taobao and fake airline tickets, you will be cheated.
Fourth, the attacker uses the vulnerability of the website to invade the database that stores information.
From the website security attack and defense practice of 20 14, website attacks and vulnerability utilization are developing in the direction of batch and scale. Website security is directly related to a large number of personal information data, business secrets, property security and other data. After an attacker invades a website, he will generally tamper with the content of the website and implant black words and black chains; The second is to implant a backdoor program to control the website or website server; The third is to defraud the administrator's authority by other means, and then control the website or drag the library. Since 20 1 1, the information and data of about 1 1.2 167 million users have been leaked due to dragging and bumping into the library.
- Previous article:How do I need a verification code to enter Debon Express Payment applet?
- Next article:How to set SMS ringtone on Samsung note2
- Related articles
- How to invite guests to the store to apply a mask?
- Wuhan Mobile's port number transfer can receive calls and information from the original telecom.
- What's the status quo of SMS baby in Wenchuan earthquake?
- Classical Chinese in the Year of the Monkey
- What does it mean that there is a "SMS authentication" for opening online banking now?
- Can you tell when you send a text message after your mobile phone number is blacked out?
- As soon as the phone is turned on, you will receive an empty message, and you can't reply without a number. Is it a virus?
- Can I see who sent the message after deleting it?
- My son wishes my father a happy birthday.
- How to notify driver's license registration by SMS?