Joke Collection Website - Blessing messages - Tell me about the network trap you know?

Tell me about the network trap you know?

Tell me about the network trap you know?

Introduce the network traps you know to everyone. Now everyone can't live without the network, but the threshold of the network is extremely low, and it is inevitable that there will be some traps, which will be set by others if they are not careful. Let's share the network traps you know and introduce them to everyone.

Introduce the network traps you know to everyone. 1 phishing

Phishing means that criminals send a large number of deceptive spam messages or short messages or instant messaging messages claiming to come from banks or other well-known institutions to induce the recipients to provide sensitive information (such as user name, password, account ID or credit card details), and then use these information to impersonate the victims to conduct fraudulent financial transactions, thus obtaining economic benefits. Victims often suffer serious economic losses or personal information is stolen and used for criminal purposes.

Trojan horse virus

Trojan horse is a hacker tool based on remote control. It is usually disguised as software packages, compressed files, pictures, videos, etc., and lures users to download and install through web pages, emails and other channels. If users open this kind of Trojan horse program, their computers or mobile phones and other electronic devices will be controlled by criminals who write Trojan horse programs, thus causing harm such as information files being modified or stolen and funds in electronic accounts being stolen.

Social trap

Social trap means that some criminals use social engineering to obtain personal information of cardholders and steal funds from cardholders' accounts through some important information. For example, the credit card center made a fraudulent call on the grounds of "increasing the credit card limit".

Pseudo base station

Pseudo base stations generally consist of a host computer and a laptop computer. Through the pseudo base station, criminals can search the mobile phone card information in a certain range around the equipment, and pretend to be the operator's base station, pretending to be any mobile phone number, and forcibly sending short messages such as fraud and advertisements to users.

information disclosure

At present, some small and medium-sized websites have weak security protection ability and are vulnerable to hacker attacks, so many registered users' usernames and passwords are leaked. But if the user's payment account is set with the same user name and password, it is very easy to be stolen.

Risk prevention tips

The first move, don't believe strange information.

There is no expiration problem in mobile banking, and customers will not be required to log on to the mobile banking website to upgrade. Please don't trust such short messages, and don't log on to fake websites. If in doubt, please stop the operation.

The second trick is to beware of fishing fraud.

Don't trust low-cost online shopping; Don't trade on the payment page, low price, refund, verification and other reasons sent by the other party through QQ, and don't accept computer remote control; Be sure to carefully check the order number and payment amount before online shopping payment; Install anti-virus software for mobile phones (such as "Mobile Phone Security Pioneer") and upgrade it regularly.

The third measure is to properly keep personal information.

When opening the SMS password, be sure to confirm that the mobile phone number that accepts SMS is the local mobile phone number; Don't disclose personal information easily, such as name, bank card number, ID number, mobile phone number, SMS verification code, etc.

The fourth trick is to beware of Trojan virus.

Do not open files, pictures, videos, etc. easily. Unknown source. When downloading the software package, go to the regular application mall to download it.

The fifth measure is to scan the QR code.

Don't trust the QR code information sent by strangers. If the website opened after scanning the QR code requires the installation of a new application, be careful not to install it easily.

What can we do if we accidentally fall into a trap!

What should I do if I am really cheated? Don't worry, be calm! Once you find that you have been cheated, you should contact the bank and payment institution as soon as possible and take corresponding emergency measures (modifying passwords, transferring remaining funds, freezing accounts, etc.). ) and call the local police at the same time. Although this may not be able to recover your loss, it can at least minimize the loss and prevent the next "you" from being cheated.

Introduce the network traps you know to everyone. 2 Free Wi-Fi to hide "Thunder"

I believe many comrades have had such an experience. Walking in the camp or shopping street, the mobile phone reminds me from time to time that "there is free Wi-Fi nearby", and many people can't help but click on the connection after seeing it. However, after only a few tens of seconds of connection, Wi-Fi disappeared automatically. At this point, the payment password, personal information, photos, videos and other private information in your mobile phone may have been stolen by criminals.

For such a problem, first of all, you must not connect to free Wi-Fi in public places, because hackers will send intermittent signals to the victim's mobile phone or computer, forcing them to log off, and then guide them to malicious hotspots with the same name, thus achieving the purpose of stealing data. Therefore, in the face of wireless networks, we would rather spend more traffic than cause greater losses.

"loopholes" are full of hidden dangers.

When we use the computer, we often see a prompt like "the system has found a loophole in xx, please fix it in time". Vulnerability is a file defect in the process of using and updating the system. Hackers often use vulnerabilities to send viruses such as Trojans to computers without the authorization of the owner. Failure to fill the loopholes in time will lead to the security risks of information systems.

In this regard, it is necessary to regularly survey system vulnerabilities, eliminate potential safety hazards in time, and don't bother to fix vulnerabilities. We should fix all kinds of software vulnerabilities in time to "lock" our secrets.

Don't be fooled by email "fishing"

I'm sure you've heard many stories about losses caused by phishing emails. When the troops deliver manuscripts and other literary works, they will inevitably use online mailboxes. Phishing emails are people who pretend to be trusted by colleagues, superiors, friends or family. , guide users to reply to emails or click on links attached to emails, so as to implant Trojan virus and steal information from users' computers.

In the face of such emails, we should be highly vigilant when receiving them. We should delete some emails that use homophones or spelling mistakes to impersonate the sender in time. At the same time, be wary of emails that name names and emails related to fraud. For the link attached to the email, we can hover the mouse over the link to see if the address displayed by the email reader is consistent with the claimed address.

Pay attention to telecom fraud

Telecom fraud is to defraud others of property or information by means of making up facts or concealing the truth through the internet, telephone calls, short messages and so on. Some soldiers are not good at distinguishing right from wrong. Faced with many temptations brought by telecom fraud, they will lose themselves and fall into the trap of telecom fraud, thus exposing their identities and causing security risks or property losses.

For such a problem, we should keep a clear head in the face of strange phone calls, and hang up the phone in time and pull the black after judging it as fraudulent phone calls.

The website is busy backstage.

When you browse the web, you must have encountered an unknown link pop-up or suddenly jumped to other web pages, but you can't quit immediately after browsing? If this happens, the mobile phone or computer is very likely to be invaded by viruses. If it is used by criminals, the background of the system will automatically select the information it needs, thus causing the hidden danger of information leakage.

Only when we regularly check our mobile phones, clean up viruses, and ignore unknown links and unknown windows when browsing the web, can we stop the invasion of viruses.

There are many "people with will" hidden behind the network world, and everyone must keep in mind when roaming in the network ocean:

Don't connect the free network randomly, save traffic and ensure safety.

System vulnerabilities are often fixed rather than left as hidden dangers.

Be careful when receiving mail, don't take the bait yourself.

Pay attention to telecom fraud, verify it repeatedly and then communicate.

Don't go to unknown websites, or the information will slide down by itself.

Introduce the network traps you know to everyone. 3. Online virus.

At present, if the virus on the Internet is not controlled, it will be flooded and pervasive. They can destroy computer functions or data, affect the use of computers, and replicate themselves. In particular, some viruses spread very fast, causing great harm to computer users, which has become one of the most troublesome problems in the new era and a trap on the Internet. Network virus is destructive, contagious, latent and hidden, which will make us hard to prevent, so we must be careful when using computers.

Second, network junk.

The world of the Internet is rich and all-encompassing, but there are also many bad and illegal websites on the Internet, such as obscene websites, gambling sites, violent websites and reactionary websites. These are all rubbish on the Internet, which affects the normal development of the Internet and becomes the dross and trap of the Internet.

Third, cyber hackers.

In a certain sense, network hackers refer to those computer experts who steal state secrets, personal privacy and information, attack and destroy the network through hacking tools (viruses, trojans, etc.). Hackers will take control of your computer and steal the data, information and privacy on your computer, which will do great harm and endanger the network security and our information security.

Fourth, online fraud.

Internet fraud is a fraudulent means to defraud other people's property in various forms on the Internet for a certain purpose. There are many ways. The openness of the Internet makes fraud rampant. If you are not careful about online trading, online dating, online certification, etc. You will fall into the trap set by criminals and you will suffer great losses.

Verb (short for verb) Internet addiction.

Internet addiction, also known as internet overuse or pathological internet use. Refers to the phenomenon that excessive use of the Internet causes obvious social and psychological damage. Although the network life is rich and colorful, the body is the capital of the revolution. Internet addiction will lead to physical decline, illness and addiction to the internet, which will not only hinder the development of thinking, but also easily form loneliness and even passivity in severe cases.