Joke Collection Website - Blessing messages - How to stop "stealing messages" in the middle of the night?
How to stop "stealing messages" in the middle of the night?
According to Beijing Youth Daily, at the beginning of this month, an old man fishing in the cold Jiang Xue and a netizen living in Shenzhen wrote that he got up that day and found that his mobile phone had received more than 100 verification codes, including Alipay, JD.COM and bank cards. The query found that "the money of Alipay, Yu 'ebao and related bank cards has been transferred away. JD.COM opened the function of gold bars and white bars, and borrowed more than 10,000 yuan. " ?
How can we prevent "stealing in the middle of the night"? With the help of security experts, the easiest thing is to turn off your cell phone before going to bed. There is no signal after the mobile phone is turned off, and the SMS sniffer device cannot get the phone number. It is good to make criminals' "dragon slaying skills" useless, but the problem is that it is unrealistic for many people to turn off their phones before going to bed because of the need to maintain smooth communication between their work relationship and their relatives and friends. It is unrealistic to sacrifice the normal use of mobile phone users for safety. ?
Of course, consumers can also use other tricks, such as turning off the mobile phone or turning on the flight mode immediately after receiving the verification code of unknown origin to escape from the coverage of the equipment; Change the network environment in time, reconnect the real base station, and investigate the abnormal malicious operation of the mobile App; In the setting of mobile phone, use "VoLTE" (a data transmission technology, which can realize simultaneous transmission of data and voice services in a 4G network without 2G or 3G) to protect information security; Close the confidential payment function of some websites and apps, and actively reduce the maximum daily consumption limit; Quickly freeze the bank card or payment account by entering the wrong password or reporting the loss. However, to block SMS "stealing in the middle of the night", we can't just rely on consumers "fighting wits". ?
In essence, stealing short messages in the middle of the night is not a crime of theft, but a crime of telecom fraud. The public security department and the Ministry of Industry and Information Technology should ban, confiscate and punish the number collection equipment (pseudo base station) and short message sniffing equipment used as illegal and criminal tools. Social workers who obtain the target person's ID number from relevant government and medical websites (by means of social engineering, by crashing into the database or by determining the person's information) or obtain the target person's bank card number through illegal means such as online banking social work library should also be punished in accordance with the Cyber Security Law, the Public Security Administration Punishment Law and the Criminal Law. ?
As early as 2065438+June 2005, the State Council approved the establishment of an inter-ministerial joint conference system composed of 23 departments and units to crack down on and control new crimes in telecommunication networks. The Ministry of Public Security has strengthened the cooperation between the police and banks, and worked with the People's Bank of China and other departments to formulate an emergency stop payment and quick freezing mechanism for new accounts involved in telecommunication network crimes, so as to realize the information exchange between commercial banks and the public security. 2065438+May 2006, the Supreme People's Procuratorate issued the Notice on Doing a Good Job in Combating and Rectifying Telecommunication Network Fraud Crimes, requiring the investigation and supervision departments of procuratorial organs at all levels to strengthen the connection with local public security organs, financial and telecommunications authorities. It is imperative to control the chaos of SMS "stealing in the middle of the night" and other similar multi-party linkage management. ?
It should also be noted that "stealing messages in the middle of the night" is also an act that endangers network security, and the security responsibility of website App cannot be ignored. According to China's network policy and relevant laws and regulations, network operators undertake security obligations for their websites and network products and services. The Network Security Law specifies the obligations of network operators in information security management system, user identity information review, personal information security protection, illegal information disposal, information recording, complaint handling, and cooperation with supervision and inspection. When the account login and fund operation are abnormal, the network platform should monitor and check. The convenient way to add SMS verification code to mobile phone number should be supplemented by technical means with higher safety factor, such as daily limit, face or password verification and other risk control measures. ?
As the Israeli historian yuval Harari said, the scientific and technological revolution is not a "knowledge revolution" but an "ignorance revolution". With the rapid development of Internet technology, new crimes like "stealing a brush in the middle of the night" will emerge one after another. Take precautions, build a strong line of defense against the rule of law, and unite the joint efforts from government departments to banks, telecommunications companies, online platforms and individuals, so that people really have no worries.
Source: paper net.
- Previous article:How to transfer the SMS of Samsung mobile phone to sim card?
- Next article:How to shop in Paipai.com?
- Related articles
- Sometimes you need SMS marketing and send it to many strange mobile phone numbers. The content is the same, but it is more troublesome. What can I do to make it more convenient?
- How long does it take Tik Tok to issue favorable comments and honor the ban?
- Missing relatives in Lantern Festival
- Memo and SMS address book of Apple mobile phone have been deleted. Can you get it back?
- What can be found in China Telecom's mobile phone bill inquiry? Can you find the message sent?
- WeChat wedding invitation
- Can the mobile phone print a short message list?
- About the store promotion plan
- Apply for a car sales interview and introduce yourself in 300 words.
- How to use collection method to realize effective collection of personal consumption in loans overdue? Ask everyone for help