Joke Collection Website - Public benefit messages - What are the main ways to disclose personal information?
What are the main ways to disclose personal information?
What are the ways of information leakage?
Be sure to use password-free WIFI with caution. The security protection function of these free WIFI is weak, and personal information is easily stolen by hackers.
If you need to transfer old mobile phones, old iPad, old computers, etc. , you must thoroughly clean up the data or restore the factory settings before selling.
It is best not to expose personal information at will on social networking sites, such as passports, ID cards, air tickets, etc. If you want to send it, remember to code the key information.
It is found that human reselling information, mobile phone leakage, PC infection and website loopholes are the four major ways to disclose personal information at present.
First, human factors, that is, employees of companies and institutions who have information actively resell information.
Case:
According to Beijing Evening News, from 2065438 to March 2005, six employees of education and training institutions in Beijing were tried and pleaded guilty by the court for illegally buying and selling a large number of personal information of students and parents, totaling more than 2 million pieces.
One of the defendants, Yang, a 25-year-old high school student, came to Beijing to work from the Oroqen nationality in Inner Mongolia. According to him, at 20 1 1, he went to work in an education and training institution and found that the company had a lot of parents' information, so he secretly copied some for sale. Yang has worked in at least three such institutions and obtained more than 2 million personal information of students and parents. Yang sold information in bulk on the Internet, with a profit of * * * 1000 yuan, with an average of 5 cents for each piece of information.
Another defendant, Xu, aged 37, holds a master's degree. He started a company on 20 1 1 and needed to enroll students. He just received a text message saying that he had data about the parents of the students. After contact, he spent 2000 yuan to obtain the parents' information of seven primary schools in Haidian, including the primary school attached to the University of Science and Technology. After that, he found a short message agency to send a large number of spam messages at a price of 5 cents each, which can increase the registration volume by 25% every year. At the same time, he increased the price to 20,000 yuan and sold some information to his peers.
The second is the information leaked through mobile phones. There are mainly the following ways: mobile phones have Trojans; Use the hacker's fishing WiFi, or your own WiFi is hacked; Mobile phone cloud service account is stolen (weak password or database conflict or service provider vulnerability). ); APP vendor servers with privacy rights were dragged by hackers; Visit phishing websites through SMS of pseudo base stations. , leading to the leakage of important account passwords; Use hacking devices such as malicious charging treasures; GSM network is monitored by hackers. Third, computers are infected with malicious software such as virus Trojans, which leads to the disclosure of personal information.
While enjoying the convenient and quick functions of the Internet, netizens accidentally infected malicious software such as virus Trojans, which led to the disclosure of personal privacy and important information. If you believe in fake Taobao and fake airline tickets, you will be cheated.
Fourth, the attacker uses the vulnerability of the website to invade the database that stores information.
From the website security attack and defense practice of 20 14, website attacks and vulnerability utilization are developing in the direction of batch and scale. Website security is directly related to a large number of personal information data, business secrets, property security and other data. After an attacker invades a website, he will generally tamper with the content of the website and implant black words and black chains; The second is to implant a backdoor program to control the website or website server; The third is to defraud the administrator's authority by other means, and then control the website or drag the library. Since 20 1 1, the information and data of about 1 1.2 167 million users have been leaked due to dragging and bumping into the library.
- Related articles
- Hello! I have an ic credit card of China Airlines Companion Dragon Card! SMS to become a member of Phoenix Companion! be
- The SMS reminds us that we are registering for WeChat.
- What is Unicom in the letter?
- What is the check code in the short message?
- Can you call 122 to report an emergency red light?
- How does Apple iPhone7 stop SMS harassment?
- How to deal with letters and visits that exceed the acceptance time of the inspection team
- Why can't my mobile phone receive the customer service SMS of China Mobile Unicom? . ?
- What if I forget my mobile phone number?
- Can I check the previous information content through the public security system after the phone number is cancelled?