Joke Collection Website - Public benefit messages - What are the common means and methods of telecom fraud?

What are the common means and methods of telecom fraud?

The phenomenon of personal information disclosure and trafficking has become an important part of the black industrial chain of fraud crimes. Because many telecommunication network fraud methods are based on the premise and necessary step of obtaining the privacy information of the victim, it is very important for the broad masses of the people to take the first pass of personal information protection, prevent privacy leakage from the source and avoid property losses.

Coping method

(1) Protect personally identifiable information. Don't provide strangers with important information such as ID number, work unit, home address and position. Unless necessary. Don't store your ID card, photo or number in your mobile phone.

② Keep personal account information well. Before entering important information such as account number, mobile phone number and inquiry payment password in relevant websites, you should pay attention to verifying the authenticity of domain names, do not click suspicious links, do not connect to wireless networks of unknown origin, do not scan QR codes obtained through informal channels, and beware of fishing traps.

Never think that it is not a crime not to directly participate in fraud. Knowing that others use the information network to commit fraud and sell bank cards and mobile phone cards to provide convenience for others, it is suspected to constitute an illegal crime. If the circumstances are serious, criminal responsibility will be investigated.

Coping method

The masses should be vigilant, do not trust others, do not covet small profits, and do not sell, transfer, lease, sublet, lend or buy bank cards or payment accounts (WeChat, Alipay, etc. ) so as not to provide criminals with "tools for committing crimes." Otherwise, the non-counter business of bank accounts and all business of payment accounts will be suspended within 5 years, which will tarnish personal credit and affect loan processing.

* If criminal acts such as selling, renting or lending telephone cards and bank cards are found, they should report the case to the public security organ in time.

Some telecom network fraud cases reflect that there are obvious loopholes in the management of some people's bank accounts. Therefore, improving the security of bank accounts and "locking" your own accounts are the key links of risk prevention.

Coping method

① Set complex passwords for bank cards, online banking and mobile banking;

② Don't set the same user name and password as online banking and mobile banking on any other website;

③ Don't disclose or forward the dynamic password in the form of SMS verification code to anyone.

The victim's lack of financial knowledge or weak risk awareness is the direct reason why most telecommunication network frauds finally succeed. Therefore, improving the cognitive ability and self-protection ability of financial products and services is the core countermeasure for the masses to prevent fraud and avoid losses.

Especially in recent years, the victims of telecommunication network fraud are more extensive, and gradually spread from the elderly and the less educated groups to the middle-aged, highly educated and high-income groups. Strengthening the study of financial knowledge has become a compulsory course for everyone.

Coping method

The masses should pay close attention to the fraud cases reported by the media and exposed by the Internet, understand the recent modus operandi, and remind family and friends to be vigilant.

② Seriously study and keep in mind the safety tips pushed by telecom operators through SMS, as well as the risk prevention points released irregularly by public security organs through websites and official WeChat accounts.

Although telecommunication network fraud is pervasive, it is difficult to distinguish between true and false, but as long as the masses are always vigilant, develop good payment habits, and make the last pass of foreign transfer and remittance, they can still effectively avoid financial losses.

Coping method

① When receiving a transfer request from an acquaintance via SMS, WeChat, Weibo, QQ, email, voice, etc. , or ask for important information such as bank cards and online banking passwords, you should verify and confirm by phone;

(2) When strangers or long-lost "acquaintances" ask for remittance, they must be cautious, verify in many ways, and consult public security organs, banks, telecom operators and other institutions in time in case of suspicious circumstances;

(3) If it is really necessary to transfer money to the other party, you should try to choose the next-day payment method and verify it again afterwards. If there is any abnormality, it shall apply for cancellation in time;

④ Consumers with mobile payment habits should choose more secure payment products and download and install genuine application software;

⑤ Avoid storing too much money in the bank card bound with mobile payment software in order to spread and lock risks.