Joke Collection Website - Public benefit messages - Why do you need to uninstall mobile banking as soon as you open it?

Why do you need to uninstall mobile banking as soon as you open it?

10.38.04 In this case, the Android version should be uninstalled first, then disinfected, then downloaded in the mobile phone software mall, and then logged into the mobile phone bank when the mobile phone is safe. If you don't delete it, your mobile phone operation will be completely known to the other party, so there is a risk of losing money. Therefore, please don't click on the unknown SMS link on your mobile phone. The correct way to open the SMS is to open the SMS, select Join Blacklist, and then select Delete. Finding the corresponding application in the application settings, setting the blocked application as trust software, and shielding unnecessary risk tips of mobile banking can effectively prevent mobile banking from popping up tips. 10.38.04 Android version

1. First of all, don't download these illegal and harmful mobile phone applications to avoid unnecessary security threats to the mobile phone operating system. Secondly, it is suggested to turn on the "real-time monitoring" function of anti-virus mobile phone applications, actively defend the operation of mobile phones, and monitor the intrusion activities of unknown viruses at the first time. In recent years, under the background of information technology progress such as big data, personal information on the Internet has also been seriously leaked. Some applications excessively demand personal information. Data security and personal privacy protection have aroused widespread concern in society. This centralized rectification focused on issues such as failure to reach a privacy agreement, unclear description of the scope of personal information collection and use, excessive collection of personal information and unnecessary collection of personal information, and ordered 27 items to be rectified within a time limit, 63 items to be warned, and a fine of 10. Two other cases have been put on file for investigation, and related cases are under investigation.

2. At the same time of rectification, many state departments have also drawn a "red line" for application violations. On February 30th, 20 19, the National Internet Information Office, the Ministry of Industry and Information Technology, the Ministry of Public Security and the State Administration of Market Supervision jointly issued the Measures for Determining the Illegal Collection and Use of Personal Information by Applications, which clarified six articles, providing reference for the supervision and management departments to determine the illegal collection and use of personal information by applications. Shanghai securities news reporter noted that in the two illegal applications of "roll call", there were applications from banks and other financial institutions.

3. In fact, financial applications have always been the hardest hit area for personal information disclosure. The "20 19 Security Observation Report on Mobile Applications in Financial Industry" issued by China Information and Communication Research Institute found that 70.22% of applications in financial industry had high-risk vulnerabilities. Attackers can use these vulnerabilities to steal user data, forge applications, implant malicious programs, and attack services. , which seriously threatens the security of the application. At the end of the year and the beginning of the year, many signals indicate that financial service safety supervision will be upgraded in the future. Li Wei, director of the Science and Technology Department of the Central Bank, said earlier that in view of the uneven security protection capabilities of client software in some financial institutions, excessive collection of personal information and counterfeit "phishing", financial institutions should establish a full coverage mechanism for client software security management, and relevant departments should establish and improve a supervision and disposal mechanism for client software. It is understood that relevant departments have taken action around the security of financial services. For example, the central bank requires banks to conduct self-examination on violations of mobile applications. The person in charge of the relevant technology of a joint-stock bank told the reporter that the self-inspection has been completed and the rectification work has been completed, but many departments are normal needs and it is not appropriate to adopt a "one size fits all" approach.