Joke Collection Website - Public benefit messages - What should I do if the mobile phone information is leaked?
What should I do if the mobile phone information is leaked?
The information of our mobile phone is leaked, mostly because we are often asked to "use your location" when installing some games or software. Once we click "Allow", we can scan the mobile phone information and upload it to the Internet cloud server. Once the information in the mobile phone is leaked, others may know your location, who to talk to, what games to play and your home location. . So we should try to avoid clicking "Allow".
It is also possible to report the case to the relevant departments. Once personal information is leaked, you can complain to the public security department, Internet management department, industry and commerce department, consumer association, industry management department and relevant institutions. The purpose of reporting a case is to protect one's own rights and interests, and the other is to file a case. Once more people encounter similar situations to yours, they can deal with them together. According to the relevant provisions of the Criminal Law, if the circumstances of selling or providing personal information of citizens to others or illegally obtaining personal information of citizens are serious, it may be suspected of a criminal offence, and the public security organ may intervene in the investigation.
2. Is the problem of mobile phone information leakage serious in China?
China Internet Network Information Center (CNNIC) released "20 15 cmnet User Network Security Report", which shows that as of 20 15,12,95.
9% mobile phone users encountered mobile phone information security incidents on 20 15, of which 52. 7% of users think that there is no loss.
The proportion of users who spend time and energy solving problems because personal information disclosure affects normal work and life and mobile phone security is 26. 4% and 26.
1%; The proportion of direct economic losses caused by the loss of user phone bills, traffic or account funds is 8. 9%。
The report pointed out that in 20 15 years, the number of mobile phone information security incidents in China increased significantly, among which the user coverage of harassment security incidents was very high, and the user coverage of harassment, advertising phone calls and illegal advertising messages were all above 75%. The information security incidents of stealing users' information through mobile phone viruses and malicious software have not reached 20%, but their means are becoming more and more hidden, and most users' personal information is difficult to detect after being stolen.
The report shows that although the proportion of users' awareness is low, the affected groups of mobile phone viruses and malware have increased in 20 15 years. According to the report, 8% of mobile phone users think it is very safe or relatively safe to use their mobile phones to surf the Internet.
3. What should I do if my mobile phone number is leaked?
1. Usually handle bank cards, register online, buy a car, etc.
A lot of harassing phone calls are because you accidentally revealed your number when registering on a website, especially some shopping websites. Any link may leak information.
Countermeasures: Don't use your mobile phone number to register some shopping websites at will.
2. Fill in the street questionnaire survey at will.
You often meet people who need to fill out questionnaires in the street. At the end of the questionnaire, others will ask you to leave your contact information. If you leave the correct number, you should be worried. You get calls from many different people every day.
Countermeasures: fill in the street questionnaire survey, and don't fill in the real mobile phone number at will.
3. Express parcel list.
Every time we receive a courier, many people throw away the logistics belt with the name and phone number written on it, which is also a way to reveal our personal information.
Countermeasure: Personal information must be smeared out and then discarded in the received package.
4. Second-hand mobile phones are sold.
We will format the old mobile phone when it is sold, but in fact, the deleted data can be recovered through some technologies. Netizen @ Mr. Yu sold his old mobile phone to a mobile phone dealer after deleting the information. Unexpectedly, the criminals recovered the information in the mobile phone through technical means, and found his bank card account number and other information through the verification SMS of the previous bank or the SMS of relatives and friends, and transferred more than 65,438+10,000 yuan from online banking.
Countermeasures: Before selling old mobile phones, use special software to clear the data of mobile phones.
In addition to the above methods, you need to install a security software on your mobile phone. These security applications have the function of helping to intercept all kinds of harassment. When a mobile phone receives a harassing call, it will display the "advertising promotion" that the number has been marked by ten thousand people, so you don't have to waste your breath on a strange harassing call.
You can also blacklist such harassing calls, set them to "busy tone" or "empty number", and then receive a specific harassing call, which is likely to give people the illusion that the other party has been unable to connect and does not need to call again. The role of the safety housekeeper is not limited to this. For example, the manual inquiry function of 360 Mobile Guard allows mobile phones to accurately display their names when calling WeChat official account, such as strange businesses and banks, so as to prevent fake official phone fraud.
4. How to prevent mobile phone information from being leaked?
1. It is not easy to crack the terminal operating system.
PS: We usually say "jailbreak" (IOS system), "ROOT”(Android system) and other operations to improve permissions. If the system is cracked, the update can't work normally, which is prone to system bugs and security loopholes, increasing the risk of encountering malicious programs and Trojan viruses. Once recruited, all the information in our mobile phone will be "shared" by others. If there is no special reason, don't crack the system, don't brush the machine.
2/6
2. Don't trust strange text messages.
Telecommunication fraud is rampant day by day, and the means are endless: disguised as "official tone", "loophole escalation", "lucky winning" and "bank card problem" and so on. When you receive SMS, email or news of unknown origin, remember not to be greedy and cheap, not to be deceived by attractive content, and not to click on links easily to avoid being "fished".
3/6
3. Is it safe to put data in the "cloud"?
Many times, in order to make room for mobile phones and facilitate their use, we will choose to upload data to the cloud. Even turn on automatic synchronization. However, in terms of preventing information leakage, don't turn on automatic synchronization, choose manual, encrypt and upload private information to the cloud. Information storage is mainly based on hard disk and USB flash drive.
4/6
4. Be careful with funds.
Mobile online shopping has become an indispensable part of our daily life. We should pay attention to the safety of online banking operation and have the awareness of controlling risks. Don't involve too much in binding bank cards. It's best to open a new card, and don't put too much money in the card to minimize possible losses. At the same time, paying attention to the real-time update of the mobile phone system can plug the loopholes in time and avoid being infringed by malicious applications.
5/6
5. Use public Wi-Fi with caution.
Although Wi-Fi has become a standard in public places, remember not to connect easily without any encryption or free Wi-Fi. Because such a network can easily expose your equipment to an unsafe network environment, your mobile phone may also be attacked and implanted with Trojans. At the same time, don't use software such as "Wi-Fi Master Key" and "Free Wi-Fi". The security of these softwares is debatable. Your Wi-Fi password may be shared by others and there is no security at all. It is best to put an end to such Wi-Fi. If you want to connect, avoid using your mobile phone to do things involving privacy.
6/6
6. Be careful when handling used mobile phones.
Used mobile phones and memory cards usually store previous address books, short messages, call records and graphic materials. Even if it is deleted, it can be easily restored by software. Therefore, used mobile phones need to be handled carefully, and the data in the mobile phones need to be cleared, and then the factory settings need to be restored.
In fact, Bao Xiao has a better suggestion: send the old mobile phone to Bao Xiao. There are professional information crushing methods here, which can make the data be overwritten repeatedly and avoid the possibility of privacy leakage. In this way, even after the data is restored, the privacy of users will not be threatened.
5. How was the phone number leaked?
Correspondent to answer!
I believe that everyone has been harassed by various intermediaries and insurance calls, so where did our information leak?
I still remember, on a hot summer day, you saw a booth filled with membership information of free drinks in the street, and you drank one to quench your thirst. I still remember one afternoon after school, smiling sister asked you to fill out a questionnaire, saying that it was to test your English ability, and then she would arrange free courses for you. I still remember that one day you opened a blog, and in the middle of browsing, a window that you must register to continue browsing suddenly popped up; I still remember that you got a call from the courier and got the courier happily, but you discarded the courier number without any treatment.
Unexpectedly, one day, just as you were waiting for an important call, it was really a harassing call: "Hello, do you need to buy a house?" "Do you need to buy insurance?" "Sign up for a class!"
It's really annoying, but the fact is that your information was inadvertently leaked.
But the phone number has been leaked. Is there any remedy?
The answer is yes.
First of all, after you receive a harassing call, mark it on the mobile phone guard. In the future, if you receive a harassing call, it will automatically block and send you a reminder.
In addition, operators have also launched harassing phone screening services, such as China Mobile's high-frequency harassing phone interception service, which can be opened by sending short messages. It is more reassuring to have a blacklist in the operator.
Finally, we should always pay attention to our personal privacy, and in some places where personal information needs to be filled in, we should pay attention to whether the information collection agency is reliable.
If you think my answer is helpful to you, remember to like it ~ thank you!
6. What should I do if the privacy of my mobile phone is leaked?
hello
The best way to reveal the privacy of mobile phones is to install only one security management software.
Can help you intercept harassing calls, text messages, trojans and so on.
You can try Tencent Mobile Manager.
With intelligent interception system and number recognition function, it can intercept all kinds of strange numbers and harassing short messages.
I can also help you set up a private space and add passwords to photos, text messages and other files.
The mobile phone anti-theft system can be linked to its own buckle, and you can remotely control the mobile phone by sending a short message.
You can delete pictures or text messages from your mobile phone so that thieves can't peek into your privacy.
I hope I can help you who want to adopt!
7. The privacy of my mobile phone seems to have been leaked. What should I do?
Nowadays, mobile phones are more and more developed and have many functions, so it is easy to reveal privacy.
In order to better protect the security of your mobile phone, you can install some security management software.
Teng Xu mobile phone housekeeper is not bad, you can try it.
The operation is very simple, and the picture is clean and tidy.
The key is that this privacy space can be hidden at will.
You can use two fingers to slide in the opposite direction at the same time to display private space.
Two fingers slide inward at the same time to hide private space.
This is a bright spot!
After entering the private space, you can choose the pictures, short messages, files and so on you want to hide.
Make your encrypted files more secure.
8. What should I do if my mobile phone number reveals personal information?
Personal information of mobile phone number is leaked * * * Mode: 1. According to the National People's Congress Standing Committee (NPCSC)'s Decision on Strengthening the Protection of Network Information, individuals who encounter information leakage have the right to immediately ask network service providers to delete relevant information or take other necessary measures to stop it.
2. Individuals can also make complaints and reports to public security departments, Internet management departments, industrial and commercial departments, consumer associations, industry management departments and relevant institutions. "The China Internet Illegal and Bad Information Reporting Center affiliated to the National Network Information Office will fully accept and handle public reports on Internet illegal and bad information."
3. Consumers can further safeguard their legitimate rights and interests through legal means according to the Tort Liability Law and the Consumer Protection Law, such as asking the infringer to apologize, eliminate the influence, restore reputation and compensate for losses.
- Previous article:Thanksgiving greetings to parents and children in kindergartens.
- Next article:SMS notification for urging salary before Chinese New Year.
- Related articles
- What does it mean for Ping An Credit Card to be overdue?
- Can't you buy lottery tickets if you can't play?
- How to unlock oppo SMS password
- China Bank's online banking domestic inter-bank transfer transaction failed, suggesting that it is not the trading time. What is the reason?
- How does Huawei's mobile phone completely intercept SMS?
- The latest news of Yasongju epidemic in Chengdu, Sichuan issued an emergency notice on epidemic prevention and control.
- 95533 SMS service fee payment
- Congratulations on the opening of the tea shop.
- The girl who was "picked up": overestimate human nature and life will suffer.
- Is there a charge for handling industrial and commercial bank cards? how much is it? How much is the annual fee?