Joke Collection Website - Public benefit messages - The "breakthrough" of online fraud in the era of big data is full of loopholes.

The "breakthrough" of online fraud in the era of big data is full of loopholes.

The "breakthrough" of online fraud in the era of big data is full of loopholes.

In the era of big data, the disclosure of personal information makes information fraud more accurate. According to the Global Mobile Security Report for the First Half of this year released by Cheetah Mobile, among the major security incidents in the first half of this year, "cyber fraud 10086 points" topped the list. According to network security experts, forms of online fraud emerge in an endless stream, and pseudo base stations, spam, phishing websites and mobile trojans have all become "breakthroughs" in online fraud. "It is difficult to prevent SMS messages from pseudo base stations. The disguised identities of fraudulent short messages include operators, banks, insurance and even public security departments, which not only makes network security enterprises face more complicated "opponents".

According to the reporter's understanding, in the past, in the face of online fraud, Internet security companies often adopted a passive defense method of "finding a reminder once". With the in-depth application of big data in various fields of the Internet, Internet security companies have also begun to use big data to counter online fraud.

Linking "Police, Enterprises and People" with Database

In the eyes of many people in the industry, due to the concealment and diversity of online fraud, combining "police, enterprises and people" can not only give full play to the power of big data, but also effectively combat online fraud in a timely manner. As early as 20 13 and 12, the "world without thieves" anti-information fraud alliance was established, as the first anti-information fraud public welfare organization with full cooperation between police, enterprises and people in China. It is understood that the members of "world without thieves" Alliance come from various industries and fields, participate in the construction of * * * and enjoy the anti-information fraud database. This database is based on the "secure cloud database" operated by Tencent, including the largest malicious urls database in the world, the largest active telephone number database in China, and the first blacklist database of malicious fraud bank accounts in China.

Based on the big data analysis ability of the anti-information fraud alliance database, members of the alliance jointly mine and analyze the fraud information reported by the police, operators, banks, Internet companies and the public. Now a fraud case, the police can get the support of Tencent Security Cloud Library and other related companies. Therefore, as long as you get the phone number or bank account number used by the liar, you can quickly mine the identity of the liar, establish a relatively complete personal trace map, and accurately locate the whereabouts of the liar. E-commerce websites prevent scammers from registering to open accounts, and banks immediately intercept the funds transferred by victims. Tencent mobile phone housekeeper and the network and TV media participating in the alliance remind other users to avoid being deceived, thus forming an "anti-fraud closed loop".

The public participation in the reporting mechanism has achieved results.

Such an efficient system operation needs big data as a guarantee, and it is very important for users to report. In order to mobilize the enthusiasm of users to report telecom fraud and help the police solve the case, Tencent Mobile Manager, a member of the alliance, offered a reward of 500,000 yuan to help the police solve the case in the "National Anti-information Fraud Month" called by the "world without thieves" alliance, and now such a national participation mechanism has also achieved results.

In May this year, Guangzhou police, with the cooperation of Tencent's mobile phone housekeeper, arrested 27 criminals for 10086 integral fraud, covering all aspects of Trojan horse development, horse insurance and money laundering in the all-black industrial chain of 10086 integral fraud. According to the person in charge of the Guangzhou police case, the Guangzhou police received a report letter from Tencent's mobile phone housekeeper, and obtained clues such as the mobile phone number reserved by the fraudster to receive the short message through the report letter, and quickly locked the relevant fraudsters according to these clues.

"Tencent Mobile Manager screened the data reported by more than 800 million users and found a large number of fraudulent short messages disguised as 10086 points fraud, and found the mobile phone Trojan virus according to the phishing website in the short message, and decompiled the mobile phone Trojan virus to find the mobile phone number reserved by the fraudster." The person in charge of Tencent security said.

The above is what Bian Xiao shared with you about the breakthrough of online fraud in the era of big data. For more information, you can pay attention to more dry goods sharing of global ivy.