From the convenience of throwing away express orders, take-away orders, to using keystrokes to cut off key information, and shredding small tickets; sending mail from aliases to the real-name system of the express delivery industry. It can be seen that in recent years, users’ awareness of information security protection has continuously increased.
For users, the common channel for information leakage is necessary for systematic protection of information security. Recently, Tencent’s mobile phone butler releasedSmartphone Life: Paying Virus Privacy Leaks Report (hereinafter referred to as 'Reporting', By introducing common privacy breaches, the 'blackmail chain' of 'personal information reselling' behind information leakage is analyzed to remind users to pay attention to information security in daily life.
(Figure: Tencent Mobile Manager 2017Years to block malicious URLs 1067Billion times)
There are many reasons for the leakage of user information, and the most typical ones are undoubtedly malicious websites and payment viruses. Among them, malicious websites often fake the real websites. URL address and page content, and often hidden in mobile SMS or informal websites to induce users to click, or collect user's online user accounts, passwords and other information to profit from selling or extorting users. “Report” shows only 2017Tencent Mobile Phone Manager Detects Malicious Websites 2837Thousands of times, intercepting malicious URLs 1067Billion times.
In addition to malicious websites, paying viruses is also a form of stealing user privacy commonly used by criminals. The link to pay viruses is embedded in the short message. As the sending of short messages, it is widely spread to the target user's mobile phone. “Report” analysis, users download and install After the malware, once the payment verification code message is received, the software will automatically read the verification code information in the background, and send the verification content to the criminals without the user's knowledge, so that it can steal the user's bank card. property loss.
(Figure: "Report" detailed analysis of the process of paying the virus)
With the increasingly complicated and hidden channels of privacy disclosure, the report finds that the user’s privacy information is also exposed to malicious reselling, and the reselling of personal information has formed a complete black industrial chain. Analyst Yang Qibo, Tencent mobile phone butler security expert, black The criminal gangs under the industrial chain have clear division of labor and clear responsibilities. Among them, some personnel collect and collect customer information through the paid software and specific websites. Subsequently, some people specifically think that the user calls the phone to defraud; Finally, the user is induced to make an online transfer. Fraud.
Prior to this, Ms. Huang from Guangzhou suffered a loss of personal information. 'Being Loaned.' At first, Ms. Huang contacted a loan agency loan through the Internet. After providing personal information and agency fees, he was blacked out by the intermediary with a problematic credit, and he thought the loan failed. In fact, Ms. Huang’s bank card was transferred. The loan of 8,000 yuan was only transferred to people on ten different occasions. It was the loan intermediary that Ms. Huang had contacted behind the scenes. After the loan intermediary company defrauded Ms. Huang of her personal information, she failed to use the loan for credit problems. Take away the loan.
face 'Personal information reselling' The black industry chain is a network of malignant tumors. The state has issued a number of policies on citizen information protection. For example, from 2017year From June 1st onwards, various laws and regulations such as the “Network Security Law” were formally implemented to severely crack down on information leakage and establish a line of behavior for the protection of personal information from a legal perspective. Continuous improvement of railways, telecommunications, banks, express delivery and social media platforms. The real name system certification system.
At the same time, Tencent’s mobile phone butler acts as a defensive line on the mobile terminal, not only through its own powerful harassment interception, virus killing and other functions, killing and stealing Trojan horses of privacy categories, phishing websites, and safeguarding the privacy of users’ information; Precise fraud caused by the leakage of personal information, Tencent mobile phone housekeeper relying on Tencent security capabilities, joint Tencent guardian program, linked to the police, operators, Internet companies, to achieve The anti-fraud model of 'pre-warning', 'interception in case', and 'back-to-back source' effectively prevents users from being tricked into cheating due to information leakage, and then builds a safer mobile ecological life.
From the convenience of throwing away express orders, take-away orders, using keystrokes to cut off key information, tearing up small tickets, sending mail from aliases to the real name system of the express delivery industry. It can be seen that in recent years, users’ awareness of information security protection has been continuously enhanced.
For users, the common channel for information leakage is necessary for systematic protection of information security. Recently, Tencent’s mobile phone butler releasedSmartphone Life: Paying Virus Privacy Leaks Report (hereinafter referred to as 'Reporting', By introducing common privacy breaches, the 'blackmail chain' of 'personal information reselling' behind information leakage is analyzed to remind users to pay attention to information security in daily life.
(Figure: Tencent Mobile Manager 2017Years to block malicious URLs 1067Billion times)
There are many reasons for the leakage of user information, and the most typical ones are undoubtedly malicious websites and payment viruses. Among them, malicious websites often fake the real websites. URL address and page content, and often hidden in mobile SMS or informal websites to induce users to click, or collect user's online user accounts, passwords and other information to profit from selling or extorting users. “Report” shows only 2017Tencent Mobile Phone Manager Detects Malicious Websites 2837Thousands of times, intercepting malicious URLs 1067Billion times.
In addition to malicious websites, paying viruses is also a form of stealing user privacy commonly used by criminals. The link to pay viruses is embedded in the short message. As the sending of short messages, it is widely spread to the target user's mobile phone. “Report” analysis, users download and install After the malware, once the payment verification code message is received, the software will automatically read the verification code information in the background, and send the verification content to the criminals without the user's knowledge, so that it can steal the user's bank card. property loss.
(Figure: "Report" detailed analysis of the process of paying the virus)
With the increasingly complicated and hidden channels of privacy disclosure, the report finds that the user’s privacy information is also exposed to malicious reselling, and the reselling of personal information has formed a complete black industrial chain. Analyst Yang Qibo, Tencent mobile phone butler security expert, black The criminal gangs under the industry chain have clear division of labor and clear responsibilities. Among them, some personnel collect and collect customer information through paid software and specific websites. Subsequently, some people specifically think that users call the phone to defraud; Finally, the users are induced to make online transfers. Fraud.
Prior to this, Ms. Huang from Guangzhou suffered a loss of personal information. 'Being Loaned.' At first, Ms. Huang contacted a loan agency loan through the Internet. After providing personal information and agency fees, he was blacked out by the intermediary with a credit problem, and he thought that the loan failed. In fact, Ms. Huang’s bank card was transferred. The loan of 8,000 yuan was transferred to the loan ten times on that day only. The behind-the-scenes hand is the loan intermediary that Ms. Huang had contacted. After the loan intermediary company defrauded Ms. Huang of her personal information, she failed to use the credit issue loan. Take away the loan.
face 'Personal information reselling' The black industry chain is a network of malignant tumors. The state has issued a number of policies on citizen information protection. For example, from 2017year From June 1st onwards, various laws and regulations such as the “Network Security Law” were formally implemented to severely crack down on information leakage and establish a line of behavior for the protection of personal information from a legal perspective. Continuous improvement of railways, telecommunications, banks, express delivery and social media platforms. The real name system certification system.
At the same time, Tencent’s mobile phone butler acts as a defensive line on the mobile terminal, not only through its own powerful harassment interception, virus killing and other functions, killing and stealing Trojan horses of privacy categories, phishing websites, and safeguarding the privacy of users’ information; Precise fraud caused by the leakage of personal information, Tencent mobile phone housekeeper relying on Tencent security capabilities, joint Tencent guardian program, linked to the police, operators, Internet companies, to achieve The anti-fraud model of 'pre-warning', 'interception in case', and 'back-to-back source' effectively avoids the tragedy of users being cheated due to information disclosure, and then builds a safer mobile ecological life.