Notice: Undefined index: OS in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/const.inc.php on line 64 Notice: Undefined variable: siters in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 2414 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/const.inc.php on line 108 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 70 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 74 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 158 Notice: Undefined index: SID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 177 Notice: Undefined index: UID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 179 Notice: Undefined variable: UserName in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 180 Notice: Undefined variable: Mobile in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 181 Notice: Undefined variable: Email in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 182 Notice: Undefined variable: Num in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 183 Notice: Undefined variable: keyword in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 184 Notice: Undefined index: ac in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 189 Notice: Undefined index: CHtml in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 191 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 201 Notice: Undefined index: t in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 40 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined variable: strimg in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 1 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 617 Notice: Undefined index: enseo in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3076 Notice: Undefined variable: TPath in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 125 "Double 11" is coming. Beware of Internet fraud and stare at you-瞭望新时代网-瞭望时代,放眼世界

Culture

"Double 11" is coming. Beware of Internet fraud and stare at you

2021-11-02   

"Too hanging!" speaking of the "thrilling" experience a few days ago, online shopping lover Cheng Ying (pseudonym) is still terrified. "I did buy two kinds of masks on the electronic business platform. When the other party and I confirmed that the order information was absolutely correct, it was normal for me to refund the goods, but later I was asked to first add WeChat to the customer service, then scanned the two-dimensional code, log on the" refund Service Center "page, and fill out the bank account information. Something was wrong. I immediately raised my vigilance. " Posing as e-commerce customer service to actively refund, posing as acquaintances or leaders to borrow money, posing as "public security law" fraud... Nowadays, the methods of telecom network fraud are constantly renovated, and the confusion of fraud information is becoming stronger and stronger. At present, the "double 11" online shopping promotion activity has been launched on major e-commerce platforms. Behind the online shopping carnival, some fraud gangs are also ready to move, which are forcing consumers to improve their awareness of fraud prevention. "Tailored" fraud stems from personal information disclosure Some imperceptibly reduce the ID number in the dialogue between fraudsters and themselves. The Research Report on the governance of telecom network fraud under the new situation (2020) issued by China information and communication research institute points out that, unlike the widely spread and random fraud methods, precision fraud has become more and more common in recent years. Personal information disclosure is the key to its implementation. According to statistics, at present, more than 70% of telecom network fraud is related to personal information leakage or theft, and the proportion shows a continuous upward trend. Cheng Xiang, associate professor of the school of computer science at Beijing University of Posts and telecommunications, said that fraudsters have many ways and means to obtain users' personal information. For example, they buy personal information from intermediaries that collect and sell users' information in violation of regulations; Steal users' personal information by attacking enterprise and government servers; Steal user account password and other information by setting phishing websites and phishing Wi Fi; "Crawl" users' personal information from public social platforms such as microblog, forum and post bar. Fraudsters often renovate their deception around the online shopping scene, aiming at the fact that consumers will leave more personal information in addition to their name and telephone number, such as the information of purchased goods and contact address, so as to dispel each other's vigilance with a more accurate description. Posing as e-commerce customer service and actively refunding is one of the typical online shopping scams. In the "double 11" preheating activities, various promotional activities launched by many businesses will also be used by criminals to deceive consumers' trust. For example, using the "double 11" business to pre sell goods in advance to provide greater discounts, send short messages containing trojan virus links to consumers, attract customers to click and enter, and then steal customer information and account funds; Through some e-commerce platform red envelope promotion warm-up activities, distribute false red envelopes in wechat group to lure consumers to click and obtain personal bank account, mobile phone verification code and other information; Posing as Alipay flower or bank customer service, it lied that it could raise the credit limit, and then pay the "service fee" as the reason to induce the sweep code payment. In this regard, Cheng Xiang suggested that users should remember not to click on coupons or red envelope links when receiving various promotional messages, so as not to be used by criminals to steal personal bank account information. In addition, in order to prevent personal information from being stolen, he suggested that users should also take some avoidance measures. For example, at present, according to relevant national regulations, users need real name authentication when registering app. However, in addition to the registration with real identity information, other personal related information should still follow the principle of unnecessary filling in, so as to avoid being stolen and used by criminals. In addition, in daily life, if it is unnecessary, close the app to obtain sensitive information, such as location, address book, etc; Avoid using public free Wi Fi in public places to prevent criminals from stealing privacy; Delete the files and browsing traces in time after using the public computer; When uploading pictures on public social platforms, avoid uploading pictures containing personal information. Anti fraud measures are escalating The devil is a foot high and the Tao is a foot high. In recent years, public security organs have used big data to establish an accurate early warning mechanism and continuously improve their ability to monitor and intercept fraudulent calls and information. For example, the national anti fraud center app is a software organized and developed by the Criminal Investigation Bureau of the Ministry of public security, which can effectively prevent fraud and quickly report fraud content. It can not only identify fraud calls, fraud messages and fraud apps, give early warning, but also provide online reporting function, and regularly push anti fraud articles to expose the latest fraud cases, Help people improve their awareness of fraud prevention and reduce unnecessary property losses. At present, it has more than 65 million registered users nationwide, sent 23 million early warnings to users, and accepted 650000 clues related to fraud reported by the masses, which has played an important role in preventing fraud. Internet companies have never stopped in the innovative research and development of anti fraud technology products. The application of big data, artificial intelligence and other technologies in anti fraud is deepening. It is understood that the "wake-up hotline" developed by ant group is an interactive AI anti fraud applet that realizes interactive persuasion with users' telephone through automatic voice dialogue. When the system detects that the user is conducting a suspected cheated transaction, the AI robot will immediately initiate a call at the speed of 0.1 seconds, obtain key information from the communication, and then take appropriate and effective stop payment dissuasion to "wake up" the user. Gu Ming, senior director of big security of ant group, said: "in order to compete with swindlers, more than 90% of the calls of the 'wake-up hotline' are made by AI customer service, and the wake-up success rate has exceeded that of manual customer service." In addition, in the process of preventing telecom network fraud, telecom operators also play an important role. Cheng Xiang believes that in addition to strengthening the supervision and investigation of illegal numbers from the source and establishing an active interception mechanism for fraud calls and fraud SMS, telecom operators should use big data technology to automatically analyze and identify voice and SMS information suspected of fraud, determine whether users have been harassed by fraud information and take vigilant measures. The anti telecom network fraud law will work together with the personal information protection law In addition to technology, anti telecom network fraud also needs legal escort. In October this year, the draft anti telecommunications network fraud law (hereinafter referred to as the "draft") was submitted to the 31st meeting of the Standing Committee of the 13th National People's Congress for initial deliberation. The draft mentioned that personal information processors should standardize personal information processing, strengthen personal information protection, and establish a working mechanism to prevent personal information from being used for telecom network fraud in accordance with the personal information protection law and other laws and regulations. Xu Jiujiu, an assistant researcher at the Institute of law of the Chinese Academy of Social Sciences, said that personal information disclosure is often one of the important drivers of the success of Telecom fraud. It is of great significance to establish a special personal information protection mechanism at the legal level. The personal information protection law officially implemented on November 1 this year has created more mature conditions for anti telecom network fraud legislation. At the same time, the draft puts forward higher responsibility requirements for telecom business operators, financial institutions and Internet service providers to prevent telecom network fraud. These subjects are often closely related to the processing of personal sensitive information. Xu Jiujiu believes that this further highlights the linkage between the personal information protection law and the anti telecom network fraud law. In recent years, telecommunications network fraud continues to occur frequently. According to the information disclosed by the Supreme People's court in June this year, in some large and medium-sized cities, the number of such cases even accounts for 50% of criminal cases. Last year alone, the national telecommunications network fraud cases involved property losses of 35.37 billion yuan. "This draft strengthens the crackdown on telecom network fraud, promotes the port of legal governance of telecom network fraud, extends from downstream users to upstream information, greatly reduces the criminal space of personal information leakage and illegal trading, and will help to eradicate the 'gray soil' of telecom network fraud from the root." Xu Jiujiu said. (outlook new era)

Edit:Yuanqi Tang Responsible editor:Xiao Yu

Source:

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links