How To Prevent Hackers From Stealing Bank Cards In Life?
The important chip bank card should be placed in the shielded card sleeve, and a thin tin foil can also act as an isolation signal.
Don't trust news of unknown origin; right.
Personal information
Don't let it out; before you pfer, you must be vigilant and careful.
The audience queued through a "security gate", and the names, ID cards, bank accounts, recent paction information and account balance appeared on the front screen. This "security gate" simulated real life hackers attacking bank cards.
This is a scene that shocked everyone in the third capital network security day.
Xu Chuanzhao, a network security engineer of Qihoo 360 technology limited, said: "through this device, we can read all the information of our bank cards without contacting them, which means that all information is pparent in front of this system.
Using similar equipment to brush past you on the subway and bus, you can read your information away, do not need to do any contact with you, you can read it within a distance of about 15 centimeters.
Chip bank card users are important, he cautioned.
card
It should be placed in the card sleeve with shielding function, and a thin tin foil can also act as a signal of isolation.
With "
network security
China's "capital network security day", launched in Beijing on April 29th, will continue until May 1st.
In the context of network security becoming a national strategy and a wider impact on social life, the "capital network security day" is attracting more government departments, network security enterprises and ordinary netizens to participate, forming a "concentric circle" of "universal concern".
"Pseudo base station", "Trojan horse", "fishing"...
At the scene, even if some older Internet users talk about internet security, they will more or less come up with such new words.
Statistics from the Beijing Public Security Bureau showed that in 2015, the Beijing police cracked more than 4900 telecommunications network fraud cases, and arrested more than 300 suspects. They stopped the loss of the public by over 6 million yuan through technical interception, distribution control and stop payment.
However, it is an indisputable fact that the telecom network fraud is still an important threat to the security of the Internet because of a variety of reasons, such as the constant refurbishment of the technique.
Beijing police launched a campaign to crack down on telecom network fraud publicity experience in the "capital network security day" campaign.
"At least this is the first time that Beijing police have thoroughly analyzed the large-scale publicity experience exhibition of telecom network fraud."
Chen Ye, the head of the network security protection corps of Beijing Public Security Bureau, said.
In the exhibition, with the help of technical means and social engineering principles, the police made in-depth analysis of the 7 common telecom network frauds, such as "pseudo base station", "Trojan horse", "change number software" and "swindle Wi-F i". Meanwhile, they also provided an experience platform for the citizens to experience the process of committing crimes committed by telecom network suspects.
"It turns out that these swindlers can know all kinds of information and even the idea is very magical. After experiencing it, we discovered that they used social engineering and psychology to" hide "our secrets.
In the future, I will receive unfamiliar phone calls. No matter what they say, I have to have a heart to heart.
Mr. Lin, who visited the exhibition, said.
Chen Ye reminded people with simple and understandable words: first, don't trust the news of unknown origin; two, do not reveal personal information; three, be sure to be vigilant and careful before pferring.
- Related reading

Hangzhou P2P Stores Are Now Closed, And Relevant Departments Are Beginning To Investigate.
|- Telephone answering | 如何通過電話傳遞形象?
- Shoe Express | Shoe Enterprise Red Dragonfly Industrial Park Holds Garden Celebration
- Fabric accessories | Cotton Has Spawned Xinjiang'S Billion Fortune &Nbsp; Akesu'S Cotton Seed Area Has Reached Its Limit.
- Fabric accessories | Vigilance Of Foreign Capital Entering China'S Cotton Market
- business etiquette | 男人著裝易犯錯誤
- Exhibiting knowledge | Exhibition Knowledge: Booth Design And Construction
- Office attire | 辦公司的著裝禮儀
- Exhibiting knowledge | The Exhibition Industry Is Facing Severe New Challenges.
- Instructions for foreign trade | Customs Terms For International Trade
- Contract template | 翻譯合同范本
- Ba Lao Cautioned Against Investing In Rookies Without Blindly Managing Finances.
- How Can Executives Break Jobs And Switch To Commercial Real Estate?
- Friends Of The Shares Want To Break The Topic Of Traditional Department Store Pformation Force Is Very Sufficient.
- Liu Has Said That Fast Selling Will Become The "World First" Fashion Group.
- The Right Dress Is Fashionable.
- How To Match A Short Coat With Fashion Essence Is Actually Very Good.
- PRADA Is A Little Bumpy In The Way Of Going Public.
- Sogo And Jiu Guang Department Store'S Parent Companies Are Preparing For The Listing To Split The Mainland Business.
- Leather Is Not Just Black. You Can Live Your Life.
- Ode To Joy, Liu Tao And His Shirt Quickly Hit Each Day.