当前位置:网站首页>360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times
360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times
2022-06-24 18:26:00 【TechWeb】
【TechWeb】2 month 21 Daily news , In recent days, ,360 The information security team of several departments is in-house 《 Information security monthly 》 Disclosure 1 Latest corporate governance data : Capture fraud risk 12 Ten thousand , Intercept risky loans 39 Time , Remind users 268 Ten thousand times .
meanwhile , The information security team warned of the recent high incidence of phishing mail fraud , The scam sent emails through hackers disguised as mature people , Get name 、 ID number 、 cell-phone number 、 Bank card number “ Four elements of personal information ” To commit fraud , Extremely confusing , Many people have been recruited . I would like to remind you not to open unknown emails at will 、 Don't click on the link 、 Don't disclose personal information easily , And summarize “8 see ” Tips to prevent fishing fraud attacks .
according to the understanding of ,360 The information security team of several departments introduces the latest management system released by the company in terms of data security to all staff in the form of monthly magazine every month 、 Training activities and action initiatives 、 And internal and external risk defense data , Supervise and urge 、 Report the promotion and implementation of data security law in the company .
Members of the security team present information , Phishing email refers to hackers disguised as colleagues 、 partners 、 Friends and other acquaintances , By sending e-mail , Entice the other party to reply to the email 、 Click the malicious link embedded in the email body or open the email attachment to implant a Trojan horse or spy program , Then steal user sensitive data 、 Personal bank account, password and other information , Or execute malicious code on the device to carry out further network attack activities .
Last year, near the Spring Festival ,360 The information security team of several sections monitored , A hacker organization borrowed “ Financial subsidies ” Use phishing mail in the name of fraud . In this phishing email , A swindler pretends to be a financial colleague of a company , Take advantage of employees' eagerness to receive year-end subsidies , Induce employees to fill in “ Four elements of personal information ”, That's the name 、 ID number 、 cell-phone number 、 Bank card number , In order to obtain sensitive information , Employees of many enterprises have been recruited , It brings great hidden dangers of information security .
360 Several security experts point out that , Obtaining personal information by phishing email is the tip of the iceberg of the black ash production data trafficking industry chain , It is also a part of the crime of Telecom fraud . After obtaining personal information, a special trafficking gang will package and sell the information with a clear price , There will also be groups through data “ Storehouse ” Means to steal more personal information .360 Released by digital information security micro laboratory 《 Black ash production data flow analysis report 》 Pointed out that , After criminals buy personal data , Use data for accurate fraud 、 blackmail and impose exactions on 、 Stealing accounts 、 Malicious Marketing 、 Malicious swiping and even engaging in illegal activities such as money laundering , Great harm .
Regarding this ,360 Several security experts remind you that you must improve your personal information security awareness , E-mail that involves filling in personal information , Be sure to carefully identify whether it is an internal email , If necessary, confirm with relevant colleagues of the company , To avoid unpredictable consequences , And summarize for you “8 see ” Tips to prevent fishing fraud attacks .

Look at the sender's address , Check whether the email domain name is correct , Pay attention to whether the spelling of Pinyin is abnormal ; Second, look at the recipient's address , When the recipient of mass email is not the same organization or there are strangers , Be sure to confirm again and again ; Third, look at the date of sending , Official mail non working hours , Need to be vigilant ; Look at the email title , Administrators 、 notice 、 Keywords such as meeting schedule need to be carefully screened ; Fifth, look at the wording of the text , Create an emergency atmosphere 、 Those who use generalized greetings should tighten their strings ; Sixth, look at the purpose of the text , Ask for a password 、 Personal information 、 Be careful when transferring and remitting money ; Seven, look at the text , Be careful when clicking on links , No spam “ unsubscribe ” function ; Look at the attachment , Download the attachment 、 Be sure to perform a security scan before executing the attached file .
边栏推荐
- Optimizing bloom filter: challenges, solutions, and comparisons
- Wechat applet to realize stacked rotation
- Selection (033) - what is the output of the following code?
- Mengyou Technology: tiktok current limiting? Teach you to create popular copywriting + popular background music selection
- How to start cloud native application development
- TCE was shortlisted as a typical solution for ICT innovation of the Ministry of industry and information technology in 2020
- Why should state-owned enterprises accelerate the digital transformation
- Why are more and more people studying for doctors? Isn't it more and more difficult to graduate a doctor?
- Design topic: MATLAB UAV flight operation
- Eight recommended microservice testing tools
猜你喜欢

国家出手了!对知网启动网络安全审查
Online sequence flow chart making tool

Complete Guide to web application penetration testing

Exception: Gradle task assembleDebug failed with exit code 1

Creating a new MySQL user in Amazon RDS environment - creating a new MySQL user in Amazon RDS environment

ASP. Net hosting uploading file message 500 error in IIS
About swagger

NVM download, installation and use
SQL basic tutorial (learning notes)

How to select the best test cases for automation?
随机推荐
Top ten popular codeless testing tools
Why should state-owned enterprises accelerate the digital transformation
Constantly changing the emergency dialing of harmonyos ETS during the new year
What are the grades of financial products?
Why are more and more people studying for doctors? Isn't it more and more difficult to graduate a doctor?
Can the money invested in financial products be withdrawn at any time?
Flutter dart regular regexp matches non printing characters \cl\cj\cm\ck
The 'ng' entry cannot be recognized as the name of a cmdlet, function, script file, or runnable program. Check the spelling of the name. If you include a path, make sure the path is correct, and then
Etching process flow for PCB fabrication
Gateway solves cross domain access
He "painted" what a smart city should look like with his oars
Common MySQL commands of installation free version
How do yaml files and zmail collide with the spark of the framework, and how can code and data be separated gracefully?
专有云TCE COS新一代存储引擎YottaStore介绍
Leetcode daily question solution: 717 1-bit and 2-bit characters - reverse order
Knowledge points of 2022 system integration project management engineer examination: ITSS information technology service
Mariana Trench, Facebook's open source code analysis tool
How to decompile APK files
Selection (033) - what is the output of the following code?
Cloud service selection of enterprises: comparative analysis of SaaS, PAAS and IAAs