当前位置:网站首页>360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times

360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times

2022-06-24 18:26:00 TechWeb

【TechWeb】2 month 21 Daily news , In recent days, ,360 The information security team of several departments is in-house 《 Information security monthly 》 Disclosure 1 Latest corporate governance data : Capture fraud risk 12 Ten thousand , Intercept risky loans 39 Time , Remind users 268 Ten thousand times .

meanwhile , The information security team warned of the recent high incidence of phishing mail fraud , The scam sent emails through hackers disguised as mature people , Get name 、 ID number 、 cell-phone number 、 Bank card number “ Four elements of personal information ” To commit fraud , Extremely confusing , Many people have been recruited . I would like to remind you not to open unknown emails at will 、 Don't click on the link 、 Don't disclose personal information easily , And summarize “8 see ” Tips to prevent fishing fraud attacks .

according to the understanding of ,360 The information security team of several departments introduces the latest management system released by the company in terms of data security to all staff in the form of monthly magazine every month 、 Training activities and action initiatives 、 And internal and external risk defense data , Supervise and urge 、 Report the promotion and implementation of data security law in the company .

Members of the security team present information , Phishing email refers to hackers disguised as colleagues 、 partners 、 Friends and other acquaintances , By sending e-mail , Entice the other party to reply to the email 、 Click the malicious link embedded in the email body or open the email attachment to implant a Trojan horse or spy program , Then steal user sensitive data 、 Personal bank account, password and other information , Or execute malicious code on the device to carry out further network attack activities .

Last year, near the Spring Festival ,360 The information security team of several sections monitored , A hacker organization borrowed “ Financial subsidies ” Use phishing mail in the name of fraud . In this phishing email , A swindler pretends to be a financial colleague of a company , Take advantage of employees' eagerness to receive year-end subsidies , Induce employees to fill in “ Four elements of personal information ”, That's the name 、 ID number 、 cell-phone number 、 Bank card number , In order to obtain sensitive information , Employees of many enterprises have been recruited , It brings great hidden dangers of information security .

360 Several security experts point out that , Obtaining personal information by phishing email is the tip of the iceberg of the black ash production data trafficking industry chain , It is also a part of the crime of Telecom fraud . After obtaining personal information, a special trafficking gang will package and sell the information with a clear price , There will also be groups through data “ Storehouse ” Means to steal more personal information .360 Released by digital information security micro laboratory 《 Black ash production data flow analysis report 》 Pointed out that , After criminals buy personal data , Use data for accurate fraud 、 blackmail and impose exactions on 、 Stealing accounts 、 Malicious Marketing 、 Malicious swiping and even engaging in illegal activities such as money laundering , Great harm .

Regarding this ,360 Several security experts remind you that you must improve your personal information security awareness , E-mail that involves filling in personal information , Be sure to carefully identify whether it is an internal email , If necessary, confirm with relevant colleagues of the company , To avoid unpredictable consequences , And summarize for you “8 see ” Tips to prevent fishing fraud attacks .

Look at the sender's address , Check whether the email domain name is correct , Pay attention to whether the spelling of Pinyin is abnormal ; Second, look at the recipient's address , When the recipient of mass email is not the same organization or there are strangers , Be sure to confirm again and again ; Third, look at the date of sending , Official mail non working hours , Need to be vigilant ; Look at the email title , Administrators 、 notice 、 Keywords such as meeting schedule need to be carefully screened ; Fifth, look at the wording of the text , Create an emergency atmosphere 、 Those who use generalized greetings should tighten their strings ; Sixth, look at the purpose of the text , Ask for a password 、 Personal information 、 Be careful when transferring and remitting money ; Seven, look at the text , Be careful when clicking on links , No spam “ unsubscribe ” function ; Look at the attachment , Download the attachment 、 Be sure to perform a security scan before executing the attached file .

原网站

版权声明
本文为[TechWeb]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/02/202202211342575352.html