当前位置:网站首页>360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times
360 digital released information security trends in January: 120000 fraud risks were captured and users were reminded 2.68 million times
2022-06-24 18:26:00 【TechWeb】
【TechWeb】2 month 21 Daily news , In recent days, ,360 The information security team of several departments is in-house 《 Information security monthly 》 Disclosure 1 Latest corporate governance data : Capture fraud risk 12 Ten thousand , Intercept risky loans 39 Time , Remind users 268 Ten thousand times .
meanwhile , The information security team warned of the recent high incidence of phishing mail fraud , The scam sent emails through hackers disguised as mature people , Get name 、 ID number 、 cell-phone number 、 Bank card number “ Four elements of personal information ” To commit fraud , Extremely confusing , Many people have been recruited . I would like to remind you not to open unknown emails at will 、 Don't click on the link 、 Don't disclose personal information easily , And summarize “8 see ” Tips to prevent fishing fraud attacks .
according to the understanding of ,360 The information security team of several departments introduces the latest management system released by the company in terms of data security to all staff in the form of monthly magazine every month 、 Training activities and action initiatives 、 And internal and external risk defense data , Supervise and urge 、 Report the promotion and implementation of data security law in the company .
Members of the security team present information , Phishing email refers to hackers disguised as colleagues 、 partners 、 Friends and other acquaintances , By sending e-mail , Entice the other party to reply to the email 、 Click the malicious link embedded in the email body or open the email attachment to implant a Trojan horse or spy program , Then steal user sensitive data 、 Personal bank account, password and other information , Or execute malicious code on the device to carry out further network attack activities .
Last year, near the Spring Festival ,360 The information security team of several sections monitored , A hacker organization borrowed “ Financial subsidies ” Use phishing mail in the name of fraud . In this phishing email , A swindler pretends to be a financial colleague of a company , Take advantage of employees' eagerness to receive year-end subsidies , Induce employees to fill in “ Four elements of personal information ”, That's the name 、 ID number 、 cell-phone number 、 Bank card number , In order to obtain sensitive information , Employees of many enterprises have been recruited , It brings great hidden dangers of information security .
360 Several security experts point out that , Obtaining personal information by phishing email is the tip of the iceberg of the black ash production data trafficking industry chain , It is also a part of the crime of Telecom fraud . After obtaining personal information, a special trafficking gang will package and sell the information with a clear price , There will also be groups through data “ Storehouse ” Means to steal more personal information .360 Released by digital information security micro laboratory 《 Black ash production data flow analysis report 》 Pointed out that , After criminals buy personal data , Use data for accurate fraud 、 blackmail and impose exactions on 、 Stealing accounts 、 Malicious Marketing 、 Malicious swiping and even engaging in illegal activities such as money laundering , Great harm .
Regarding this ,360 Several security experts remind you that you must improve your personal information security awareness , E-mail that involves filling in personal information , Be sure to carefully identify whether it is an internal email , If necessary, confirm with relevant colleagues of the company , To avoid unpredictable consequences , And summarize for you “8 see ” Tips to prevent fishing fraud attacks .

Look at the sender's address , Check whether the email domain name is correct , Pay attention to whether the spelling of Pinyin is abnormal ; Second, look at the recipient's address , When the recipient of mass email is not the same organization or there are strangers , Be sure to confirm again and again ; Third, look at the date of sending , Official mail non working hours , Need to be vigilant ; Look at the email title , Administrators 、 notice 、 Keywords such as meeting schedule need to be carefully screened ; Fifth, look at the wording of the text , Create an emergency atmosphere 、 Those who use generalized greetings should tighten their strings ; Sixth, look at the purpose of the text , Ask for a password 、 Personal information 、 Be careful when transferring and remitting money ; Seven, look at the text , Be careful when clicking on links , No spam “ unsubscribe ” function ; Look at the attachment , Download the attachment 、 Be sure to perform a security scan before executing the attached file .
边栏推荐
- Millions of dollars worth of NFT were stolen in the attack, and Google issued an emergency warning to 3.2 billion users worldwide | February 21 global network security hotspot
- C language - structure II
- LC 300. Longest increasing subsequence
- Php7.4.28 installing the pcntl extension
- Creating a new MySQL user in Amazon RDS environment - creating a new MySQL user in Amazon RDS environment
- What makes data analysts good- Cassie Kozyrkov
- 视频平台如何将旧数据库导入到新数据库?
- 专有云TCE COS新一代存储引擎YottaStore介绍
- Complete Guide to web application penetration testing
- Continue to help enterprises' digital transformation -tce has obtained the certification of the first batch of digital trusted service platforms in China
猜你喜欢

Nine practical guidelines for improving responsive design testing

He "painted" what a smart city should look like with his oars
![[untitled]](/img/ab/066923f1aa1e8dd8dcc572cb60a25d.jpg)
[untitled]

Number of occurrences of numbers in the array (medium difficulty)

How do yaml files and zmail collide with the spark of the framework, and how can code and data be separated gracefully?

About pyqt5 to realize paging function (one window implements different interfaces)

Four security issues of low code and no code development

Mengyou Technology: tiktok current limiting? Teach you to create popular copywriting + popular background music selection

Cloud service selection of enterprises: comparative analysis of SaaS, PAAS and IAAs

Business leaders compete for CIO roles
随机推荐
Design topic: MATLAB UAV flight operation
13 ways to reduce the cost of cloud computing
Several key points for enterprises to pay attention to digital transformation
Restcloud ETL extracting dynamic library table data
Uniapp wechat applet calls mobile map to navigate to the target point
股票网上开户安全吗?应该怎么办理?
Fragment usage
Bigdecimalavoiddoubleconstructorrule: do not directly use the double variable as a parameter to construct BigDecimal
TCE was shortlisted as a typical solution for ICT innovation of the Ministry of industry and information technology in 2020
From file:///etc/pki/rpm-gpg/RPM-GPG-KEY-mysql The GPG key to retrieve the key source "MySQL 5.7 community server" is installed, but not applicable to
Leetcode topic [array] -216- combined sum III
Leetcode topic [array] -46- full arrangement
Selection (033) - what is the output of the following code?
Three layer switching experiment
Analysis on the issue of raising the right of MSSQL in 2021 secondary vocational group network security competition in Shandong Province
How to decompile APK files
Six configuration management tools that administrators must know
持续助力企业数字化转型-TCE获得国内首批数字化可信服务平台认证
Common MySQL commands of installation free version
Specification for self test requirements of program developers