Home >

How To Prevent Hackers From Stealing Bank Cards In Life?

2016/5/2 15:01:00 45

HackersFraudulent Bank CardsSecurity

The important chip bank card should be placed in the shielded card sleeve, and a thin tin foil can also act as an isolation signal.

Don't trust news of unknown origin; right.

Personal information

Don't let it out; before you pfer, you must be vigilant and careful.

The audience queued through a "security gate", and the names, ID cards, bank accounts, recent paction information and account balance appeared on the front screen. This "security gate" simulated real life hackers attacking bank cards.

This is a scene that shocked everyone in the third capital network security day.

Xu Chuanzhao, a network security engineer of Qihoo 360 technology limited, said: "through this device, we can read all the information of our bank cards without contacting them, which means that all information is pparent in front of this system.

Using similar equipment to brush past you on the subway and bus, you can read your information away, do not need to do any contact with you, you can read it within a distance of about 15 centimeters.

Chip bank card users are important, he cautioned.

card

It should be placed in the card sleeve with shielding function, and a thin tin foil can also act as a signal of isolation.

With "

network security

China's "capital network security day", launched in Beijing on April 29th, will continue until May 1st.

In the context of network security becoming a national strategy and a wider impact on social life, the "capital network security day" is attracting more government departments, network security enterprises and ordinary netizens to participate, forming a "concentric circle" of "universal concern".

"Pseudo base station", "Trojan horse", "fishing"...

At the scene, even if some older Internet users talk about internet security, they will more or less come up with such new words.

Statistics from the Beijing Public Security Bureau showed that in 2015, the Beijing police cracked more than 4900 telecommunications network fraud cases, and arrested more than 300 suspects. They stopped the loss of the public by over 6 million yuan through technical interception, distribution control and stop payment.

However, it is an indisputable fact that the telecom network fraud is still an important threat to the security of the Internet because of a variety of reasons, such as the constant refurbishment of the technique.

Beijing police launched a campaign to crack down on telecom network fraud publicity experience in the "capital network security day" campaign.

"At least this is the first time that Beijing police have thoroughly analyzed the large-scale publicity experience exhibition of telecom network fraud."

Chen Ye, the head of the network security protection corps of Beijing Public Security Bureau, said.

In the exhibition, with the help of technical means and social engineering principles, the police made in-depth analysis of the 7 common telecom network frauds, such as "pseudo base station", "Trojan horse", "change number software" and "swindle Wi-F i". Meanwhile, they also provided an experience platform for the citizens to experience the process of committing crimes committed by telecom network suspects.

"It turns out that these swindlers can know all kinds of information and even the idea is very magical. After experiencing it, we discovered that they used social engineering and psychology to" hide "our secrets.

In the future, I will receive unfamiliar phone calls. No matter what they say, I have to have a heart to heart.

Mr. Lin, who visited the exhibition, said.

Chen Ye reminded people with simple and understandable words: first, don't trust the news of unknown origin; two, do not reveal personal information; three, be sure to be vigilant and careful before pferring.


  • Related reading

Hangzhou P2P Stores Are Now Closed, And Relevant Departments Are Beginning To Investigate.

Case direct attack
|
2016/5/2 12:05:00
153

The Logic Behind P2P'S Failure

Case direct attack
|
2016/5/1 21:54:00
210

How Big Is The Risk Of Bill Financing?

Case direct attack
|
2016/4/30 14:09:00
308

Global Counterfeit Sales Exceed $250 Billion A Year.

Case direct attack
|
2016/4/29 14:21:00
48

Yongan Tianlong Textile Dyeing And Finishing Company Will Be Subject To Administrative Detention At Night By Two Factories.

Case direct attack
|
2016/4/29 11:06:00
74
Read the next article

Obsessed With A Koji! Wang Ziwen Plays Well Outside Shoes.

Recently, are they all pursuing "Ode to joy"? Xiaobian is also fascinated by Qu Xiaobi, and Wang Ziwen's popularity has risen. Don't look at her as a small girl, but she has a good taste in dress, whether she is a private girl or a sports girl.