Current location - Music Encyclopedia - Dating - How to ensure personal internet safety
How to ensure personal internet safety
Introduction With the popularity of Internet applications and people's dependence on the Internet, the security problems of network information are becoming increasingly prominent. Malicious programs, all kinds of phishing and fraud continue to grow at a high speed. At the same time, hacker attacks and large-scale personal information disclosure incidents occur frequently. Accompanied by the substantial growth of various cyber attacks, the disclosure of personal information and property losses of a large number of netizens are increasing. So, how can we ensure personal internet safety? Next, look at the instructions!

Anti-fraud tips for network security Common online fraud means

① Pretending to be a police system APP fraud; 2 compensation fraud; 3 cottage WeChat fraud; 4 account verification fraud; (5) fictional house purchase and tax refund fraud; 6 false winning fraud; ⑦ Remit money for emergency fraud; (8) posing as a leader for fraud; Pet-name ruby telephone arrears fraud; Attending to provide free low-interest loan fraud; _ dating fraud, etc.

5. Don't

Don't be credulous: Don't be credulous of phone calls and short messages from unknown sources, and don't give criminals a chance to set traps further.

don't disclose: under any circumstances, don't disclose the identity information, deposits, bank cards, etc. of yourself and your family to the other party.

No transfer: Editor Maigoo reminds me to keep the funds in my bank card safe and not to send money or transfer money to strangers.

No call back: For customer service consultation, please dial for details? Don't call the contact information provided in strange information easily.

don't click: free prize, video album, low-price snap-up, upgrade and download, points redemption? .. don't even click.

network fraud prevention and two verifications

verify the transfer request: if others ask for borrowing money, making money, online payment, recharging, etc., all cash transactions must be confirmed in person or by telephone.

verify suspicious information: strange and suspicious short messages, telephone QQ, wechat, emails, notifications, etc. are verified through official channels such as offline business halls and official websites.

network anti-fraud jingle

You should be careful when surfing the network, and the fraudulent means are frequently refurbished. Be wary of making friends online, which will make you tired of remittance.

It is most common to pretend to be poor and sick, so I feel sorry for you and cheat you. Stealing QQ to strike up a conversation, pretending to be friends and borrowing money skillfully.

A big cheat often cheats a good friend, but it's a shame to get it if you want it. Investing in wealth management and stocks is mostly a scam.

the so-called insider and information are all tricks. Don't be surprised to fly to the grand prize, and the money hole is bottomless.

There are many traps in online shopping, so safe payment is very important. It is difficult to distinguish between true and false online stores, and you are cheated if you shop carelessly.

don't believe unknown calls, and keep family information confidential. It is really difficult to tell the truth from the falsehood, and it is necessary to prove it in many ways.

Common means of telecom fraud, common ways of mobile phone fraud, how to do online part-time job fraud? Pay attention to the convenience and benefits of online shopping, which makes many people become "hands-chopping people". When everyone enjoys online shopping, the account risks brought by online shopping are also increasing day by day. Maigoo Xiaobian has compiled a little knowledge about online shopping security. Let's learn about it together.

Common online shopping traps

① The fake website "confuses the real with the fake"; ② No third-party payment function; 3 Bad stores occupy the front page, hanging sheep's heads and selling dog meat; 4 fake reputation, fake diamonds, fake crowns; (5) the goods are genuine and shoddy; 6 "second kill" and group buying are also deceptive; 7. Talking like a book is confusing.

How to purchase online safely

Grasp the knowledge of online shopping safety: Inexperienced friends can consult friends who are familiar with online shopping, or choose to read the information of anti-fraud common sense provided by netizens or third-party guarantee institutions to master the basic knowledge of online shopping safety.

beware of the trap of low price: online shopping goods have the advantage of low price, but the low price is limited, and too low price may hide a trap.

choose a safe payment method: many shopping websites provide large-scale third-party guaranteed payment platforms, and many merchants also provide cash on delivery.

don't provide SMS verification code: in online transactions, SMS verification code is equivalent to a "one-time password", and there is no need to provide SMS verification code to the other party for any online shopping operation.

online payment security, consumer rights protection, online shopping scam, revealing four kinds of links for online personal information security protection

online test: during the test, the name, birthday and mobile phone number of the input person will be stored in the background, and it is possible to piece together complete personal information.

QR code of unknown origin: Don't trust the QR code information of unknown origin. Once the water horse virus is implanted in the QR code, you can steal the online banking password and transfer the money away.

SMS link: if the content of the received SMS involves the URL, try not to click it when you are not sure about the sender of the SMS.

Links on social platforms: Don't click on the network links sent by strangers on social platforms at will, and don't enter bank card information or payment password information in the links at will.

There are four functions to turn off

People nearby: the "People nearby" function on WeChat can locate your location. Click "Settings-General Function-People nearby" and select "Clear and disable".

Frequently visited places: Apple's mobile phone system has a "Frequently visited places" function, which will display the places you frequently visit. Click "Settings-Privacy-Location Services-System Services-Frequent Places" and close it.

allow search: in wechat privacy, turn off "search me by QQ number" and "search me by mobile phone number".

Allow viewing: 51Dongshi net editor reminds you to turn off "Allow strangers to view ten photos" in WeChat Privacy.

Don't print four kinds of information

Ticket information: The bar codes or QR codes of air tickets and train tickets contain passengers' personal information, which may be stolen by high-tech means.

Passport, key, license plate: Photos with private information will reveal your specific location at a specific time, as well as the scope of your life circle.

location: publishing pictures with location information will expose real personal information and increase the success rate of criminals.

Address: Don't expose buildings, landscapes, etc. where your home address is obviously exposed. People with ulterior motives can use the map to "step on the spot".

Pay attention to how to ensure the safety of mobile phone network when surfing the Internet in public places. Pay attention to the safety of daily use of mobile phones

1. Don't trust external networks easily, and be careful when connecting unknown Wi-Fi.

2. Be alert to strange phone calls and text messages. Don't believe the contents easily, and check them when something happens.

3. It's best to use this machine's 4G traffic for mobile payment, and be wary of easy connection with free WiFi to prevent Alipay password from being stolen.

4. Don't browse very popular mobile phone websites, and don't click on the pictures or links on the websites at will.

5. Download genuine software in the formal application market and official website.

6. Don't lend your mobile phone to outsiders at will. After all, it contains your private information.

Safe handling methods for old mobile phones

1. Completely delete private information when changing mobile phones.

2. restore the factory settings or format of the mobile phone, and then store some other irrelevant contents to fill up the storage space of the mobile phone. After repeated several times, the original data is difficult to recover.

3. Don't throw away your mobile phone as ordinary household garbage.

4. Put the private files in the memory card. When changing the mobile phone, just take out the memory card and insert a new mobile phone.

what should I pay attention to when canceling my mobile phone number

1. Unbind my mobile phone number from banking services, such as U shield, online banking, mobile banking, SMS notification, etc.

2. Unbind from payment platforms, such as Baidu payment wallet, WeChat, Alipay, Taobao platform and so on.

3. If the mobile phone number was previously bound to financial services such as securities and fund accounts, it also needs to be unbound.

4. Some websites need to fill in the associated mobile phone number during the registration process, and these websites also need to be unbound and associated.

5. Unbind the mobile phone number from the accounts and software of common websites to prevent the existing accounts from being changed and used because of the cancellation of the mobile phone number.

More computer network security software recommends computer system tools

System tools are not the software that comes with the computer system, but the software that is produced and packaged by the company and is suitable for a class of systems according to requirements, and is mainly responsible for system optimization and system management.

computer anti-rogue software

Maigoo xiaobian reminds that anti-rogue software has the functions of cleaning up rogue software and protecting system security. Under normal circumstances, anti-virus software also has the function of cleaning up rogue software, but some manufacturers regard it as a computer security software product alone.

Computer encryption software

can be divided into passive encryption and active encryption according to the implementation method. At present, the transparent encryption technology of the driver layer on the market has become the most reliable and safest encryption technology, and the representative manufacturer is Guangdong Southern Information Security Industrial Base.

pay more attention to the network security of the company. Anti-virus software brands, recommended brands kaspersky, Kaspersky, Norton, Norton, Microsoft 36 security guard Avasta, this data is provided by cnpp brand "Research Institute" for reference only! It is recommended to read 1 Answers to Frequently Asked Questions on Enterprise Safety, such as fire fighting, theft prevention, information leakage, property insurance, auto insurance, etc. Many enterprise managers want to make the company develop steadily, operate steadily and increase its scale significantly, but modern enterprises are fiercely competitive and face ...

2 Smart home security understands smart home system and product knowledge, and is convenient and safe for peers. With the continuous advancement of internet plus, smart homes are beginning to emerge in the market. There are many products covered by the smart home industry. Apart from the smart ...

3 Mobile Phone Safety User's Manual, how to use the mobile phone correctly and safely, the free WiFi hotspot can successfully steal the system, brand model, selfie photos, mail ...

4 What kinds of online payment are there? The security problems of mobile payment and its prevention lead to a new wave of cashless transactions. Mobile payment is integrated in mobile phones, which is small and convenient to carry, without cash, and is not afraid of losing money ...

5 Fire safety knowledge explains the types _ causes _ hazards _ prevention _ escape and self-help. A merciless fire is a natural force for human survival and development. It can be said that without the use of fire, there would be no material civilization and spiritual civilization today. ...

6 What are the safety precautions for different groups of people? Safety knowledge necessary for daily life is closely related to our daily life, which is embodied in all aspects of life. If we don't pay attention to them, various accidents may occur. ...