What will you do when an old friend suddenly finds you and asks to borrow your account on a platform for work tasks?
As a security engineer, I will warn you not to lend any of your accounts at any time, because even if your account password has not been told to others, criminals can find ways to implant Trojan viruses into your mobile phone and steal your money.
They often just need to send you an email, link, QR code to implant programs in your mobile phone, steal any of your information, maliciously eavesdrop on your user signaling and data, conduct consumption fraud against you, conduct pseudo base station attacks, and so on.
In the 5G era, there is not only communication equipment, but also various devices connected to the Internet of Things (cars, monitoring…) in our life will collect a large amount of users’ private information, including health status, personal preferences, social security information, life footprints, etc.
In the age of big data, it has become a major challenge for cyber security to protect privacy in an all-round way.
Therefore, you can not only send your account password information, but also pay attention to the following privacy protection methods.
Firstly, do not download apps on unofficial platforms.
Both Android and iPhone have an official app download center. We only believe that apps on official channels will provide more security. The so-called “security protection” app downloaded unofficially may actually be a tool for intercepting and forwarding SMS messages on your mobile phone.
Secondly, do not enter your face and fingerprint randomly.
Now various intelligent devices, such as smart bracelets, smart speaker biometric recognition systems, and intelligent medical systems, are widely used, and personal information collection is comprehensively collected. Including face, fingerprint, voiceprint, iris, heartbeat, gene, etc. These information are unique and immutable, and will have serious consequences once leaked or abused.
For example, it has been exposed that a large number of face photos collected by a large number of stores have been leaked without the consent of users. These face photos have more or less flowed out of the black products, which will lead to fraud or financial security risks.
Thirdly, password protection. The passwords of each APP cannot be exactly the same.
Most people will not set multiple passwords for their Internet assets. Then the hacker will collect the user and password information leaked by the Internet on a website, generate the corresponding dictionary table, and try to log in to other websites in batch for database collision. Because many users use the same account password on different websites, hackers can try to log in to the B website by obtaining the user’s account on the A website.
Fourthly, don’t click the connection on the SMS and email.
For hackers, obtaining user credentials through phishing is a tried and true method. They may send you emails to lure you into a trap with false information. Most of these emails entice you to fill in your financial account number and password by winning a lottery, consulting, checking accounts, etc., or require the recipient to log in to a web page and submit information such as user name, password, ID number, credit card number, etc. for various urgent reasons.