Free Wi-Fi is prone to security issues and you should avoid online payments

Free Wi-Fi is prone to security issues and you should avoid online payments

Yesterday afternoon, on the "Financial Day" of the first National Cyber ​​Security Awareness Week, Wang Yonghong, director of the Science and Technology Department of the People's Bank of China, told the Beijing News that since free Wi-Fi without passwords is more prone to financial security issues, "in this Wi-Fi environment, users should try to avoid online payment or online banking operations."

Beware of hackers when using free Wi-Fi

Recently, some public Wi-Fi networks have repeatedly been exposed for stealing user information. In this regard, Wang Yonghong, director of the Science and Technology Department of the People's Bank of China, told the Beijing News that according to common experience, free Wi-Fi networks without passwords are more likely to have problems. "In this kind of Wi-Fi environment, users should try to avoid online payment or online banking operations."

"As an ordinary consumer, I think I should be cautious." Wang Yonghong suggested that mobile phones should be equipped with protection software. He believes that many risks and problems come from technical loopholes, so they should be balanced by technical means.

The reporter tested at the 360 ​​company booth and found that after connecting to a free Wi-Fi set up by a hacker, it only takes one second for a user's personal information to be stolen.

According to Qi Xiangdong, president of 360, hackers only need a computer, a wireless router and a network analysis software downloaded from the Internet to intercept user data. In addition, hackers usually set the Wi-Fi name to be very similar to the Wi-Fi names provided by shopping malls, operators, train stations, etc., without logging in with a password, to lure mobile phone users to connect.

China's Internet finance security is not inferior to developed countries

Wang Yonghong also said that the security of China's Internet finance is relatively high at present, and this security guarantee is not inferior to that of developed countries. The central bank has formulated a series of management measures to restrict the behavior of third-party payment institutions, and has also established a financial consumer protection bureau to follow up and handle customer complaints. The key work of the Science and Technology Department is to control online attacks and virus vulnerabilities.

"The risks that are most closely related to the people are application risks, such as Trojans and information leaks. Banks need to adopt many technical means and measures to control them, and the people need to improve their security awareness." He believes that payment loopholes caused by some phishing websites and Trojans have nothing to do with the payment system, and the lack of customer security awareness and prevention awareness is the most difficult to guard against.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  State Council: China's new energy vehicle production and sales will reach 9.587 million and 9.495 million respectively in 2023

>>:  Why can't we uninstall pre-installed software on mobile phones? The profit chain is shocking

Recommend

6 ways to promote brand marketing on Xiaohongshu

Today I want to share with you some little knowle...

Useful Information | What does a high-conversion information flow ad look like?

For information flow advertising , the content an...

Ajun's "Short Video Operation Course" systematic tutorial starting from scratch

Training course video content introduction: This ...

Data Operations: 6 Practical Data Analysis Models You Must Know!

For those who are new to data analysis, they ofte...

A "tornado" was created in a cooking pot?! Netizens were excited about the topic

recently Woman creates tornado in cooking pan It ...

Don't worry about MVC or MVP. Listen to me.

The full name of MVC is Model-View-Controller, wh...

A step-by-step guide to spam filtering with Python and Scikit-Learn

[[197427]] Text mining (getting information from ...

Progress bar! It's actually! Fake! What's the point of it?

In 1984, Jobs, who was only 29 years old, decided...