"Hello, I am the customer service of ×× Express. Your package was lost during transportation. We will process a refund for you..." As the Spring Festival approaches, the increasingly intense festive atmosphere allows people to fully release their online shopping needs and enthusiasm. When we are immersed in the excitement of "shopping" and the joy of unpacking packages, and inadvertently receive such a "compensation call", what will you do? Recently, frauds impersonating courier customer service have become more common. Why do people still fall for telecom frauds, which have long been a "rat on the street"? Copyrighted stock images, reprinting may cause copyright disputes "Although anti-fraud technology and anti-fraud publicity are being strengthened, the fraud methods of online fraud gangs are also upgrading. When these 'routines' are suddenly 'updated', it is still difficult to guard against." Wang Peng, an associate researcher at the Beijing Academy of Social Sciences, said that listening to the professional rhetoric of the scammers on the phone, many people's first reaction is whether they can get compensation for their problematic packages. Then, the next step is "natural". Some people will be induced by the scammers to click on unfamiliar links or download unfamiliar apps, and fill in their personal information, bank card numbers, SMS verification codes, etc. without knowing what they are doing, and the money in their accounts will disappear. What makes the public lose their vigilance is not only their eagerness to recover losses, but also the fact that the fraudsters have obtained detailed online shopping information through illegal channels in advance. If the fraudulent calls are disguised as local numbers or courier company numbers, it is a complete and accurate fraud. There may be many factors that may lead to the leakage of personal online shopping information, but under the telecommunications real-name system, where do fraudulent phone numbers come from? How do they transform themselves? "Some of the phone numbers used for fraud are 'black cards' that are not registered with real names and purchased through illegal channels, while more are virtual numbers generated using tools such as Internet phone software." Ma Jihua, a senior analyst in the communications industry, said that by tampering with them through technical means, these numbers can be transformed into customer service numbers or local numbers, which is quite confusing. In addition to frauds impersonating courier customer service, frauds impersonating public security, judicial and bank customer service also use the same "routine". So, how can the public identify these fraudulent calls in daily life? In fact, we just need to remember that formal institutions will not ask you to provide important information such as bank card passwords and verification codes through phone calls or text messages, and will not let you click on unknown links or download unknown apps. "If the other party urges you to do these 'out of line' things in a tough tone, it is very likely a scam call, so just hang up directly," said Wang Peng. If you have disclosed some sensitive information of your own, you should contact the bank as soon as possible to freeze your account, change your password to prevent funds from being stolen, and call the police in time. "The battle between online fraud and anti-fraud will be a repetitive contest of 'the devil is one foot high, the way is ten feet higher'." Ma Jihua reminded that the public should do their best to improve their ability to identify and prevent fraud, not easily believe in strangers' calls and messages, and never disclose mobile phone verification codes. In addition, mobile phone security software should be updated regularly to reduce harassment and infringement from fraud calls. (Popular Science Times reporter Chen Jie) |
<<: AI draws quickly and well, so how does it draw?
>>: Don’t blame cold for knee pain! Research reveals coffee is an accomplice of knee arthritis
The launch of mini programs has brought convenien...
First, let me explain a concept. What is a growth...
At yesterday's WeChat open class, Zhang Xiaol...
You have heard the saying "eat more whole gr...
introduction A good brand story can establish bra...
Online content operations can be understood as th...
Baidu map marketing uses Baidu maps as a display ...
During APP operation , there are a large number o...
[51CTO.com original article] Thank you very much ...
"Asian Dragon" is the transliteration o...
Memory usage calculation formula for images Image...
Audit expert: Liu Xiangquan Director of the Robot...
Our lives have become increasingly dependent on t...
According to Xinhua News Agency, researchers from...
There is no big difference in the methods of doin...