When it comes to telecom fraud, is this the image that pops up in your mind? "A PhD from the Chinese Academy of Sciences was deceived and taken abroad", "A female master's student from a 211 university encountered a scam and was defrauded of 1.38 million in two weeks"... Faced with the various tricks of the fraudsters, many people, whether highly educated or experienced, have fallen for it. According to China Mobile's Wutong big data, the fraud gangs have targeted a new target group: young people. Let's follow China Mobile's Wutong big data and take a look at today's new youth scams! The most common types of fraud scams Provincial distribution of the number of victims of online fraud per 100,000 people Birth Year of Fraud Victims Gender distribution of victims of telephone fraud Gender distribution of victims of various types of online fraud The most vulnerable online fraud schemes for people born in the 1980s and 1990s and their gender distribution
1. Anxiety and eagerness to make big money; 2. They have poor anti-fraud awareness and are easily deceived; 3. Lack of social experience and weak identification ability; 4. The dependence on high-tech products such as communication tools is relatively strong, personal information is more likely to be leaked, and the risk of exposure is greatly increased; 5. Many criminals have begun to use artificial intelligence and other means, such as AI voice calls and AI face-changing video calls to impersonate friends. Young people are exposed to many new things and are more likely to be scammed by new means. Young people who used to laugh at old-fashioned scams while surfing the Internet have now become the "hot commodity" of new telecommunications network fraud gangs. To prevent yourself from being scammed, you must remember: don't listen, don't believe, don't transfer money, strengthen your self-prevention awareness, and keep your wallet safe! |
<<: Light snow today | Why is “heavy snowfall” uncommon?
>>: Winter is coming! Are your children sleeping well while they are busy with their final exams?
In recent exchanges with some readers, I have dis...
1. Network Alliance Data Monitoring After an ente...
27.5 million years - this is the length of the Ea...
"We will not hinder the cooperation between ...
Have you ever noticed that some people often pick...
According to data from automotive data analysis c...
On September 17, the Shenzhou XIV crew conducted ...
When you search for a certain keyword, there will...
At the bottom of the spiral channel, there will b...
Mobile phones have become our close "friends...
Earlier this year, there were reports that Apple ...
This article mainly introduces relevant informati...
The main factors affecting the price of mini prog...
Science Fiction Network, January 6 (Xu Mingyang) ...