took stock of ten hidden dangers and preventive measures, which many people may use.
Hidden danger 1: Nowadays, it is common for everyone to replace mobile phones. So what to do with the replacement phone? People who throw it away or sell it for recycling will choose to clean up their mobile phone data. Many people think that it is enough to delete photos and files. But in fact, the content you deleted is just invisible, and it can still be recovered through the software.
Measure 1: The reliable way to delete is to choose to restore the factory settings and check "Delete all user data". This can be cleaned up cleanly, without leaving hidden dangers.
Hidden danger 2: Everyone always takes a lot of photos every day, and many people like to share photos on many platforms, but did you know that each photo comes with a detailed description, including shooting parameters, shooting location, shooting time , and even locate the floor height if there is altitude information. A photo clearly reveals the location of the photographer, and we are often unaware of it.
Measure 2: Turn off the geographic location of the camera; do not send the original image when sending a photo; send the image after the P has been passed, it is a brand new photo.
Hidden danger three: Many netizens will share their experiences of being deceived. Most of the time, I will receive a lot of comfort from netizens, but I don’t know that the enthusiasts here are likely to contain liars.
They lied that they had the same experience as you, but what kind of channel did they recover the funds through? People who have suffered heavy losses may easily believe each other. What is the outcome? Not only will you not be able to get back what has been lost, but you will lose even more to make things worse.
Measure 3: Whether it is someone who claims to have the same experience and can help you recover your losses, or someone who claims to be a lawyer, reporter, hacker, etc. who can help you, don't believe it. It is the right choice to call the police immediately after discovering that you have been deceived.
Hidden danger 4: Nowadays, our mobile phones and accounts all require passwords. From the beginning of numbers, numbers and letters to facial recognition, iris and fingerprints, etc., it is more and more convenient for everyone, because there is no need to bother. Memorize those passwords.
But the biological password has a very big weakness, that is, it will not change, so we must take protective measures. Nowadays, the pixels of photos are getting higher and higher, and even a photo of a scissor hand can be extracted for fingerprints. So we can't take pictures and share them?
Measure 4: The solution is very simple, grind the skin before posting the picture, and it is impossible to extract fingerprints. This is too easy for everyone, because it is basically everyone's routine operation to make a P before posting pictures.
Hidden danger five: Nowadays, everyone uses mobile phones to pay for consumption, and it is convenient to scan the QR code, but is the QR code you scanned correct? Those crooks in life are trying their best to think of new ways. Replacing the QR code is one way. Forging their personal collection code into a collection code for some public matters, some people who do not pay attention to details will be deceived, especially Older people are more difficult to distinguish.
Measure 5: Be sure to read the name of the payment before making payment. When paying for water, electricity, gas and other expenses, try not to pay the personal collection code. In addition, you should also pay attention to cover your payment code when paying outside. Some bad guys may take advantage of the time when you open the payment code in advance while queuing to take a picture of your payment code, thereby stealing your money.
Hidden danger six: Seeing that the annual large-scale shopping festival is approaching again, there is a routine every year, and doubling the down payment is a common method in the past two years, and some scammers have also found opportunities.
In the text messages you receive, there will be some exciting content, such as prepayment through the link in the message can be reduced by XX yuan, this amount of deduction is quite tempting, some people want to check it out . However, the moment you click on it, your information and funds are at risk of being stolen.
Measure 6: It is very simple to avoid being deceived. Do not read messages sent by people you do not know, and do not click on links contained in messages. These two points are especially important for the elderly.
hidden danger 7: Nowadays, near field communication (NFC) is used in more and more scenarios, such as access control cards, bus cards, subway cards and canteen meal cards, all of which can use NFC for password-free payment. It's convenient, but it also gives the bad guys an opportunity to swipe funds in a crowd with a card-swipe device close to your phone.
Measure 7: However, NFC payment has a feature, it must be very close, so in a crowded environment, our mobile phone is either packed in a bag or in the hand, if you want to put it in a pocket, remember to stick it on the back The body places the screen facing out. Or you can choose to manually turn off the NFC function after use, which is more appropriate.
Hidden danger eight: What should I do if the network is not good when eating out or playing? Everyone usually asks the store for the WiFi password. Is there any problem with this? Of course there is. Some WiFi is not encrypted, so unencrypted communication data can easily be stolen, and personal information and even payment passwords may be captured.
Measure 8: Do not use WiFi without password verification; use WiFi password with caution to share or crack the APP. Sharing or cracking apps should be used with caution, as they will record and share all the data you have used, including your work and home WiFi information, as well as WiFi-related locations.
Hidden danger 9: Everyone should often receive some inexplicable calls, wondering how did they know your number? Part of it is that the information left by him in some places is sold, and on the other hand, he voluntarily contributes it. what happened to
? I believe that many people have done such a thing, downloaded free games or downloaded apps and got rewards, they should be very happy at that time. When you are happy, those criminals are also very happy, because they have already downloaded and installed the application through your behavior, grabbed the address book and other information in your mobile phone, and uploaded it to their server. It is not difficult at all to be acquired by others.
Measure 9: Prevention is the primary method, download software from the formal application market or official channels; do not download applications from unknown sources, and do not lose more for a little money.
Hidden danger ten: The power bank is like a life-sustaining pill for the mobile phone party. When the mobile phone is out of power, this little thing is needed too much, but the power bank of unknown origin may be risky.
criminals will put an ultra-small computer in the power bank shell, and after connecting, they will automatically steal personal data and photos and other private information in the mobile phone. Even if the data cable is unplugged, the implanted virus will continue your information. Sent to outlaws.
Measure ten: Do not use the power bank provided by strangers; even if you use the power bank provided by acquaintances, you must ensure that the mobile phone is within your line of sight, and immediately cut off when an abnormality is found; confirm that the USB debugging function of the mobile phone is turned off, and reject all applications for the USB debugging function.