Criminals often pretend to be telecom operators or banks such as 10086, 95588, 95533 and 95555 to send "cash for points" short messages. SMS usually has a phishing website that pretends to be an operator or a bank. After logging in, the user will be asked to enter the account number, password, name, ID number, mobile phone number and other information reserved by the bank. "Once this information is filled in, the liar will get this information."
The modified POS machine can also extract bank card information. System platform vulnerabilities lead to personal information disclosure. Due to the lack of sound security management mechanism and system loopholes, some network platforms have been maliciously downloaded by hackers. Various leaked databases are integrated into a huge "social work library" by hackers.
To expand the ways of information stealing, Lu, a security expert of Tencent's mobile phone housekeeper, suggested that users should go to the bank in time to replace the old M 1 card with an IC chip card, which can greatly reduce the risk of being copied. Once stolen, the card should be frozen immediately to prevent the loss from expanding-call customer service to report the loss or operate by yourself through mobile banking.
Second, report the case immediately. Keep the receipt for filing a case-so that you can have evidence to check when you claim rights from the bank. Immediately withdraw cash from the nearby bank and print the voucher. This is to prove that you have the bank card, and transactions in other places are fake cards.
More importantly, plan ahead. Lu stressed that users should not click on any URL links in short messages, and should not trust any short messages and phone calls such as cash exchange and lottery. Don't transfer money or remit money to any strange account.
In addition, install professional mobile phone security software for mobile phones. For example, Tencent Mobile Manager can accurately intercept all kinds of fraudulent short messages, fraudulent phone calls and phishing websites, and kill all kinds of mobile phone Trojan payment viruses to ensure the security of mobile phones.
People's Network-Bank cards don't want to be "cloned". Personal information should not be leaked.