How to know other people's micro-signals?

There are many steps to steal an account.

The first is to know the account number.

Through what channels did you know your account number? It may be through the internet, through your friends, or you may have inadvertently leaked it.

First, if it is through the internet, it is understandable. After all, knowing your ID is the basis of network communication.

Second, if it is through people around you, you should pay attention. There are many such examples around me, including what I have heard and seen. They all gave their phone numbers to their trusted friends. Either this friend takes the number for himself, or this friend just gives your number to someone else and someone else takes it for himself. This kind of risk is still very big, especially for you and your friends, if you only know each other online.

The third is unintentional disclosure. Maybe you were seen by someone next to you when you entered your account password. Or it could be. Loss of items, such as mobile phones, laptops, etc., causes account data to be known by others. This can be prevented, and when you enter the password, you consciously cover the keys. Or deliberately hide when entering the password, try to set the password on the mobile phone or computer, and set the password lock on some important information files. Now most mobile phones even have the function of remote tracking and remote locking. Try to open it if you can.

Then there is stealing accounts.

There are many ways to steal this, such as publicly registered software accounts.

Take the recent Xue Tong as an example. If the password of your Xue Tong account is leaked, and the mobile phone account or password of your other software is merged with Xue Tong, then you may be stolen by other criminals.

In this case that others already know the password, the second layer of protection is particularly important. For example, mobile phone binding, email binding or real-name authentication and so on. If you have important information on some software, such as QQ WeChat, then you must take secondary protection measures for your mobile phone. Make sure it can be retrieved quickly.

There is also a method of deception. For example, a classmate needs your help to verify, but you click on a website to let you enter your account password. In this case, you must be vigilant, ask questions carefully and verify whether the other person is your classmate himself.

In this information age, your information may be everything to you. Once you are leaked and used by criminals, you may suffer great risks, and you can't relax your vigilance against information leakage at any time.