The Ministry of Industry and Information Technology announced that recently, there were reports that criminals stole personal mobile phones, stole user personal information on a government APP, and then applied for online loans and consumption, causing property losses to users. The article was widely forwarded on the Internet, causing netizens to worry about the protection of mobile phone personal information and property safety.
The Ministry of Industry and Information Technology immediately organized an investigation and interviewed the relevant person in charge of the telecom company involved on October 12. It is understood that the user did not report the loss of the phone card in time after the phone was stolen, which left room for criminals to exploit loopholes. The criminals obtained important personal information such as the user's ID number in a government APP through the weak verification method of "mobile phone number + verification code", used the user's personal information to change the mobile phone service password, used words to deceive and induce the customer service staff of the telecom company to unblock the reported lost phone card, and used the loophole of "recovering user password" of some online loan platforms to reset the user's payment password to defraud online loan funds, which ultimately caused property losses to users.
IT Home learned that in this regard, the Ministry of Industry and Information Technology requires the three basic telecommunications companies to strengthen security protection while facilitating users to handle business in sensitive links involving user identities such as service password reset and unblocking, strengthen risk prevention awareness training for customer service personnel, and be vigilant against abnormal business handling behaviors. In addition, the Ministry of Industry and Information Technology recommends that relevant units and enterprises desensitize data in a timely manner, and recommends that relevant industries collect, store, and use user personal information in accordance with the minimum necessary principle, and properly preserve the collected and stored user personal information in a graded and classified manner. At the same time, the Ministry of Industry and Information Technology also reminds users to set SIM card passwords in a timely manner, report the loss of their mobile phones as soon as possible, and strengthen security risk awareness.
Previous article:Hubei's integrated circuit wafer output increased by 125.0% in September
Next article:Sonos Arc home speaker released: Create a home cinema
- Popular Resources
- Popular amplifiers
- Apple faces class action lawsuit from 40 million UK iCloud users, faces $27.6 billion in claims
- Apple and Samsung reportedly failed to develop ultra-thin high-density batteries, iPhone 17 Air and Galaxy S25 Slim phones became thicker
- Micron will appear at the 2024 CIIE, continue to deepen its presence in the Chinese market and lead sustainable development
- Qorvo: Innovative technologies lead the next generation of mobile industry
- BOE exclusively supplies Nubia and Red Magic flagship new products with a new generation of under-screen display technology, leading the industry into the era of true full-screen
- OPPO and Hong Kong Polytechnic University renew cooperation to upgrade innovation research center and expand new boundaries of AI imaging
- Gurman: Vision Pro will upgrade the chip, Apple is also considering launching glasses connected to the iPhone
- OnePlus 13 officially released: the first flagship of the new decade is "Super Pro in every aspect"
- Goodix Technology helps iQOO 13 create a new flagship experience for e-sports performance
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Wiring harness durability test and contact voltage drop test method
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- From probes to power supplies, Tektronix is leading the way in comprehensive innovation in power electronics testing
- Sn-doped CuO nanostructure-based ethanol gas sensor for real-time drunk driving detection in vehicles
- Design considerations for automotive battery wiring harness
- Do you know all the various motors commonly used in automotive electronics?
- What are the functions of the Internet of Vehicles? What are the uses and benefits of the Internet of Vehicles?
- Power Inverter - A critical safety system for electric vehicles
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
- Brief Analysis of Automotive Ethernet Test Content and Test Methods
- Upgrading the embedded RISC-V compiler
- You can use FIND to check which library a certain component is in in the PROTEL schematic. You can also check which library a certain package is in. Why is it not there?
- Can RS485 communicate stably using parallel wires (non-twisted pair)? 5m wire length, 9600bps
- TI Wired and Wireless Communications in Electric Vehicle Battery Management
- [CH563L Review] Part 1 Based on the official uCos introductory Hello World
- Why is there a "red dot" on my forum icon?
- Is the signal mentioned in Nyquist sampling theorem limited to sine (cosine) signal form?
- Thank you for being there, thank you for being polite!
- How to locate the code and data of C program
- Color screen printing limit for color segment screen