22 8 How is our personal information leaked when netizens encounter personal information leakage?

Updated on society 2024-07-19
12 answers
  1. Anonymous users2024-02-13

    Now is the era of big data, our information is basically transparent, if you want to know your personal information in many ways, about netizens encountered personal information leakage, how is our personal information leaked? I think I have the following opinions. First, the ** number has already been resold several times, so in normal times we should not leave our ** number for others casually.

    If you write the ** number casually, there will definitely be advertisements or scammers to sell you ** later. In addition, the spread of the Internet has made it impossible for citizens' information to be private, and all of a person's information can be obtained through simple means. Finally, we live in a society where it is impossible to isolate ourselves from the outside world, and personal information will spread as long as someone knows about it.

    Usually when we use mobile phones, our information is actually being exposed. Some mobile apps will analyze the user's preferences and push them in real time. Our mobile phones actually monitor our every move, we don't use face recognition, it's better to use fingerprint unlocking as well as payment.

    1. The ** number has already been resold several times.

    In normal times, we don't just leave our own ** number for others. If you write the ** number casually, there will definitely be advertisements or scammers to sell you ** later.

    2. The popularization of the Internet has made it impossible for citizens' information to be private.

    A person's entire information can be obtained by simple means.

    3. We live in society and cannot be isolated from the outside world.

    Personal information is disseminated as long as someone knows about it. Usually when we use mobile phones, our information is actually being exposed. Some mobile apps will analyze the user's preferences and push them in real time.

    Our mobile phones actually monitor our every move, we don't use face recognition, it's better to use fingerprint unlocking as well as payment.

    How is our personal information leaked when netizens encounter personal information leakage? If you have anything else you would like to add, please leave a message below the comment area. If you also agree with this article, remember to like and follow.

  2. Anonymous users2024-02-12

    Some of today's software is also suspected of violating user privacy, and some of today's software is always asking us to authorize, so this is also a channel for leakage. In addition, we usually do not have a strong sense of self-protection, and we often look at our own information on the Internet, and then when we go out, we will also scan some ***, so we will also leak information.

  3. Anonymous users2024-02-11

    Our personal information is often leaked out inadvertently, especially some of the current face brushing software or functions, which can easily cause information leakage, and the real information usually filled in the express box, or when using software or scanning ***, it may cause information leakage.

  4. Anonymous users2024-02-10

    With the development of society, network technology has developed. People's personal information is no longer a secret. According to some data, some netizens have suffered personal information leaks.

    If personal information is leaked, many of us may receive all kinds of promotions**, fraud**, and even some people use personal information to defraud, which makes everyone panic. So how do we protect our personal information in this environment?

    Personal information is mainly mobile phone number, name, age, ID number, bank card number and other private information. In fact, our mobile phone number, name, and home address are actually the easiest to leak, because now that the express delivery industry is developed, basically everyone will shop online and mail things, so this name, mobile phone, and address will inevitably be exposed. Then we can't manage others, but we can manage ourselves, when we receive the express, we can use a pen to erase the personal information on the express bill or tear it off and tear it up, so that it is not easy for more people to see their own express bill and obtain their own basic personal information, but also on the one hand to ensure that their personal information is not leaked.

    Under normal circumstances, this kind of personal information is only needed on some formal occasions, and when we go to do things, we generally go to some formal institutions, so these institutions will not say that they have sold personal information, and ordinary people will not know. Therefore, this requires us not to let outsiders know our ID number and bank card number at will in our daily life.

    There are also some app logins or web links that we usually encounter in our daily life, if there is a need to enter an ID number, bank card number, real-name authentication, portrait authentication, etc. At this time, we should be careful not to enter our personal information casually. Is it possible that the other party will collect personal information and sell it?

    Although in the era of information technology, each of us may not have safe personal information, at least we can do our best and add a layer of protection to ourselves. As long as we do not disclose personal information to outsiders, then our safety can also be guaranteed. At the same time, it is also hoped that the network regulatory authorities will vigorously crack down on the illegal act of selling personal information.

  5. Anonymous users2024-02-09

    I think this kind of behavior is very inappropriate, and it is already a particularly serious illegal act, and it also harms the personal privacy of these people, and then it will seriously disrupt the normal order of the network, and it is easy to have a particularly serious infringement and illegal behavior, and it will also lead to the leakage of personal information.

  6. Anonymous users2024-02-08

    It is hoped that the relevant departments must increase their supervision, and should also protect the personal privacy information of users, and also hope that netizens will not easily disclose their personal real information in the process of surfing the Internet, and must be vigilant, and at the same time, the atmosphere of the Internet should be rectified.

  7. Anonymous users2024-02-07

    At this time, you should contact the relevant bank, and you should also let the bank take responsibility for itself and leak your own information, which is illegal.

  8. Anonymous users2024-02-06

    I think this matter should be investigated, because this information is more important for some people and may be used by some criminals.

  9. Anonymous users2024-02-05

    As a post-90s student, Bai recently received a message on his mobile phone to "redeem phone credit points", he clicked on it and filled in his personal information and entered the verification code. However, before the prize was delivered, there was a sum of money missing from his bank card. Formal e-commerce online shopping also encountered sales harassment Coincidentally, Jin, who has not shoped online for more than two years, saw a favorite product on a regular e-commerce ** with a certain scale, and the product was received after the order, but then it was a constant harassment of text messages and sales ** every day......Jin said that the salesman seemed to know the situation at home better than himself, and he would sell me my products according to his needs.

    Personal information leakage caused by the "phishing**" vulnerability On the platform that collects Internet security issues, there are various situations reported by professionals. Network experts said that the property losses and spam sales of students like Bai and Jin were mainly caused by the leakage of personal privacy information through various channels. In this information, the opening bank, bank card number, card password, ID card, mobile phone number, and the CVV (verification code) of some credit cards are often exposed.

    In fact, the problems caused by network security vulnerabilities are not only limited to online shopping and Trojan horses, but also the risks caused by vulnerabilities in Gaozhou Slip Schools, which we usually think have high security. Among the platforms that collect Internet security issues, a very important category of vulnerabilities involving colleges and universities is the ability to access others through a single and without authorization, and obtain relevant information, and the special section is personal privacy information. In addition to the vulnerabilities of the campus, there are similar personal information leaks in the **** that collects and stores a large amount of personal privacy information.

    Tens of millions of sensitive personal information leaks, once used by criminals, will bring a series of serious consequences. A professor at the School of Computer Science of Beijing University of Posts and Telecommunications said that if some relevant vulnerabilities are illegally exploited, the information in the system may be illegally added and tampered with, resulting in the untrue information in the entire information system, disrupting some normal information processing and collection in our country, as well as the security of data in the system.

    Article 14 of the Cybersecurity Law of the People's Republic of China: All individuals and organizations have the right to report conduct endangering network security to the departments such as for internet information, telecommunications, and public security. The department receiving the report shall promptly handle it in accordance with law; and where it is not the department's duties, it shall be promptly transferred to the department that has the authority to handle it. Relevant departments shall keep the informant's relevant information confidential and protect the informant's lawful rights and interests.

  10. Anonymous users2024-02-04

    1. Try not to use public wifi that can be directly connected and do not require verification or password, try not to carry out online shopping and online banking operations when using public wifi, turn off wifi in public places, and avoid connecting to malicious wifi.

    2. When using public charging piles, you can install some mobile phone protection software, and do not click on any mobile phone prompt box to appear the agree or trust button when charging.

    4. Do not post personal information such as train tickets, plane tickets, boarding passes, passports, names of children and parents**, and ** with location information.

    6. Mobile phones, tablets, etc. have network hotspot functions, open them carefully, and clear the data when replacing the smart mobile terminal.

    7. Be wary of online "phishing", choose regular shopping** and mobile payment terminals, and do not disclose bank card information casually.

    Know how to remedy a leak of personal information.

    1. The first is to enhance the awareness of personal information protection, and do not fill in or share personal information at will, especially ID cards, bank cards and other information.

    2. Change and change the password. After the leakage of personal information, it is necessary to change it as soon as possible to prevent the leakage of various information from the login, and personal information is often linked to important information such as banks and passwords. Therefore, once personal information is leaked, you should change important passwords immediately to avoid financial losses.

    3. Collect evidence and clues and report the case. Once personal information is leaked, you should write down useful information such as the other party's ** or email address, and then go to the police. The purpose of reporting the case is to protect one's rights and interests, and the other is that it can also be recorded.

    4. Entrust a lawyer to defend your rights. If your important personal information is lost, and you know how it was lost or there are many clues, then you can consult a professional lawyer about the relevant laws and regulations. If the lawyer gives a positive answer, he can use the law to defend his rights and interests.

    5. Remind your relatives and friends to prevent being deceived. After the personal information is leaked, not only can the information be used to steal you, but even the letter may also deceive your relatives and friends. Therefore, once your information is leaked, or the contact tool is lost, be sure to notify your relatives and friends as soon as possible and inform them to take extra precautions to avoid being deceived.

  11. Anonymous users2024-02-03

    The leakage of personal information mainly exists in the following places:

    1. On the parcel express delivery list purchased online by Lingxian on the stool.

    2. The information is crawled by hackers when browsing bad online jujube shooting stations.

    3. There is a risk of information leakage on the paper tickets of train tickets and bus tickets.

    4. When opening a room in a hotel, personal information is easy to be leaked.

    6. Put resumes on major recruitment**.

    7. Frequent real-name authentication on various game platforms.

    8. Mortgage loan of private personal ID card.

  12. Anonymous users2024-02-02

    As a result, personal identity information, personal property information, personal commonly used device information, personal education and work information, facial features, personal location information, etc., are all exposed, and users become "transparent people".

    2. Information is sold and is vulnerable to illegal infringement

    It's not over after the leak. Perhaps, a personal information transaction industry chain has been formed: sellers and network companies collect and package them to sales companies with the help of software.

    Then, all kinds of real estate agents, loan agents and other ** sales began to bombard you.

    3. There is a risk of being "killed by big data".

    According to the survey results of the big data "ripeness" released by the Beijing Consumers Association on March 27, the vast majority of respondents believe that big data "killing" is widespread, and half of the respondents said that they have encountered "ripeness", and online shopping platforms, ** tourism and online car-hailing and other consumer platforms are "hard-hit areas".

    The investigation found that 2 experiencers booked a hotel through Fliggy at the same time and found that the old users were high and did not enjoy the discount. Behind the "big data killing" is the privacy of users "running naked".

Related questions
9 answers2024-07-19

I like the dog people's network, the layout is clear, and it is clear at a glance when you shop. The functions are very user-friendly, and the plates are arranged very user-friendly. There are also many forums and boards close to dog people. >>>More

7 answers2024-07-19

<>1. A history teacher at Zhengzhou No. 3 Middle School in Henan Province was teaching students when a hacker suddenly sneaked into the live broadcast room, and the hacker obviously disrupted the teacher's classroom discipline. And this hacker constantly harasses the teacher, explodes and swears at the teacher, which is shameful. According to Ms. Liu's daughter, she suddenly lost contact with her students after giving online lessons online on October 28. >>>More

9 answers2024-07-19

I don't think parents should spoil their children too much. Children should do the right things at the right age, and they should not live at the child's will.

24 answers2024-07-19

Recently, Internet celebrity singer Tang Yi.

Participate in "The Voice of God. >>>More

27 answers2024-07-19

Tang Yi received sharp comments, and even reddened his eyes several times, but I have to say that Tang Yi's trip was worth it, at least proving that he has strength. >>>More