All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
Father son credits on campus to give up treatment, clarion call not pie in the sky,
Report: online fraud, adolescent boys are more likely to fall,
Taxis can play Shanda games, also available in-car WiFi download
微信公众号文章新增语音功能:突破一分钟限制 - 微信,公众账号
男子换手机号忘解绑支付宝:银行卡4000元没了 - 支付宝,银行卡,手机号
支付宝敬业福被热炒,价值何在? - 敬业福,支付宝红包,微信红包
Intelligent iPod designer hardware development: with love
Samsung,Pay loss of $ 16.8 million last year, but Samsung don’t care,
LinkedIn mimic Facebook this the right move? ,
Quantum computers faster than the home PC? ,
Reading number is top 10 pictures
2013中国四川省高考作文
The Soviet union swimsuit exposure in the 70 year3
大年初五接财神
陪睡门马睿菈自曝写真 称首拍大尺度照片3
分手的感悟
Sell the barbecue as says father du breul1
The real super beauty15
Park waits to have her picture taken exposed
Japanese snow monkeys in the hot spring to keep warm, close their eyes to enjoy
支持判处贩卖儿童者死刑
Download software ranking
Unix video tutorial4
Popkart Cracked versions Mobile phone games
Tram sex maniac 2 (H) rar bag19
WebService在.NET中的实战应用教学视频 → 第5集
天龙八部最新服务端
Boxer's Top ten classic battle4
Sora aoi, the maid, students' uniforms
I'm come from Beijing2
I'm come from Beijing1
Tram sex maniac 2 (H) rar bag11
qq published in(发表于) 2014/6/11 10:48:11 Edit(编辑)
Tencent, Thunder knocked out black gangs more than more than 10

Tencent, Thunder knocked out black gangs more than more than 10

Tencent, Thunder knocked out black gangs more than more than 10 – Tencent, cybercrime-IT news Tencent, Thunder knocked out black gangs more than more than 10

On June 9, the Tencent "Thunder operations" joint police, and well-known security companies as much knownsec, disclosed for the first time a thunder action half a year to sweep results and latest modus operandi, and issued a security warning to Internet users.


? Publishing


April rose 110 times by hackers


To combat Internet technology with traditional breeding grounds for crime combines dark industry chain, Tencent launched a lightning campaign, encouraging all matching Tencent and police cracking down on illegal criminals. Tencent Security Center has established a reporting platform, and the establishment of tens of millions of dollars the reward Fund.


Company Center for Internet crime-Secretary-General, safety management Department General Manager Zhu Jinsong disclosed by reporting and processing, micro-letter cumulative account closure 20 million to recruit whoring, 30,000 fake public accounts, daily stop for 10 million illegal, fraudulent advertising. Since March this year,QQ and QQ stop malicious account number around 250,000, against 150,000 malicious links spreading. Using pornography and fraud, malicious chain apart, separating the cumulative 7000duowantiao.


Tencent technology reported confrontation with netizens clues, police knocked out the network throughout the tie in the first half of black gangs more than more than 10, involving nearly 25 million Yuan.


Tencent, Thunder operations knownsec released "2014 network black produce trend analysis" shows that cyber attacks compared to last April, an increase of 110 times.



? Early warning


Culprits or take the World Cup to stir up trouble


Tencent "Thunder operations" joint knownsec released danger warning that the second half of this year, third quarter of the year, recruitment scams information, variety programs such as the voice of lottery fraud, such as phishing scams information such as website, tournament gambling site will scale to emerge. Specific to accounting and financial staff's "mask of fraud" cases and gradually rise, criminals masquerading as partners, and trick play. For shopping, dating sites, send disguised as "sample" or "private photos" links to phishing or Trojans swindling gradually increased. Acquiring personal information will be further upgraded through fraudulent, including borrowing card transfers, travel cancellation, asked to provide bank card number, social security number and SMS verification code.


Police and Tencent "Thunder" reminder, for the protection of security, first determined to protect personal information, is not at liberty to disclose the individual's social security number, credit card numbers, particularly the SMS verification code; this time, don't click on unknown links or downloading unofficial software again, mobile phone and computer security software needs to be installed four, transfer before you call or video call confirmed.


? Police tell Uncle case


1


Acquaintances are pretending to take the verification code


Chongqing Municipal Public Security Bureau security guard corps three detachment under Captain Liang Dan introduced criminals disguised as a target the relatives or friends cheat.


In April this year in Chongqing, acquaintances of the victim a small a to send her information on the Internet: "I will have a loan here from me, and I lost my bank card, you now get a bank card number, they call me the money. "Other small a it gets from the bank card number, ID number, phone number after three things, and after about 5 minutes, to receive a verification code on your mobile phone. Each other on the Internet told her: "you give me a CAPTCHA, they called me, I need the verification code. "Little thought for you CAPTCHA is not a problem, as long as the password but I blow my money on the card will secure results after 20 minutes, little money on a card after all go away.


Police investigations found that suspected illegal use of collated ID card number, cell phone number on the Internet is a fast pay, and then get the verification code, after each payment you do not actually need certification by mobile phone, just enter the payment password is OK.


2


Buyers disguise and zombie shop


Xuzhou City Public Security Bureau network security team Vice-Captain shop sellers is Karen Guo introduced the case of "buyers disguise," fraud and for buyers of "zombie shop" scam.


Criminals disguised as buyers, place an order with seller, phones send pictures of the goods to the seller, this picture is actually a Trojan horse, phone can control sellers, and sellers of having accurate personal information and account verification code then stole third party platforms, then consumption or to cash out.


"Zombie shop" as the name suggests, qualified shop and goods are fake goods attractively low prices and attractive features. When buyers took the criminals the use of the software, buyers will find the seller could not be linked. Criminals disguised as a seller will send out some Trojan linked to cell phone or PC buyers end. Trojans robbed to pay when you click links to fictional outlaws from the background to our payment page. If the bank card with 10,000 dollars, criminals may secretly in the background to pay 9999 dollars.




添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.