Traditional Culture Encyclopedia - Weather inquiry - Watch out! These commonly used apps are suspected of collecting personal privacy beyond the scope!
Watch out! These commonly used apps are suspected of collecting personal privacy beyond the scope!
Open the ink to see the weather.
What does this word mean?
Open Kingsoft and have a look.
There is also the recent super-hot ai face change.
Play or you're out!
But you should be careful.
These applications may
Drain! Lou. You! Yes! Hide! Private!
It opened in Tianjin 16 this month.
20 19 National Cyber Security Publicity Week was released.
20 19 Statistical Report on the Survey of Internet Users' Satisfaction with Network Security in China
Report shows
Although the safety awareness of netizens has improved,
But it still needs to be strengthened.
Personal information protection has become the focus of attention.
37.4% of netizens think that
There are more and more personal information leaks on the Internet.
58.75% of netizens said
I have encountered personal information infringement.
Specifically,
Internet users' network security risks
Mainly concentrated in the following aspects.
Excessive information grabbing by network platform
Case: Recently, at the "20 19 Cyber Security Symposium" hosted by the Cyber Security Bureau of the Ministry of Public Security, a number of apps were "named".
Chen Jianmin, executive deputy director of the National Computer Virus Emergency Response Center, said:
In terms of app, there are eight kinds of malicious behaviors, such as remote control and malicious deduction, such as home school kanban, bee optimization, and master dialing.
The act of infringing citizens' personal privacy by sending back users' address books and text messages was detected in stages, and heroin APP was arrested.
Jinshan software, ink weather, installment treasure, etc. Suspected of collecting citizens' personal privacy beyond the scope;
There are high-risk loopholes in the NBA Basketball Masters and the Red Packet every minute.
Intelligent network terminal is invaded.
Case: China Consumers Association released a comparative test report on smart door locks in May this year. Among the 29 sample locks tested, fingerprint and password unlocking is more reliable than information identification card unlocking, and the security of sample lock unlocking mode needs to be improved.
The test report shows that the security of unlocking mode needs to be improved. Of the 29 sample locks, 48.3% have security risks when passwords are opened, 50% have security risks when fingerprints are opened, and 85.7% have security risks when information identification cards are opened. 28 sample locks were not opened after being attacked by black box, and only 1 sample locks without manufacturer information were opened after being attacked by black box. The information security test contents of these sample locks include information leakage, identity authentication, authority control and data transmission security.
Personal information disclosure is harassed.
According to the investigators of the Netan Corps of Beijing Public Security Bureau, hacking is becoming the core of network-related crimes and upstream crimes such as telecom fraud, online extortion, online soliciting and online gambling.
There are hidden dangers in artificial intelligence technology of face recognition.
Case: Changsha Anti-Electronic Fraud Center recently issued an emergency warning to remind the public that using AI "changing face" and other similar software is extremely risky, which may not only lead to the disclosure of personal privacy data, but may even be used by criminals to commit telecommunication network fraud.
According to reports, there are many "pits" of AI "changing face" and similar software. Liars can extract sounds through recording, edit and synthesize recording materials by using AI "voice changing" technology, and commit fraud with forged sounds; By collecting photos and videos, using AI technology to "change face" and using forged photos or videos to commit fraud; Or collect personal information through artificial intelligence technology and describe people, demand tendencies, etc. And select the target population according to the "routine" of fraud.
Changsha Anti-Electronic Fraud Center reminds the public to use all kinds of AI "face changing" and AI "voice changing" software cautiously, strengthen the awareness of personal information protection, register as little as possible, do not register unnecessary or low-demand online accounts, and fill in as little as possible. Don't fill in unnecessary personal information, prevent personal information from leaking, and don't give scammers an opportunity.
Our Tianjin Cyber Security Week
What other important information and materials will it bring?
Jin Xiaoqing will continue to introduce you.
Please pay attention!
Image source | Xinhua News Agency, Voice of China, Central Radio and Television General Station, Central Committee of the Communist Youth League, etc.
Editor | Zhai Xuanya
Review and issuance | Yang
- Previous article:Bird nest weather
- Next article:What problems should we pay attention to when planting macadamia nuts in our life?
- Related articles
- What is the lowest temperature in Shouguang history?
- Dalian Binhai Road even and odd number limit time 202 1
- There is a man named Su Yuncheng in Bishop's novels. What novel is it?
- The basic items suitable for wearing and demonstrating in summer are refreshing, simple and without losing texture, which is worth learning.
- Why do people in China fear dragons?
- Can someone help me introduce the function of the electric cabinet in detail?
- What are the stars doing during the studio break?
- Dongfeng Shen Feng AX7 went up the mountain to play, with beautiful scenery and exceptionally cool weather.
- Kitchen No.4 introduces what kind of restaurant it is.
- How many cartoons are there in Alice College Animation 26 episodes?