“ 一、什么是网络钓鱼？ 答：网络钓鱼是指黑客们伪造银行或其他知名机构，发送大量欺骗性垃圾邮件，试图引诱收信人给出敏感信息（如用户名、密码、银行账号、交易密码、身份证号、手机号或信用卡详细信息）的一种攻击方式。所以在享受互联网带来便捷的同时，切不可透露个人的重要敏感信息。“ 二、什么是伪基站短信诱骗？ 答：我们的手机联网使用主要依靠接收运营商基站发出的信号，非法分子通过使用大功率主机伪装成运营商基站，冒用他人或金融机构的号码，向用户手机发送诈骗短信及链接，诱导客户登录钓鱼网站，窃取持卡人银行卡卡号、密码等敏感信息。“ 三、什么是木马入侵？ 答：诈骗分子通过发送信息，如股息信息、政策提醒、八卦新闻等，需要点击链接查看详情，持卡人一旦点击链接，电脑或手机即刻静默安装木马程序，电脑或手机内各种信息，包括密码、银行卡号等，也都被犯罪人获得。犯罪分子甚至能随意操作持卡人电脑或手机。“ 四、什么是磁条侧录？ 答：传统磁条卡在进行刷卡消费时，一般采用POS机具读头与银行卡磁条相互摩擦产生信号。由于磁条信息发卡后无法改变，非法人员就通过小型读卡器获取磁条信息，再通过电脑软件和写卡器配合，克隆一张与原卡信息完全一致的新磁条卡。客户在进行刷卡录入密码时容易被他人窥视密码，犯罪人就用这张克隆卡取款或消费，即可盗取客户资金。“ 五、什么是暴力破解密码？ 答：暴力破解密码是根据密码设定的条件确定大致的答案范围，并在范围内对所有情况逐一验证，直到全部情况验证完毕。若其中的一个答案符合条件，就能够成功破解密码，如果都没有符合条件的答案，那么就破解失败。所以日常使用的各种账户密码一定要定期更换而且尽量设置得复杂一些，避免出现如123456、111111、手机号、身份证号等一些常见的组合。
六、什么是拖库？ 答：拖库是指通过非法手段下载数据库，从而获取所需要的各类重要敏感数据。发生拖库的主要原因是管理方缺乏安全意识、数据库默认口令未进行修改、系统漏洞被植入木马等问题，黑客完成拖库后，可以通过各类技术手段获取数据库中的明文信息，从而导致安全事件发生。 七、什么是撞库？ 答：很多用户习惯在不同的网站，使用相同的账号和密码，一旦黑客获取了客户在其中一个网站的账户和密码，就可以通过已获取的敏感信息，登录其他网站，得到一系列可以登录的用户，从而窃取客户在不同网站上资源和信息。
YX-BANK∣浓情 浓意 农商行长按，识别二维码，加关注网银、手机银行同行、跨行零费用、实时到账！
What is phishing? Answer: phishing refers to hackers forged bank or other well-known institutions, sending a large number of fraudulent spam, trying to lure the recipient gives sensitive information (such as user name, password, transaction password, bank account number, ID number, mobile phone number or credit card details) an attack. So enjoy the convenience of the Internet at the same time, must not disclose personal important sensitive information. Two, what is a pseudo base SMS trick? Answer: we use the mobile phone network mainly depends on the signal receiving station operators, illegal elements by using high-power host base stations disguised as operators, impersonation or financial institutions to the user mobile phone number, send SMS fraud and link induced customer login fishing site, steal the cardholder bank card numbers, passwords and other sensitive information. Three, what is the Trojan invasion? Answer: fraudsters by sending information, such as dividend policy information, reminders, gossip, need to click on the link to view the details, click on the link once the cardholder, computer or mobile phone instantly silent install Trojans, computer or mobile phone in a variety of information, including passwords, bank card number, are the offender obtain. Criminals can even operate the cardholder’s computer or cell phone. Four, what is the magnetic recording? Answer: the traditional magnetic stripe card in the consumer credit card, generally use the POS machine read head and the friction between the bank card magnetic stripe signal. Because the magnetic stripe information after the issue can not be changed, the illegal personnel through a small card reader to obtain the magnetic stripe information through the computer software, and card reader with a new magnetic stripe cloning completely consistent with the original card information card. When the customer swipe the card to enter the password is easy to be others to see the password, the criminals will use this clone card withdrawals or consumption, you can steal customer funds. Five, what is the brute force password? A: brute force password is based on the conditions set by the password to determine the scope of the general answer, and within the scope of all cases verified one by one, until all the verification completed. If one of the answers in line with the conditions, it will be able to successfully crack the password, if there is no qualified answer, then crack the failure. Therefore, the daily use of a variety of account passwords must be regularly replaced and set up as much as possible to avoid some, such as 123456, 111111, phone number, ID number and other common combinations.
Six, what is the drag library? Answer: drag library refers to the illegal means to download the database, so as to obtain all kinds of important sensitive data. The main reason is the management of drag library lack of security awareness, not to modify the default password database, system vulnerabilities are Trojan horse problems, hackers drag library complete, you can get the database of plaintext information through various means, resulting in security incidents occurred. Seven, what is the impact of the library? Answer: a lot of user habits in different sites, using the same username and password, once hackers access to the customer in which a website account and password, you can have access to sensitive information, on other sites, can get a series of user login, to steal customer resources in different sites and information.
(content source: Hubei agricultural letter Hofman e home: commissioning editor Zhou Chun)
YX-BANK, my nongyi commercial president in the recognition of two-dimensional code, online banking, mobile phone banking, plus interest, peer cross zero cost, real-time arrival!
The author of the article has set up the need to be able to leave a message
Sweep the concern of the public, WeChat