wifi is now a very popular wireless network, although it is convenient to use, but there will be many problems, many users have experienced account theft, a big reason The security of wifi is not enough. Many public places now have free WiFi to connect to the Internet. This is a means for many businesses to attract customers. But the problem has followed, and there are hidden dangers to security.
& nbsp; Fishing Wi-Fi & rdquo; 15 minutes to steal passwords
Recently, a netizen posted a microblogging said: "This morning found Taobao account stolen, can not log in, fortunately customer service Give force, reset after half an hour. When I entered the account, the thief actually abandoned the sleep time in the middle of the night, sneaked into my account and bought a lot of things that could not be used. Fortunately, there was no way to pay, otherwise the loss would be big. It seems that you can't use Taobao for shopping on public Wi-Fi. & rdquo;
The Shenyang police confirmed that the police recently found out that hackers posted on the Internet to explain how to set up phishing Wi-Fi to crawl user information and steal usernames and passwords.
The police said that from the current case analysis, it is generally difficult for victims to find out the true and false of phishing phishing. Once hacked, hackers can steal the Internet within 15 minutes. User's personal information and password, including online banking passwords, stock account passwords, etc. The location of hackers is often a place to provide free Internet access, such as KFC, McDonald's and some hotels, coffee shops and other places with wireless hotspots.
In order to allow more mobile phone users to connect to the network, such malicious Wi-Fi networks can be arbitrarily named and can be easily accessed without a password. Criminals steal the user's online banking Alipay account when the user browses the web or chat. When the victim discovers the economic loss, the criminals have already escaped.
It is understood that similar "fishing Wi-Fi" has already appeared at home and abroad, and people in the industry have begun to pay attention to this form of crime: a netizen posted that "primary hackers are two hours away" Can master the personal information and password of the UC mobile browser user, only 15 minutes after proficiency. & rdquo; The netizen even showed in the post the process of stealing UC mobile browser user information and password using phishing Wi-Fi.
A video circulating on the Internet also shows that the free Wi-Fi provided by the coffee shop makes it easy to view and copy files, photos and chats from smartphones using the Wi-Fi.
Some experts have suggested that if you search for a Wi-Fi network that is free to use without a password in public places such as shopping malls, hotels, airports, cafes, fast food restaurants, etc., it is best to be cautious and beware of free Wi-Fi. -Fi is a "wolf in sheep's clothing".
Congenital Defect" [Wi-Fi is being targeted by hackers
Wang Feng, who has set up Wi-Fi networks for many times, told reporters that compared to the wireless networks provided by telecom operators, Wi-Fi signals generally cover the range of tens of meters to hundreds of meters and are typical local area networks. The hacker steals the personal information and password of the Internet user through Wi-Fi in two steps. First, the phishing website is established through the Wi-Fi LAN, the victim is connected to the Internet, and then the software for decrypting the password is used to steal the information of the user. However, professional application service providers such as banks, financial institutions, and trading platforms generally attach great importance to their own security settings and constantly upgrade, and strictly review user information and effectively protect user privacy.
Su Zhirui, an expert from the First Institute of the Ministry of Public Security, pointed out that the physical connection in the conventional wired network environment is the basis of data exchange, and the risk model of network security is based on the premise of physical layer security. While Wi-Fi transmits data by radio waves, the physical lines in a conventional wired network become logical virtual links. This is the core strength of Wi-Fi, but it has also become the target of criminal attacks.
The CPU is the core component of the computer. It can be said that it determines the level of comput
XP is one of the oldest and most powerful operating systems. It comes with a tool that automatically
Recently, some WinXP users found that after starting their own computer, the display has no signal,
At the previous Taipei Computer Show, ITG brought us this xpPhone. Today, this mobile phone is offic
Windows Live Mesh History: Birth in April 2008 (1)
New Year's greetings from Microsoft late! Desktop theme 1.0
Block Windows XP "Set Program Access and Defaults"
Several reasons and solutions for decomposing the blue screen of xp system
The five secrets of sharing XP system
How to save XP system memory Speed up system boot speed
The srosa.sys plugin causes the computer blue screen to malfunction
PHP Trojans attack experts teach you how to resist them
Properly set the virtual memory of the xp system
When the XP starts, I can't find the WINSYS.VBS file
How to set the wallpaper under win xp system to better see
Teach you how to turn into a 25-hour system for a full day speed
How to open "network connection" in Win10
Configuring disk quotas in Windows 2000 systems
Win7 system boot black screen prompts Non-system disk or disk error failure causes and solutions
How does win7 enter the bios interface
Memory Optimization Acceleration Drives Life to Improve Your PC Performance
How does the Win10 system prohibit Youku pop-ups?
Correct understanding of Linux memory usage is too high
How to solve the red cross in the white flag of Win8 operation center?
How do I change the Windows 7 default installation directory?
Windows7 can not open the online banking page solution summary