Workflow
数据安全
icon
Search documents
自动贩卖机竟可采集往来人员生物信息 国家安全部:提防“数据刺客”暗中窃密
Huan Qiu Wang Zi Xun· 2025-10-23 23:49
——对可疑要求说拒绝。消费者在租赁、购买电子零售产品时,要增强隐私保护意识,对于产品供应方 提出的不合理要求,如过度采集生物特征信息等,以及含有"信任此设备""开启USB调试"等内容的可疑 授权提示时,应当谨慎操作。 ——对敏感数据多留心。要强化对数据安全的敏感性,面对日常生活中一些看似寻常的数据信息,如分 布于重要点位周边的坐标指向、人员分布、面部信息等,都应引起高度重视,从源头消除危害数据安全 的风险隐患。 广大人民群众在进行电子零售商品的租赁购买时,如遇到可能危害国家安全的情况,可通过12339国家 安全机关举报受理电话、网络举报平台(www.12339.gov.cn)、国家安全部微信公众号举报受理渠道或 者直接向当地国家安全机关进行举报。 来源:国家安全部微信公众号 ——刷脸支付窃取生物信息。随处可见的自动贩卖机,可通过扫码、"刷脸"等方式购买商品,即买即 取、操作简便。然而,此类设备通常搭载录音录像、生物识别模块,并配置有动态人脸识别、红外成像 等技术,能够采集周边往来人员面部特征和使用者的虹膜纹路等生物识别信息。个别设备开启刷脸功能 获取人脸数据后,还会进一步要求用户提供手机号、性别、出生年月等个 ...
提防“数据刺客”窃密:送货上门、刷脸支付均要警惕
Huan Qiu Wang Zi Xun· 2025-10-23 22:45
刷脸支付窃取生物信息 安全隐患需留心 寄送定位关联点位画像 通过App、小程序等渠道,由手机下单将物品配送到指定位置的服务正逐渐流行。然而,部分线上商超 在提供配送服务时,为获取买家的精确配送位置,可能会在配送地图上自动标注出一些敏感区域和点 位,并根据消费频次、商品偏好、社交图谱等信息进行关联分析,形成该地区或点位的用户画像。 这些看似普通、用于正常经营的信息数据,一旦被窃取,可能成为境外间谍情报机关或个别别有用心之 人进行窃密渗透、技术攻击等不法行为的突破口。 来源:央视新闻客户端 国家安全部今天发布安全提示,当前,数字化浪潮席卷全球,电子零售新业态蓬勃发展,只需使用手机 线上选物下单,通过人脸识别完成支付验证,就能获得商品送货上门、即买即用等服务,使日常生活更 加高效便捷。 消费者在享受便利的同时,也应提高安全防范意识,提防"数据刺客"暗中窃密的多重手段。 随处可见的自动贩卖机,可通过扫码、"刷脸"等方式购买商品,即买即取、操作简便。 然而,此类设备通常搭载录音录像、生物识别模块,并配置有动态人脸识别、红外成像等技术,能够采 集周边往来人员面部特征和使用者的虹膜纹路等生物识别信息。个别设备开启刷脸功能获 ...
神思电子:联合中标济南城市可信数据空间项目 总金额1.61亿元
Sou Hu Cai Jing· 2025-10-22 02:08
Core Viewpoint - The company, as the leading unit of a consortium, has won a bid for the Jinan City Trusted Data Space Construction Project, with a total bid amount of approximately 161 million yuan, which represents 17.62% of the company's audited revenue for 2024 [1] Group 1: Project Details - The consortium includes the company, China Electronics Cloud Computing Technology Co., Ltd., and Inspur Cloud Information Technology Co., Ltd. [1] - The company is responsible for approximately 104 million yuan of the first segment (totaling 123 million yuan) and has independently won the second segment amounting to 57 million yuan [1] Group 2: Strategic Implications - The bid aligns with the company's "one body, two wings" strategic layout, aiming to enhance its business in the trusted data space sector [1] - Successful implementation of the project is expected to strengthen the foundation for secure data circulation and promote the deep application of data elements across various economic and social fields [1] Group 3: Financial Impact - The project is anticipated to have a positive impact on the company's operating performance and further enhance its core competitiveness [1] - In the first half of 2025, the company achieved total operating revenue of 192 million yuan, reflecting a year-on-year growth of 176.30% [1]
规范拟态广告营销 强化个人信息权益保护
Ren Min Ri Bao· 2025-10-20 22:43
Core Viewpoint - The importance of data security and personal information protection is emphasized, highlighting the need for a comprehensive system involving all societal stakeholders to safeguard personal information rights and promote efficient data circulation to empower the real economy [1][2]. Group 1: Data Security and Personal Information Protection - Personal information security is a fundamental aspect of cybersecurity, which is crucial for national security [1]. - The rise of new marketing methods, such as mimetic advertising, poses risks to data security and personal information protection, as they blend seamlessly into users' daily information streams, making it difficult for users to recognize their commercial nature [1][2]. - The collection and processing of user behavior data without consent can lead to significant threats to personal information rights, especially when sensitive content is involved [2]. Group 2: Regulatory Framework and Governance - A comprehensive governance mechanism involving multiple stakeholders is necessary to ensure data security and personal information rights are effectively protected in the digital economy [2][3]. - The principle of "notification and consent" is established as a core rule for personal information protection, requiring platforms to inform users and obtain consent before processing their data [3]. - Public education on digital literacy is essential to enhance citizens' awareness and ability to protect their data rights [3]. Group 3: Technological Advancements and Compliance - Emerging technologies, such as generative AI and deep synthesis, increase the risk of personal information leakage and misuse, necessitating preemptive safety assessments and compliance checks by platforms [4]. - Platforms must clearly distinguish between synthetic and real information in advertising to prevent misleading users and ensure informed consent [4]. - Platforms are urged to uphold high compliance standards and not exploit personal information under the guise of personalized recommendations, with regulatory bodies expected to enforce penalties for violations [4].
强化个人信息权益保护
Ren Min Ri Bao· 2025-10-20 22:10
Core Viewpoint - The importance of data security and personal information protection is emphasized, highlighting the need for a comprehensive system involving all societal stakeholders to safeguard personal information rights and promote efficient data circulation to empower the real economy [1][2]. Group 1: Data Security and Personal Information Protection - The misuse of personal information can lead to significant damage to individual rights and disrupt market order and social trust [1]. - The rise of mimetic advertising, which blends seamlessly into users' daily information streams, raises concerns about data security and personal information protection [1][2]. - There is a need for a collaborative governance mechanism to ensure data security and personal information rights are effectively protected in the digital economy [2][3]. Group 2: Regulation and Compliance - Establishing clear personal information processing rules for platforms is essential, with an emphasis on the "notice-consent" principle to protect citizens' rights [3]. - Platforms must limit personal information collection to the minimum necessary for achieving processing purposes and ensure that the processing is relevant and minimally impactful on individual rights [3]. - Platforms are urged to take on high compliance standards and not overlook personal information protection for profit, especially in the context of mimetic advertising [4]. Group 3: Technological Advancements and Risks - The application of emerging technologies like generative AI and deep synthesis in information dissemination presents diverse and hidden risks of personal information leakage and misuse [4]. - Platforms should conduct preemptive reviews and safety assessments of data usage involving personal information to ensure compliance with safety standards [4]. - It is crucial to clearly distinguish between synthetic and real information in advertising content to prevent misleading users and protect their personal information [4].
个人信息被“开盒”用于营销
Xin Hua Ri Bao· 2025-10-20 04:20
Core Viewpoint - The article highlights the emergence of an illegal industry involving the development and sale of "violent customer acquisition" software that exploits user data from short video platforms, leading to significant privacy violations and potential criminal activities [2][5]. Group 1: Illegal Software Development - The accused individuals, including Wei and Tan, developed software to illegally obtain user data from short video platforms, with low development costs and high efficiency [3][4]. - The software was designed to bypass platform security measures, allowing for rapid data extraction, including user IDs, phone numbers, and location information [3][6]. Group 2: Market Dynamics and User Impact - The software was sold in subscription models, with prices ranging from 40 to 140 yuan, targeting internet marketers and individuals involved in illegal activities [4][5]. - The illegal acquisition of user data has led to increased targeted scams and has negatively impacted legitimate businesses by disrupting their customer acquisition efforts [5][8]. Group 3: Legal Proceedings and Challenges - The case has highlighted difficulties in prosecuting such crimes, including evidence collection and tracing the criminal chain due to the anonymity of online transactions [5][6]. - The court's focus was on whether the software constituted a tool for invading computer systems, emphasizing that the method of data acquisition was illegal, regardless of the information's accessibility [6][7]. Group 4: Recommendations for Data Protection - Experts suggest that platforms need to enhance their defenses against "crawler" technologies and improve internal controls to prevent data leaks [7][8]. - There is a call for platforms to adhere to the principle of "minimum necessity" in data collection, ensuring that only essential user data is gathered to mitigate privacy risks [8].
“AI+储能”站上风口:宁德等企业抢滩,算力与数据安全瓶颈待破
Di Yi Cai Jing· 2025-10-18 13:51
Core Insights - The integration of AI with energy has been officially included in the national strategic framework, with specific goals set for 2027 and 2030 [1] - The application of AI in energy storage is expected to enhance operational efficiency, safety, and economic returns across the industry [2][3] Group 1: National Strategy and Goals - The National Development and Reform Commission and the Energy Administration have issued implementation opinions that include "AI + Energy Storage" in the national energy strategy [1] - By 2027, the goal is to establish over five specialized large models in the energy sector and over ten replicable demonstration projects, with a target of achieving world-leading AI technology in energy by 2030 [1] Group 2: AI Applications in Energy Storage - AI technology is recognized for its potential to improve the operational efficiency and safety of energy storage systems, with companies increasing investments in AI [2] - Companies like Haibo Shichuang are planning to expand independent energy storage projects and leverage AI and big data for backend operations [2] - Cross-industry collaborations, such as the partnership between Nenghui Technology and Ant Group, aim to develop AI applications for energy project management [2] Group 3: Operational Efficiency and Safety - AI is crucial for optimizing energy dispatch decisions in large power plants, directly impacting revenue maximization [3] - AI diagnostic technologies can accurately identify battery faults and provide early warnings, enhancing the safety and lifespan of energy storage systems [3] - The shift from reactive to proactive maintenance through AI can significantly improve operational efficiency [4] Group 4: Market Potential and Economic Returns - The overall service market for energy storage is projected to reach between 40 billion to 50 billion yuan by 2030 [5] - AI-driven algorithms can optimize trading strategies, enhance energy utilization efficiency, and maximize operational returns [6] - Major companies are launching their own AI solutions, indicating a consensus on the importance of AI in the energy storage sector [6][7] Group 5: Challenges and Bottlenecks - Despite the potential of AI, challenges such as data security and the need for robust computational power remain significant [8][9] - The development of AI in energy storage may exacerbate existing power supply and demand issues, particularly in the context of renewable energy integration [8] - The collaboration between AI and energy storage faces commercial viability challenges due to high energy consumption and uncertain returns [9] Group 6: Future Outlook - The industry views the application of AI in renewable energy as an opportunity that outweighs the challenges, with a focus on data security and effective data management [10]
AI应用泄露个人隐私?数据安全亟需构建三方“协作桥”
Zhong Guo Xin Wen Wang· 2025-10-17 16:08
Core Insights - The rapid development of artificial intelligence (AI) has led to increased privacy risks for users, as their personal data is often exploited without consent [1][3] - A collaborative effort among smart terminal manufacturers, app developers, and users is essential to ensure data privacy and security [1][4] Group 1: AI Development and Privacy Risks - AI's explosive growth relies on vast amounts of user data, which raises significant privacy concerns [1] - The National Cybersecurity Center of China reported multiple mobile applications involved in illegal collection and use of personal information, many of which are related to AI models [1][3] Group 2: Security Measures and Challenges - A joint white paper predicts a fundamental shift in mobile agent security architecture from "external" to "internal" protection, emphasizing the need for hardware and system restructuring [2] - The white paper identifies three core challenges for mobile agent security technology: computational overhead from encryption affecting user experience, the diversity of hardware platforms complicating standardization, and unpredictable security incidents due to autonomous decision-making [3] Group 3: Regulatory and Standardization Efforts - Regulatory bodies are intensifying personal information protection measures, pushing for data collection practices to become minimal, necessary, transparent, and controllable [3] - Experts suggest that initial standards and regulations should be established and continuously revised to keep pace with AI technology advancements [4]
报告发布!全国网安产业规模超两千亿,AI等“新蓝海”涌现
Nan Fang Du Shi Bao· 2025-10-17 11:41
Core Insights - The report highlights the importance of advanced cybersecurity technology and a robust cybersecurity industry for maintaining national cybersecurity [1] - The current scale of China's cybersecurity industry has reached nearly 220 billion yuan, but it still faces challenges such as fragmentation and slowing revenue growth among listed companies [1] - Emerging fields like industrial internet, artificial intelligence, and data security are creating new opportunities for industry development, driving a shift towards more integrated and capability-driven security products and services [1] - Generative artificial intelligence is described as a "double-edged sword," enhancing intelligent defense while lowering the barriers for cyberattacks, complicating security regulation [1] Industry Outlook - Despite being in the early stages of development, the Chinese cybersecurity industry has significant growth potential, driven by ongoing optimization of top-level design, deep integration of technologies, and innovation in service models [2] - The industry is expected to achieve leapfrog development in response to major power competition and digital challenges [2]
EDGE与du达成战略合作以强化阿联酋国家电信与金融数据安全
Shang Wu Bu Wang Zhan· 2025-10-16 15:54
Core Insights - EDGE Group has formed a strategic partnership with du Group to enhance data security for telecommunications and financial data in the UAE [1] - The collaboration involves integrating KATIM Gateway network encryption devices into national telecom infrastructure, ensuring secure data flow for financial institutions [1] - This initiative supports connectivity with the Central Bank of the UAE (CBUAE) [1] Group 1 - EDGE Group is a leading advanced technology and defense company in the UAE [1] - du Group is a prominent telecommunications and digital services provider in the UAE [1] - The partnership aims to bolster the security of financial data within the UAE [1] Group 2 - The KATIM Gateway network encryption devices will be embedded in the national telecom infrastructure [1] - The collaboration is expected to provide secure data flow for financial institutions operating in the UAE [1] - The initiative aligns with the regulatory requirements set by the Central Bank of the UAE [1]