网络安全
Search documents
数字认证:控股股东已变更为北京数据集团有限公司
Zheng Quan Ri Bao· 2025-09-16 12:17
Group 1 - The controlling shareholder of Digital Certification has changed to Beijing Data Group, while the actual controller remains unchanged as Beijing State-owned Assets Management Co., Ltd [2] - The establishment of Beijing Data Group aims to optimize strategic layout and industrial structure, enhancing the development of information services and the digital industry [2] - The initiative is part of the municipal government's efforts to build a "one area and three centers" framework, focusing on the needs of Beijing's data industry [2] Group 2 - Beijing Data Group will enhance the technological innovation capabilities of state-owned capital investment companies, focusing on cutting-edge technology fields such as big data, artificial intelligence, blockchain, privacy computing, and cybersecurity [2] - The group aims to strengthen service and support functions, contributing to the construction of Beijing as a global digital economy benchmark city [2] - The overall goal is to assist in the high-quality development of the capital city [2]
投资者避坑宝典:屏前帷慕藏陷阱指尖轻点需谨慎——网络安全特辑
Xin Lang Ji Jin· 2025-09-16 10:20
Group 1 - The article highlights the increasing cybersecurity risks associated with the rapid development of smart technologies, emphasizing the need for vigilance among internet users [9] - It discusses various fraudulent schemes, including high-return investment scams that lure investors into providing personal information, leading to potential financial losses [5][6] - The article warns about malicious investment software that masquerades as legitimate platforms, freezing assets and extorting users for "unfreezing" their funds [6][8] Group 2 - It stresses the importance of understanding new cybersecurity threats, such as AI-driven information leaks and high-yield investment frauds, urging users to protect their personal information [9] - The article recommends implementing multi-layered security strategies, including reliable antivirus software and regular updates of operating systems and applications, to enhance digital defenses [9]
智能时代如何守护个人数字安全?这份指南请收好
Xin Lang Ji Jin· 2025-09-16 10:16
Core Points - The article emphasizes the importance of cybersecurity in protecting personal financial and privacy security in the context of increasing AI development and hidden online threats [1][2]. Cybersecurity Overview - Cybersecurity refers to measures taken to prevent attacks, intrusions, disruptions, and illegal use of networks, ensuring stable and reliable network operation while safeguarding data integrity, confidentiality, and availability [2]. - For ordinary internet users, cybersecurity involves ensuring that personal information and assets are not subject to illegal harm [3]. Common Online Security Threats - **Phishing Email Traps**: Scammers send emails disguised as reputable financial institutions or investment advisors, using phrases like "limited-time investment opportunity" to lure investors into clicking links that steal account passwords and bank information, potentially leading to financial loss [5]. - **Malware Traps**: Some criminals disguise malware as popular investment applications, distributing them through unofficial app stores or pop-up ads. Once installed, these applications can secretly collect personal data and even control devices for unauthorized transactions [6]. - **Online Fraud Traps**: Criminals create highly realistic fake investment platforms promising "high returns and low risks" to attract investors. These platforms often require upfront fees, and once funds are deposited, they disappear, leaving investors with losses [7]. Building a Correct Cybersecurity Awareness - **Enhancing Security Awareness**: Individuals should actively learn about cybersecurity, stay updated on the latest threats and protective measures, and participate in training or activities to improve their awareness of potential risks [9]. - **Protecting Personal Information**: There is a need to enhance awareness regarding personal information protection, ensuring that sensitive data like ID numbers, bank details, and passwords are securely managed and being cautious with non-official software [10]. - **Choosing Legitimate Channels**: If individuals fall victim to online security traps or suspect illegal activities, they should preserve evidence and report to law enforcement, avoiding reliance on self-proclaimed "cyber police" to prevent further victimization [11].
2025年国家网络安全宣传周——网络安全知识科普,建议学习+收藏!
Sou Hu Cai Jing· 2025-09-16 10:07
Core Viewpoint - The 2025 National Cybersecurity Awareness Week emphasizes the theme "Cybersecurity for the People, Cybersecurity Relies on the People," focusing on high-level security to safeguard high-quality development. The event aims to promote cybersecurity knowledge and skills across society while implementing key cybersecurity laws and regulations [1]. Group 1: Cybersecurity Laws and Regulations - The Cybersecurity Law of the People's Republic of China, enacted on June 1, 2017, is the first comprehensive law regulating cybersecurity management in the country [5]. - The Data Security Law, effective from September 1, 2021, serves as a foundational law in the data sector and is crucial for national security [8][9]. - The Personal Information Protection Law, effective from November 1, 2021, aims to protect personal information rights and regulate the processing of personal data [11]. Group 2: Key Infrastructure Security - The Critical Information Infrastructure Security Protection Regulations, effective from September 1, 2021, are the first administrative regulations specifically targeting the security of critical information infrastructure [6][7]. - Critical information infrastructure includes essential sectors such as energy, transportation, and finance, where damage or data breaches could severely threaten national security and public interest [16]. Group 3: Cybersecurity Threats and Prevention - Cyber threats include telecom fraud, information leakage, and malicious software, which pose significant risks to individuals and organizations [2]. - Phishing attacks, including spear phishing and business email compromise, are common tactics used by cybercriminals to deceive individuals and organizations [24][25]. - Recommendations for preventing cyber threats include protecting personal information, verifying sender identities, and using secure channels for transactions [42][52].
【网络安全宣传周】网络安全知识科普
Sou Hu Cai Jing· 2025-09-16 09:15
Group 1 - The core theme of the 2025 National Cybersecurity Awareness Week is "Cybersecurity for the People, Cybersecurity Relies on the People," emphasizing high-level security to safeguard high-quality development [1] - The event aims to promote the implementation of key cybersecurity laws and regulations, including the Cybersecurity Law, Data Security Law, and Personal Information Protection Law, among others [1][12] - The initiative seeks to raise public awareness about cybersecurity risks such as telecom fraud, information leakage, and malicious software while showcasing achievements in the cybersecurity field since the 18th National Congress of the Communist Party of China [1] Group 2 - The Cybersecurity Law, enacted on June 1, 2017, is China's first comprehensive law regulating cybersecurity management, marking a significant milestone in the country's legal framework for cyberspace [3] - The Critical Information Infrastructure Security Protection Regulations, effective from September 1, 2021, are the first administrative regulations specifically addressing the security of critical information infrastructure [4][5] - The Data Security Law, which took effect on September 1, 2021, serves as a foundational law in the data sector and is crucial for national security [6][7] Group 3 - The Personal Information Protection Law, effective from November 1, 2021, aims to protect personal information rights and regulate personal information processing activities [9] - The Cybersecurity Review Measures, revised and effective from February 15, 2022, are designed to further ensure cybersecurity and data security while safeguarding national security [10] - The Generative Artificial Intelligence Service Management Interim Measures, effective from August 15, 2023, are the first normative policies in China targeting generative AI services [11]
联通数科网络安全大模型入选北京首台(套)重大技术装备目录
Xin Hua Wang· 2025-09-16 08:30
Core Insights - China Unicom's cybersecurity model has been recognized as a significant technological equipment, showcasing its leading position in the cybersecurity industry [1][2] - The model leverages AI to enhance security capabilities, addressing critical operational pain points and improving efficiency [1] Group 1: Recognition and Impact - China Unicom's self-developed cybersecurity model has been included in Beijing's 2025 second batch of major technological equipment, highlighting its technological strength and innovation in the cybersecurity field [1] - This recognition emphasizes China Unicom's role as a "national cybersecurity team" amid escalating global cybersecurity threats [1] Group 2: Technological Advancements - The cybersecurity model integrates four core capabilities: large models, intelligent agents, knowledge bases, and plugin tools, creating a dynamic defense paradigm that can self-learn and evolve [1] - The model has achieved significant breakthroughs in operational scenarios, including a noise reduction rate exceeding 99% and an intelligent judgment accuracy of over 95%, with judgment time reduced to under 30 seconds [1] Group 3: Operational Efficiency - The model enhances report generation efficiency by 80%, allowing security operation teams to focus 90% of their efforts on high-value threat handling, thus significantly improving operational effectiveness [1]
2025年广东省网络安全宣传周开幕 共筑网安防线 助力产业发展
Nan Fang Ri Bao Wang Luo Ban· 2025-09-16 07:52
Group 1 - The 2025 Guangdong Cybersecurity Awareness Week commenced on September 15, with the theme "Cybersecurity for the People, Cybersecurity Relies on the People" [1] - The event includes various activities such as project promotion, talent recruitment, and a cybersecurity competition, aiming to enhance industry development through favorable policies [1][3] - Zhuhai has introduced a series of incentives for the "Cybersecurity Industry Overseas Gathering Zone" and "Artificial Intelligence Large Model Ecosystem Construction Gathering Zone," with rewards up to 2 million yuan [1] Group 2 - Representatives from Guangdong, Hong Kong, and Macau emphasized collaboration to build a cybersecurity "firewall" during the opening ceremony [2] - Suggestions were made to establish a universal security model to manage systemic risks associated with large models, reducing overall social costs [2] - A memorandum was signed to promote cooperation in cybersecurity among the three regions, leading to fruitful outcomes [2] Group 3 - 21 companies presented projects related to cybersecurity technology, AI, and cross-border data flow during the event [3] - A proposal was made to create a cross-border data space to lower costs and enhance data security through AI and infrastructure collaboration [3] - Innovative cybersecurity solutions were showcased, including a drone detection system capable of real-time monitoring within a 5-kilometer radius [3] Group 4 - The "Million Talents Gather in South Guangdong" recruitment event offered 8,318 quality job positions from 94 participating companies [4] - Companies are seeking talent in AI security, blockchain, and data governance, reflecting the industry's growing demand for skilled professionals [4] - The "Bay Area Cup" cybersecurity competition attracted over 10,000 initial registrants, with 150 teams advancing to the finals, focusing on various cutting-edge security fields [5]
【安全】2025年金融网络安全宣传手册
招商银行App· 2025-09-16 07:05
Core Viewpoint - The article emphasizes the importance of cybersecurity and the need for public awareness and education regarding online safety, particularly in the context of financial information protection and the prevention of various types of online fraud [10][22]. Group 1: Cybersecurity Principles - Xi Jinping's important thoughts on building a cyber power are outlined, emphasizing the integration of cybersecurity and information technology development [2][4]. - The "Four Persistences" in cybersecurity work are highlighted, focusing on the need for cybersecurity to serve the people and the importance of education and technology integration [10][11]. Group 2: Legal Framework - The "Cybersecurity Law of the People's Republic of China" is introduced as the foundational legal framework for managing cybersecurity, effective since June 1, 2017 [13]. - The "Data Security Law" and the "Personal Information Protection Law" are also discussed, establishing guidelines for data handling and personal information protection, effective from September 1, 2021, and November 1, 2021, respectively [17][18]. Group 3: Financial Information Security - Personal financial information is defined, including identity, asset, account, credit, and transaction information [22]. - Recommendations for protecting personal financial information include not sharing sensitive information and being cautious with online transactions [23][25]. Group 4: Fraud Prevention - Various types of online fraud are detailed, including investment scams, loan fraud, and impersonation scams, with specific case studies illustrating how these scams operate [27][31][36]. - Safety tips are provided to help individuals recognize and avoid scams, emphasizing the importance of skepticism towards unsolicited offers and requests for personal information [30][33][38]. Group 5: Anti-Fraud Tools - The article lists several anti-fraud tools and resources, such as the National Anti-Fraud Center APP and various reporting hotlines, aimed at enhancing public awareness and response to potential fraud [43][44][45].
国家网络安全宣传周山东省活动在菏泽启动
Da Zhong Ri Bao· 2025-09-16 06:36
2025年国家网络安全宣传周山东省活动于9月15日至21日在全省范围内统一开展。活动期间将组织 数据安全政策宣讲、"泰山杯"网络安全大赛决赛、网络安全主题日、网络安全进基层等系列活动,提升 全社会网络安全意识和防护技能,筑牢网络安全屏障,共享清朗数字家园。 活动现场举行了网络安全主题展览,公布了2025年山东省网络安全微视频大赛获奖名单、第三批优 质网络安全宣传教育阵地名单和山东省个人信息保护优秀案例,奇安信集团董事长齐向东作大会演讲。 9月15日上午,2025年国家网络安全宣传周山东省活动在菏泽启动。山东省活动以"网络安全为人民 网络安全靠人民——以高水平安全守护高质量发展"为主题,由省委宣传部、省委网信办等部门联合主 办。 ...
奢侈品行业频遭网安威胁!LV、卡地亚、迪奥今年均曝泄露
Jing Ji Guan Cha Wang· 2025-09-16 05:44
Core Insights - Kering Group has confirmed a cyber attack that resulted in the leakage of customer data from its brands, including Gucci, Balenciaga, and Yves Saint Laurent, involving names, phone numbers, addresses, and total spending amounts, while financial information such as credit card details was not compromised [1] Industry Summary - The luxury goods sector has experienced a surge in cybersecurity incidents this year, with notable breaches including the leakage of information from nearly 420,000 customers of Louis Vuitton in July, which included passport numbers and shopping records [1] - In June, Richemont's Cartier brand faced a system intrusion that led to customer data exposure, and in May, Dior also reported incidents involving the leakage of customer names, phone numbers, and spending preferences [1]