Workflow
个人信息泄露
icon
Search documents
向12345投诉,个人信息却遭泄露!上海通报→
证券时报· 2026-03-14 08:07
Incident Overview - A resident in Baoshan District, Shanghai, reported illegal construction in his community, leading to a breach of his personal information by the property manager [1][2] - The local government confirmed the illegal construction and stated that it was voluntarily demolished by the violator [1][3] Complaint Process - The complaint was filed on February 24, and the property manager, along with local enforcement, conducted an inspection the following day [2] - The property manager improperly disclosed the complainant's information to the violator, which led to the violator contacting the complainant to negotiate [2][9] Information Leakage - The property manager's actions resulted in the complainant's personal information being leaked, which was not supposed to be shared [7][11] - The violator deduced the complainant's identity and address based on limited information provided in the complaint [8] Consequences and Actions Taken - The property manager was dismissed and faced administrative penalties for the unauthorized disclosure of personal information [11] - The local authorities provided criticism and education to the violator regarding their actions [11]
AI提供的虚拟微信号能加到真人?专家解读
Zhong Guo Xin Wen Wang· 2026-02-26 13:29
Core Viewpoint - The article discusses the phenomenon of users receiving friend requests on WeChat from strangers using virtual WeChat IDs generated by AI platforms, raising concerns about privacy and data security [1][2]. Group 1: AI Platforms and User Experiences - Users have reported receiving friend requests from strangers via AI-generated WeChat IDs, leading to feelings of being "betrayed" when they discover the source of the contact [2]. - The AI platform "豆包" provided a user with multiple virtual WeChat IDs, one of which matched a real user's ID, while the platform emphasized the importance of privacy and stated that real IDs cannot be generated [6][7]. - Other AI platforms, such as Deepseek and 千问, also allow users to request the generation of virtual WeChat IDs, with varying degrees of success in matching real users [6][7]. Group 2: Privacy Concerns and Expert Opinions - Experts suggest that the ability of AI to generate IDs that match real users could stem from publicly available information or the AI's training data, which may include existing WeChat IDs [10]. - 聂再清, a researcher from Tsinghua University, indicated that the AI models might generate plausible WeChat IDs based on statistical probabilities, but if a platform can consistently generate a high percentage of real IDs, it warrants further investigation into their methods [10]. - The WeChat customer service advised against using personal information in WeChat IDs, highlighting the importance of privacy in the context of AI-generated content [11].
12306 回应账号出现陌生乘车人
程序员的那些事· 2026-02-09 02:22
Core Viewpoint - Recent reports indicate that users of the 12306 APP have encountered unfamiliar identity information in their passenger lists, which was not added by them [1] Group 1 - The 12306 official customer service suggested that this issue is likely due to passengers logging into third-party platforms for ticket purchases, leading to personal information leakage and unauthorized addition of unfamiliar passengers for ticket purchases [3]
大连女子突然接到陌生男子的电话,对方准确报出了她的姓名……听到这个要求,她立马挂断了电话
Xin Lang Cai Jing· 2026-01-17 23:54
Core Insights - A recent incident involving a scam targeting travelers highlights the risks associated with personal information leakage in the airline industry [1][3][4] Group 1: Incident Overview - A woman from Dalian received a fraudulent call from someone claiming to be an airline employee, who accurately provided her name and flight details, leading her to initially trust the caller [1] - The scammer informed her that her flight was canceled due to a technical issue and offered to arrange an alternative flight, which seemed reasonable to her at first [1][2] - The caller then attempted to obtain her Alipay account information under the pretense of providing compensation, which raised her suspicions [3] Group 2: Information Security Concerns - The victim expressed concerns about how her personal information was accessed, questioning whether it was leaked by the booking platform, the airline, or another entity [3][4] - The booking platform's customer service stated that personal information could be compromised at any stage of the booking process, emphasizing the importance of safeguarding traveler data [4] Group 3: Scam Tactics - Scammers typically acquire passenger information through illegal means, then impersonate airline staff to gain trust before claiming flight issues and offering compensation [6] - They often instruct victims to download unfamiliar apps with screen-sharing capabilities, which can lead to unauthorized access to personal accounts [6] - The police have issued warnings about such scams, advising travelers to verify flight changes through official channels and avoid sharing personal information over the phone [6][7]
INVESTOR ALERT: Pomerantz Law Firm Reminds Investors with Losses on their Investment in Coupang, Inc. of Class Action Lawsuit and Upcoming Deadlines - CPNG
Globenewswire· 2026-01-13 20:36
Core Viewpoint - A class action lawsuit has been filed against Coupang, Inc. regarding allegations of securities fraud and unlawful business practices related to a significant data breach affecting customer information [1][2]. Group 1: Lawsuit Details - The class action lawsuit is focused on whether Coupang and its officers/directors engaged in securities fraud or other unlawful business practices [2]. - Investors who purchased Coupang securities during the Class Period have until February 17, 2026, to request to be appointed as Lead Plaintiff [2]. Group 2: Data Breach Incident - On November 30, 2025, it was reported that Coupang experienced a data breach affecting 33.7 million customer accounts, leading to a stock price drop of $1.51 per share (5.36%) to close at $26.65 on December 1, 2025 [4]. - Following the breach, Coupang's CEO resigned, and a police raid occurred at Coupang's offices, resulting in a further stock price decline of $0.87 per share (3.2%) to close at $26.06 on December 10, 2025 [5]. - On December 16, 2025, Coupang acknowledged the breach in a filing with the U.S. Securities and Exchange Commission, revealing that a former employee may have accessed personal information of up to 33 million customers, causing the stock price to fall by $0.47 per share (2.03%) to close at $22.72 on December 17, 2025 [6].
多人银行卡被盗刷……这个功能不用时请关闭!快检查手机→
Xin Lang Cai Jing· 2026-01-12 20:06
Core Viewpoint - A new type of fraud utilizing NFC technology has emerged, allowing criminals to copy bank card information without requiring a password, leading to unauthorized withdrawals and information theft [1][2]. Group 1: NFC Technology and Fraud Mechanism - NFC (Near Field Communication) is a short-range wireless communication technology that allows data exchange within 10 centimeters, commonly used in mobile payments and transportation [2]. - Criminals exploit the perceived safety of NFC by tricking victims into downloading malicious apps or using screen-sharing software to enable NFC functionality, allowing them to read and bind bank card information to fraudulent payment tools [2][4]. Group 2: Risks of Personal Information Leakage - The NFC fraud not only results in financial loss but also poses significant risks of personal information leakage, as sensitive data such as card numbers and transaction records can be accessed by malicious apps during the fraud process [5]. - Victims may unknowingly grant extensive permissions to malicious apps, allowing access to contacts, messages, and location data, which can lead to further identity theft and fraud [5]. Group 3: Prevention Measures - Users are advised to follow the "three no" principles: do not trust unknown calls regarding refunds or compensations, do not click on suspicious links or download questionable apps, and do not enable screen-sharing during payment processes [6]. - Additional preventive steps include regularly checking app permissions, using trusted payment channels, and being cautious with personal information sharing [7][9].
多人银行卡被盗刷……NFC功能不用时请关闭!快检查手机
Xin Lang Cai Jing· 2026-01-08 08:42
Core Viewpoint - The emergence of a new type of fraud utilizing NFC technology allows criminals to remotely copy bank card information without requiring a password, leading to unauthorized withdrawals and identity theft [1][2]. Group 1: NFC Technology and Fraud - NFC (Near Field Communication) is a short-range wireless communication technology that enables data exchange within 10 centimeters, commonly used in mobile payments and transportation [2]. - Criminals exploit the perceived safety of NFC technology by tricking victims into enabling NFC on their devices, allowing them to read and bind bank card information to fraudulent payment tools [2][3]. Group 2: Risks of Personal Information Leakage - The process of NFC fraud not only facilitates unauthorized transactions but also risks the leakage of sensitive personal information, including card numbers and transaction records [3]. - Malicious apps can gain access to critical permissions on victims' phones, leading to potential identity theft and long-term impacts on personal credit and digital security [3]. Group 3: Prevention Measures - Users are advised to adhere to the "three no" principles: do not trust unfamiliar calls regarding refunds or compensations [4]. - It is recommended to disable screen sharing features, especially during payment processes, and to only activate NFC when necessary [5][6]. - Payments should be made through trusted channels such as official banking apps, and users should enable multi-factor authentication for added security [7]. - Users should disable small-amount payment features and regularly review app permissions to limit access to sensitive information [8]. Group 4: Additional Safety Steps - Individuals should be cautious when participating in online surveys or promotions that require personal information [9]. - Proper disposal of documents containing personal information, such as shipping labels and travel itineraries, is essential [10]. - Avoiding public Wi-Fi for sensitive transactions and regularly changing passwords for important accounts can enhance security [11][12]. - In case of suspected fraud, immediate contact with the bank and law enforcement is crucial, along with preserving evidence of the incident [12]. Group 5: Emergency Contact Information - The national anti-fraud warning hotline is 96110, which alerts individuals to potential scams [13]. - The dedicated SMS number for fraud warnings is 12381, providing timely alerts about new fraud methods and immediate assistance if someone is in a scam situation [14].
马上评|“l0086”不是10086,李鬼号如何注册的?
Xin Lang Cai Jing· 2025-10-30 08:26
Core Viewpoint - The recent surge in fraudulent SMS messages, often disguised as enticing offers, highlights significant vulnerabilities in the regulatory and operational frameworks of telecommunications and e-commerce platforms [1][3][4]. Group 1: Nature of the Fraud - Many individuals have received SMS messages claiming they have unused points that will expire, prompting them to log in and redeem rewards, which are often traps [1]. - Scammers are using similar-looking phone numbers, such as "l0086" instead of "10086," to mislead users, exploiting the low distinguishability between the letter "l" and the number "1" [4]. Group 2: Regulatory Failures - The fraudulent SMS issue stems from a breakdown in the regulatory chain involving telecom operators, platforms, and oversight bodies, leading to a failure in protecting consumers [4][5]. - A specific case involved the misuse of the 1068 number segment, which was supposed to be used for legitimate notifications but was instead rented out to unauthorized companies for sending scam messages [4]. Group 3: Impact on Public Trust - The ongoing scams and regulatory failures are eroding public trust in telecommunications services, with individuals becoming increasingly skeptical of legitimate notifications from known sources [5][6]. - The loss of trust not only affects the reputation of telecom operators and e-commerce platforms but also undermines the credibility of public services in the communication sector [5][6]. Group 4: Recommendations for Improvement - To restore public confidence, it is essential to thoroughly investigate regulatory loopholes and sever the chains of information leakage that facilitate these scams [6]. - Strengthening the monitoring of number segments and enhancing the identification systems for SMS messages are critical steps to prevent future fraud [4][6].
苏州一女子遭遇虚构法院案件信息暴力催收,警方已立行政案件
Xin Lang Cai Jing· 2025-09-30 04:19
Core Viewpoint - The case of Ms. Wang highlights serious concerns regarding personal information security and illegal debt collection practices associated with Ping An Rongyi, a financing service brand under Ping An Group, as she experiences harassment and threats from unknown numbers after borrowing money from the platform [1][3][14]. Group 1: Incident Overview - Ms. Wang reported receiving frequent harassment and threatening messages from five private phone numbers after borrowing a total of 7,200 yuan from Ping An Rongyi, with a remaining principal of 2,355 yuan and an overdue period of 1,496 days [3][5]. - The harassment included messages claiming to be from a court, with fabricated case numbers and threats of travel restrictions due to unpaid debts [8][10]. Group 2: Company Response - Ping An Rongyi stated that they have suspended cooperation with the debt collection company involved and are actively addressing Ms. Wang's concerns [3][14]. - The company denied any leakage of personal information and claimed that they did not create fictitious court documents [14]. Group 3: Legal Implications - Legal experts indicated that the messages received by Ms. Wang could constitute forgery if they involve fabricated legal documents, and the debt collection companies could face civil liabilities for violating personal privacy rights [15].
申领育儿补贴后接到诈骗电话!是谁泄露了他们的个人信息?
Yang Guang Wang· 2025-09-27 05:39
Core Points - The article discusses the launch of a child-rearing subsidy program by the National Health Commission, which offers 3,600 yuan per child per year for children under three years old, and highlights the rapid emergence of related scams targeting parents [1][2] Group 1: Subsidy Program - The child-rearing subsidy is officially open for applications, providing 3,600 yuan per child annually for children under three years old [1] - Applications can be submitted online through platforms like Alipay, WeChat, and provincial government service platforms, as well as through offline methods [1] Group 2: Scam Incidents - Parents have reported receiving scam calls shortly after applying for the subsidy, with scammers possessing detailed personal information such as children's names and birth dates [1][2] - Victims have been manipulated into providing sensitive information or downloading malicious software under the guise of verifying their subsidy applications [3][5] Group 3: Information Leakage - The article raises concerns about the source of personal information leaks, suggesting that it could stem from various channels, including internal personnel and system vulnerabilities [4][6] - Experts indicate that tracking the source of information leaks is challenging due to the complex nature of data handling and the potential for multiple parties to be involved [6][7] Group 4: Cybersecurity Measures - Cybersecurity experts emphasize the importance of not downloading unknown software or clicking on suspicious links to mitigate risks associated with information leakage [5] - There is a call for a comprehensive approach to address personal information leaks, involving legal, technical, and management strategies to enhance public awareness and security [7]