Workflow
个人信息泄露
icon
Search documents
AI提供的虚拟微信号能加到真人?专家解读
Zhong Guo Xin Wen Wang· 2026-02-26 13:29
Core Viewpoint - The article discusses the phenomenon of users receiving friend requests on WeChat from strangers using virtual WeChat IDs generated by AI platforms, raising concerns about privacy and data security [1][2]. Group 1: AI Platforms and User Experiences - Users have reported receiving friend requests from strangers via AI-generated WeChat IDs, leading to feelings of being "betrayed" when they discover the source of the contact [2]. - The AI platform "豆包" provided a user with multiple virtual WeChat IDs, one of which matched a real user's ID, while the platform emphasized the importance of privacy and stated that real IDs cannot be generated [6][7]. - Other AI platforms, such as Deepseek and 千问, also allow users to request the generation of virtual WeChat IDs, with varying degrees of success in matching real users [6][7]. Group 2: Privacy Concerns and Expert Opinions - Experts suggest that the ability of AI to generate IDs that match real users could stem from publicly available information or the AI's training data, which may include existing WeChat IDs [10]. - 聂再清, a researcher from Tsinghua University, indicated that the AI models might generate plausible WeChat IDs based on statistical probabilities, but if a platform can consistently generate a high percentage of real IDs, it warrants further investigation into their methods [10]. - The WeChat customer service advised against using personal information in WeChat IDs, highlighting the importance of privacy in the context of AI-generated content [11].
12306 回应账号出现陌生乘车人
程序员的那些事· 2026-02-09 02:22
近日,有网友在社媒发帖,称 12306 APP 的乘车人列表中莫名出现陌生身份信息,且并非本人添加。 媒体致电12306官方,接线客服表示,该情况大概率是乘客登录第三方平台购票,导致个人信息泄露,被他人 盗用账号添加陌生乘车人购票。 ...
大连女子突然接到陌生男子的电话,对方准确报出了她的姓名……听到这个要求,她立马挂断了电话
Xin Lang Cai Jing· 2026-01-17 23:54
来源:半岛晨报 近日,大连市民张女士在重庆出差期间,接到一通自称航空公司的诈骗电话,对方准确报出她的姓名及 航班信息,以"飞机故障航班取消"为由试图骗取账户信息…… 女子突然接到航班取消电话 前一段时间,大连市民张女士前往重庆出差,完成工作后,她通过订票平台预订了1月14日晚上返回大 连的航班。然而,就在出发前一天的1月13日中午,一通突如其来的电话让她陷入了不安。 张女士接到的是一个归属地为山西临汾的手机号码。"平时我看到外地陌生电话一般不会接,但因为我 在山西那边有业务往来,担心是客户或同事有急事,才接了起来。"张女士说,电话接通后,对方是一 名自称航空公司工作人员的男性。他准确报出了张女士的姓名和具体航班信息,这一细节很快打消了张 女士的疑虑,让她相信对方确实是航空公司的相关人员。 该男子随后以严肃的语气告知张女士:她原定乘坐的航班因故障临时取消。为了不影响她的行程,航空 公司可以为其安排另一班次,并表示新航班同样是晚间起飞,仅比原计划稍晚抵达大连。"当时觉得时 间变动不大,听起来也算合理。"张女士事后说道。 紧接着,对方主动提出,由于航班变动系航空公司原因造成,给旅客带来了不便,因此可根据规定给予 一 ...
INVESTOR ALERT: Pomerantz Law Firm Reminds Investors with Losses on their Investment in Coupang, Inc. of Class Action Lawsuit and Upcoming Deadlines - CPNG
Globenewswire· 2026-01-13 20:36
Core Viewpoint - A class action lawsuit has been filed against Coupang, Inc. regarding allegations of securities fraud and unlawful business practices related to a significant data breach affecting customer information [1][2]. Group 1: Lawsuit Details - The class action lawsuit is focused on whether Coupang and its officers/directors engaged in securities fraud or other unlawful business practices [2]. - Investors who purchased Coupang securities during the Class Period have until February 17, 2026, to request to be appointed as Lead Plaintiff [2]. Group 2: Data Breach Incident - On November 30, 2025, it was reported that Coupang experienced a data breach affecting 33.7 million customer accounts, leading to a stock price drop of $1.51 per share (5.36%) to close at $26.65 on December 1, 2025 [4]. - Following the breach, Coupang's CEO resigned, and a police raid occurred at Coupang's offices, resulting in a further stock price decline of $0.87 per share (3.2%) to close at $26.06 on December 10, 2025 [5]. - On December 16, 2025, Coupang acknowledged the breach in a filing with the U.S. Securities and Exchange Commission, revealing that a former employee may have accessed personal information of up to 33 million customers, causing the stock price to fall by $0.47 per share (2.03%) to close at $22.72 on December 17, 2025 [6].
多人银行卡被盗刷……这个功能不用时请关闭!快检查手机→
Xin Lang Cai Jing· 2026-01-12 20:06
NFC功能,是一种基于射频识别的短距离无线通信技术,广泛应用于移动支付、交通出行、设备互联等领域,允许设备在10厘米内快速交换数 据。 正是这种"近距离"特性,让许多人误以为其使用场景相对安全,然而,诈骗分子却利用起了这一认知盲区。 诈骗分子通常会引导受害者下载不明来源的App,或利用屏幕共享软件远程操控手机,进而诱导受害者启用手机的NFC功能。当受害人将银行卡 贴近手机的一瞬间,银行卡信息就会被读取、绑定至虚假支付工具,资金随即被转移。 近期,多地出现利用NFC功能实施诈骗的新型犯罪手法——一台手机贴住实体的银行卡,另一台手机就能直接把这张银行卡"隔空"复制出来,全 程不需要输入密码,还能用手机代替实体银行卡成功取现或盗刷。 不少用户在毫无防备的情况下,银行卡内资金被隔空盗刷,个人信息亦遭泄露。如何防范?一文了解↓ 银行卡遭隔空盗刷 NFC成诈骗"帮凶" 值得警惕的是,诈骗团伙还会利用部分支付软件的小额免密支付功能,在受害人未主动输入密码的情况下完成盗刷。由于NFC交易过程迅速,且 常被包装为"验证流程",受害者往往在事后查询账户时才发现资金被盗。 一次骗局 或致个人信息全面"裸奔" NFC盗刷背后潜藏着个 ...
多人银行卡被盗刷……NFC功能不用时请关闭!快检查手机
Xin Lang Cai Jing· 2026-01-08 08:42
来源:央视一套 近期,多地出现利用NFC功能实施诈骗的新型犯罪手法——一台手机贴住实体的银行卡,另一台手机就 能直接把这张银行卡"隔空"复制出来,全程不需要输入密码,还能用手机代替实体银行卡成功取现或盗 刷。 不少用户在毫无防备的情况下,银行卡内资金被隔空盗刷,个人信息亦遭泄露。如何防范?一文了解↓ 银行卡遭隔空盗刷 NFC成诈骗"帮凶" NFC功能,是一种基于射频识别的短距离无线通信技术,广泛应用于移动支付、交通出行、设备互联等 领域,允许设备在10厘米内快速交换数据。 正是这种"近距离"特性,让许多人误以为其使用场景相对安全,然而,诈骗分子却利用起了这一认知盲 区。 诈骗分子通常会引导受害者下载不明来源的App,或利用屏幕共享软件远程操控手机,进而诱导受害者 启用手机的NFC功能。当受害人将银行卡贴近手机的一瞬间,银行卡信息就会被读取、绑定至虚假支付 工具,资金随即被转移。 值得警惕的是,诈骗团伙还会利用部分支付软件的小额免密支付功能,在受害人未主动输入密码的情况 下完成盗刷。由于NFC交易过程迅速,且常被包装为"验证流程",受害者往往在事后查询账户时才发现 资金被盗。 一次骗局 或致个人信息全面"裸奔" ...
马上评|“l0086”不是10086,李鬼号如何注册的?
Xin Lang Cai Jing· 2025-10-30 08:26
Core Viewpoint - The recent surge in fraudulent SMS messages, often disguised as enticing offers, highlights significant vulnerabilities in the regulatory and operational frameworks of telecommunications and e-commerce platforms [1][3][4]. Group 1: Nature of the Fraud - Many individuals have received SMS messages claiming they have unused points that will expire, prompting them to log in and redeem rewards, which are often traps [1]. - Scammers are using similar-looking phone numbers, such as "l0086" instead of "10086," to mislead users, exploiting the low distinguishability between the letter "l" and the number "1" [4]. Group 2: Regulatory Failures - The fraudulent SMS issue stems from a breakdown in the regulatory chain involving telecom operators, platforms, and oversight bodies, leading to a failure in protecting consumers [4][5]. - A specific case involved the misuse of the 1068 number segment, which was supposed to be used for legitimate notifications but was instead rented out to unauthorized companies for sending scam messages [4]. Group 3: Impact on Public Trust - The ongoing scams and regulatory failures are eroding public trust in telecommunications services, with individuals becoming increasingly skeptical of legitimate notifications from known sources [5][6]. - The loss of trust not only affects the reputation of telecom operators and e-commerce platforms but also undermines the credibility of public services in the communication sector [5][6]. Group 4: Recommendations for Improvement - To restore public confidence, it is essential to thoroughly investigate regulatory loopholes and sever the chains of information leakage that facilitate these scams [6]. - Strengthening the monitoring of number segments and enhancing the identification systems for SMS messages are critical steps to prevent future fraud [4][6].
苏州一女子遭遇虚构法院案件信息暴力催收,警方已立行政案件
Xin Lang Cai Jing· 2025-09-30 04:19
Core Viewpoint - The case of Ms. Wang highlights serious concerns regarding personal information security and illegal debt collection practices associated with Ping An Rongyi, a financing service brand under Ping An Group, as she experiences harassment and threats from unknown numbers after borrowing money from the platform [1][3][14]. Group 1: Incident Overview - Ms. Wang reported receiving frequent harassment and threatening messages from five private phone numbers after borrowing a total of 7,200 yuan from Ping An Rongyi, with a remaining principal of 2,355 yuan and an overdue period of 1,496 days [3][5]. - The harassment included messages claiming to be from a court, with fabricated case numbers and threats of travel restrictions due to unpaid debts [8][10]. Group 2: Company Response - Ping An Rongyi stated that they have suspended cooperation with the debt collection company involved and are actively addressing Ms. Wang's concerns [3][14]. - The company denied any leakage of personal information and claimed that they did not create fictitious court documents [14]. Group 3: Legal Implications - Legal experts indicated that the messages received by Ms. Wang could constitute forgery if they involve fabricated legal documents, and the debt collection companies could face civil liabilities for violating personal privacy rights [15].
申领育儿补贴后接到诈骗电话!是谁泄露了他们的个人信息?
Yang Guang Wang· 2025-09-27 05:39
Core Points - The article discusses the launch of a child-rearing subsidy program by the National Health Commission, which offers 3,600 yuan per child per year for children under three years old, and highlights the rapid emergence of related scams targeting parents [1][2] Group 1: Subsidy Program - The child-rearing subsidy is officially open for applications, providing 3,600 yuan per child annually for children under three years old [1] - Applications can be submitted online through platforms like Alipay, WeChat, and provincial government service platforms, as well as through offline methods [1] Group 2: Scam Incidents - Parents have reported receiving scam calls shortly after applying for the subsidy, with scammers possessing detailed personal information such as children's names and birth dates [1][2] - Victims have been manipulated into providing sensitive information or downloading malicious software under the guise of verifying their subsidy applications [3][5] Group 3: Information Leakage - The article raises concerns about the source of personal information leaks, suggesting that it could stem from various channels, including internal personnel and system vulnerabilities [4][6] - Experts indicate that tracking the source of information leaks is challenging due to the complex nature of data handling and the potential for multiple parties to be involved [6][7] Group 4: Cybersecurity Measures - Cybersecurity experts emphasize the importance of not downloading unknown software or clicking on suspicious links to mitigate risks associated with information leakage [5] - There is a call for a comprehensive approach to address personal information leaks, involving legal, technical, and management strategies to enhance public awareness and security [7]
充场工作室成黑产温床:“日薪300,轻松注册App”背后的惊人秘密
Yang Shi Xin Wen· 2025-08-22 02:09
Core Viewpoint - The rise of "charging studios" has led to the illegal sale of real-name online accounts, posing significant risks to both individuals and online platforms [1][6]. Group 1: Charging Studios and Their Operations - Charging studios recruit numerous part-time workers to complete tasks like account registration and app downloads, helping platforms boost user data and earn promotion commissions [1]. - The operation involves enticing advertisements promising easy earnings, collecting personal information from workers, and using that information to register accounts for resale [3][4]. - The registered accounts are not used for legitimate purposes but are sold through underground intermediaries known as "account dealers" [3]. Group 2: Risks to Part-time Workers - Part-time workers, initially seeking easy income, unknowingly become sellers of their personal information, leading to potential legal and personal risks [4][5]. - If their real-name accounts are used for illegal activities, these workers may face legal repercussions despite their lack of involvement in the crimes [5]. Group 3: Impact on Online Platforms - The sale of real-name accounts undermines user trust, which is crucial for the survival and growth of online platforms [6]. - The presence of fake or misused accounts can lead to user skepticism about the platform's security and management capabilities, potentially driving users away [6]. - If platforms knowingly utilize these problematic accounts, they may be implicated in criminal activities and face legal consequences [6]. Group 4: Criminal Activities and Social Threats - The illegal sale of real-name accounts acts as a catalyst for various crimes, including scams and fraudulent activities [7]. - Criminals exploit these accounts to perpetrate scams, manipulate e-commerce ratings, and spread misleading information on social media [8]. - The lack of effective user information protection measures by platforms exacerbates the issue, allowing criminals to easily access and misuse personal data [10]. Group 5: Platform Accountability and Security Measures - Online platforms, as custodians of user information, are expected to ensure data security, yet many fail to implement adequate verification processes [10]. - Current account registration methods are often insufficient, allowing criminals to bypass security measures and accumulate accounts for illegal use [10]. - The absence of dynamic monitoring for account usage across different devices and networks further enables criminal activities without detection [10].