Workflow
账号安全
icon
Search documents
X @𝘁𝗮𝗿𝗲𝘀𝗸𝘆
#安全刚收到一封 X 账号钓鱼邮件,简单分享一下:1. 伪造 X 安全提醒邮件,骗你点击。2. 点击之后是骗授权。3. 拿到授权可以利用你的 X 账号转推土狗骗人。我的防护手段:1. 我的每一个账号,不止密码是独立的,账号邮箱也是独立的。有时候我们不容易辨别发件人,但是很容易辨别收件人,也就是自己。X 官方给我发邮件,理应会发到我的别名邮箱,而不是主邮箱。2. 简单的两种方法:使用 Gmail 别名功能,或者通过 Cloudflare 购买域名。(不展开了,自己问 AI)3. 如何检查 X 账号的安全性:首先确保自己开启了 passkey 功能,对小白来说能接触到最高安全级别的东西就是 Apple ID。到 X-设置-账号安全性和访问权限,撤销掉所有不认识的授权。https://t.co/BDFguWrztn ...
新手机号注册意外登录李玟账号,最新回应
Huan Qiu Shi Bao· 2025-10-12 04:55
Core Viewpoint - The incident involving the late singer Coco Lee's NetEase Cloud Music account being accessed by a new user highlights significant issues related to account security and digital legacy management in the digital age [1][12]. Group 1: Incident Overview - On October 11, a user reported that after registering a new phone number with NetEase Cloud Music, they received a verification code and were automatically logged into Coco Lee's account [1]. - The account had 261,000 followers and displayed messages from fans expressing their condolences [4]. Group 2: Company Response - NetEase Cloud Music's customer service stated that the issue arose because the phone number linked to the artist's account was reissued by the telecom operator [7]. - The company has contacted the new phone number owner to address the situation promptly [7]. Group 3: Industry Insights - Media interviews with telecom operators revealed that users are advised to unlink their accounts from various apps before canceling their phone numbers to avoid such issues [8]. - Experts noted that "number recycling" can free up occupied number resources, with a significant portion of these numbers being reissued after users pass away without inheritors [12]. - Recommendations for addressing the "recycling" issue include extending the vacant period for recycled numbers and implementing stricter service rules across major applications to prevent unauthorized access to accounts [12]. Group 4: Broader Implications - The incident reflects broader concerns regarding account security and digital legacy management, emphasizing the need for platforms to enhance security mechanisms and for users to improve their security awareness [12].