2. Criminals use any number of Internet phones to pretend to be staff members of post offices, telecommunications, public security organs and other units to call mobile phone users, threatening to confiscate or protect the bank deposits of mobile phone users on the grounds that mailing parcels is drug-related, cable TV or telephone is in arrears, and others are suspected of committing crimes, and inducing them to transfer money to designated accounts.
3. By pretending to be a bank or payment App, criminals implant a mobile payment virus in it to induce users to input information such as bank account number and password, and then intercept and forward the mobile payment verification code and payment receipt SMS through the virus to complete the fund theft. Or use the method of "phishing information+mobile payment virus" to steal the user's bank card.
4. Criminals make some software for grabbing red envelopes and put it on the network to lure users to download, or implant Trojan virus into users' mobile phones through QR codes, thus stealing users' information, intercepting users' short messages, obtaining verification codes, etc., and quietly transferring users' property.
5. Criminals use pseudo base stations to send short messages containing Trojan virus links, and mobile phone users will be poisoned once they click on the links. Trojan virus can intercept mobile phone messages and forward them to another designated mobile phone number, thus exposing the identity of mobile phone users, bank cards and SMS verification information.
Eight ways to use mobile banking:
1. The biggest feature of mobile banking business is the unique binding relationship between customer account information and mobile phone number. Therefore, when opening mobile banking, you must use the officially released mobile banking client, and at the same time confirm that your mobile phone is bound by the contract, and ensure that the signed mobile phone number must be used by yourself.
2. Try not to use free WiFi in public places to log in to mobile banking.
3. Set an appropriate limit according to your usual trading habits and transfer amount.
4. Every time you log in to mobile banking, you should carefully check whether the welcome information is consistent and whether the last login time is correct. If you find anything unusual, you should quit in time.
5. After use, click the "Safe Exit" button to exit, in case the program may still run in the background.
6. After changing the mobile phone number, modify the bank binding information in time to prevent the original mobile phone number from continuing to use the mobile banking function.
7. SMS notification service started. Once the account funds change, the bank will notify the user by SMS as soon as possible to ensure the security of the account.
8. Overseas Chinese, overseas students, people from Taiwan, Hong Kong and Macao, etc. If you want to open mobile banking, you can go to a bank outlet in Chinese mainland. If you go abroad and use mobile banking in case of data roaming, please follow the above rules.
The above contents refer to People's Daily Online-Using Mobile Banking? How to guard against risks