All People Focus on Telecommunications Fraud Prevention "Burning Brain 24 Hours" to Restore True Telecom Fraud

In the Internet era, the popularization and promotion of smart devices have brought great convenience to people's lives. However, all sorts of information fraud methods followed ensued. Even during the G20 meeting, there was an incident of online sales of disguised G20 work permits. Nowadays, intensified telecommunication fraud has become the focus of public attention.

On September 1st, the first episode of "The Burning Brain 24 Hours Real Lies" (watching and poking) was jointly launched by Tencent Security Joint Lab and Tencent Video. In the play, the anti-fraud laboratory of the Tencent Security Joint Lab has truly restored the scammers' modus operandi in the real case and provided the public with a method to prevent and treat telecommunications fraud. When the play landed on Tencent video and seconds, it caused heated debate among netizens. The number of hits over the past few days exceeded three million.

(Photo of “Real Burning Brain Burning 24 Hours”)

Burn Brains Video Exposure Scams Black Industry Global Focus Fraud Prevention

"Burning Brain 24 Hours" is divided into seven episodes, of which the first episode "The Real Lies of Burning the Brain for 24 Hours" truly restores the online information fraud criminals' crimes. In real life, such frauds are common. "Flight Cancellation," "Counterfeit Public Prosecution Law," "Recommendations will rise," "Illegal Mailing Overseas," "Improve the Stars," and so on are all tricks that fraudsters use. In these cases of information fraud, fraudsters use big data as a tool for information fraud to analyze and classify personal information data, and design fraud links and stories based on the characteristics of user information. This kind of precise fraud can often deceive users' trust and easily get it. The amount of money involved ranges from a few hundred to ten million, and it is a great harm to public life.

(Photo of “Real Burning Brain Burning 24 Hours”)

In fact, the reason why fraudsters are so "blatant" is because they have already formed a complete black industrial chain. Among them are technicians responsible for the development of Trojan horses and websites, and "horsemen" who have implanted Trojan horses into victims' mobile phones. The money launderers who entered the account operations, the withdrawals from the bank cards or the withdrawal recipients of the purchases, etc., have a clear division of labor and cooperate with each other; at the same time, fraudulent practices are gradually being escalated from scatternet fraud to precision fraud. This kind of channel can capture the victim’s family information, contact information, personal accounts, and call records, and compiles various stories and scenarios to “precisely defraud” victims.

Li Xuyang, deputy general manager of Tencent Security Cloud Department, pointed out at the 2015 China Internet Economic Forum that 89% of Internet users across the country have encountered fraudulent information and the total number is as high as 438 million. The repeated ban on telecommunications fraud continued, on the one hand, it was the constant change of fraudulent means by criminals, and on the other hand, it was related to the leakage of personal information and the lack of awareness of the public. Li Xuyang, chief of the Tencent anti-fraud laboratory, who played the show, said that unlike the previous paper-based push security precautions, this time through the form of a network drama, soft film art, and restoring real fraud cases, it can further penetrate the hearts of the people and improve. Public awareness of fraud prevention. In addition, the dramatic ups and downs of the plot caused many netizens to talk about it on the Internet. Many people commented that “the technology of fraudsters is even higher, and they cannot hide behind the security experts. We must pay more attention to them later.”

Lian Lian Heng-Jian Quan Fighting Telecommunications Fraud Tencent Protecting Netizen Security

At present, anti-information fraud has become the focus of all people's attention, but the traditional effect of relying solely on government or corporate power to crack down on the limited effect, to open up the industry chain resources, data exchange, is the current way to improve efficiency. In April this year, Tencent jointly with the Ministry of Public Security and the Ministry of Industry and Information Technology, together with the three major operators of China UnionPay, China Mobile, China Unicom, and telecommunications, as well as well-known Internet security companies, held a “Tencent Guardian Program” brand conference in Tencent, Beijing, through big data. Technical advantages, heavy blows against telecommunications network fraud. At the press conference, Tencent Hawkeye’s intelligent anti-telephony fraud box was formally announced, aiming at the fact that current telecom network fraud has already gone from spreading to precision, high-tech upgrading, and the increasingly mature status of the black industry chain, the anti-fraud weapon can really make up for it. The lack of “intervention” in the anti-fraud chain effectively prevents the type of fraud in the case. According to statistics, "Eagle Eye Smart Counterfeit Phone Fraud Box" was used in Shenzhen Unicom's trial operation phase to help its counterfeit public security fraud rate fall by 80%. Since its establishment in Beijing, counterfeit public security fraud in Beijing has declined from 15 daily averages. Two cases are expected to assist the police in one year's time to block the amount of fraud from 150 million to 200 million yuan.

In July 2016, Tencent Security continued to deepen its safety and ecological establishment. Tencent Safety Joint Laboratory was established in Shenzhen. It covers Cohen's Laboratory, Xuanwu Laboratory, Zhanji Laboratory, Yunding Laboratory, Anti-Virus Laboratory, and Anti-fraud Laboratory. Seven laboratories of the Mobile Security Lab, the laboratory will focus on safety technology research and the establishment of a security offense and defense system. The security protection and protection coverage covers the six key Internet areas of connectivity, systems, applications, information, equipment and cloud, and comprehensively protect the public. Network security.

From the "World Without Thieves" anti-intelligence fraud alliance established in 2013 to the establishment of the "Guardian Program" in 2015 and to the Tencent Security Joint Lab today. Tencent Security is not only confined to network information security, but also hopes to protect the security of the entire industry through the integration and interaction of the security industry with other industries. Today, Tencent's security data is no longer isolated, but through the openness and sharing of society-oriented and enterprise-oriented enterprises, it can further drive the improvement of information security. This has also played a huge role in the current warning and prevention of telecommunication fraud. In the future, Tencent Security will, through its own technology and data advantages, promote cooperation and openness to all aspects of the industry chain, and strive to promote countermeasures against counterfeit information fraud so as to accelerate the establishment of a mature and healthy security ecosystem.

For P4

Shenzhen GEME electronics Co,.Ltd , https://www.gemeelectparts.com