When Lao Li was walking downstairs in the community, he received a call.

The other party spoke standard Mandarin, claimed to be a member of the "XX Bank Credit Card Center", and said that a large amount of consumption had occurred on his credit card overseas and that he had to verify it immediately, otherwise the account would be frozen.

When Lao Li heard this, he felt something was wrong - he had never applied for a credit card from this bank.

After hanging up the phone, he told the story to his old chess-playing buddies. Everyone couldn't help but laugh and said: "In today's era, there are situations where a liar is more concerned about your money than his son!".

How do we defend against social engineering attacks in our daily life and work?_Social engineering attacks prevent the leakage of sensitive information and telecom fraud

What happened to Lao Li has now become a "compulsory course in life" for almost every Chinese citizen.

There is such a group of people who became one group before smartphones were used by them. They are adults and aunts, and the young people who watch short videos every day are classified as another group and are distinguished. However, almost everyone can tell a few strange stories of their own related to "scammers' battle of wits and courage".

Those invisible traps are hidden in the most familiar scenes of our daily life.

📱 Don’t trust “strange friends” on your mobile phone

During the break at noon, Xiao Chen, who worked at an Internet company, received a WeChat friend request. His avatar and name showed the newly arrived vice president of their department.

After it was approved, the "vice president" said in a slightly commanding tone that he was in a meeting at the time and asked him to assist in transferring 20,000 yuan to an "important customer". He also said that he would return the money when he went to work on Monday.

Xiao Chen was more thoughtful. He clicked on the page as if he wanted to look at the circle of friends again, but found that it was completely blank.

He asked directly in the company group and found out it was a scam.

Social engineering attacks prevent the leakage of sensitive information and telecom fraud_How do we defend against social engineering attacks in our daily life and work?

This method of "pretending to be an acquaintance" is just like someone suddenly pretending to be close to you in the community and asking for money as soon as you open your mouth. No matter who you are, they will consider it carefully.

🏦 Be careful with the "technology and ruthless work" in the wet market

Social engineering attacks prevent the leakage of sensitive information and telecom fraud_How do we defend against social engineering attacks in our daily life and work?

On the weekend, Aunt Zhang went to the vegetable market to buy groceries. In the process, she met a young man who offered to scan the QR code and receive a bag of laundry detergent.

Aunt Zhang was thinking that she had to pay anyway, so she scanned the code with her finger, and then followed several public accounts step by step according to the established pattern.

After my daughter got home, she discovered that there were a large number of apps from unknown sources in the background of her mobile phone, and there was a "verification code" in the text message.

Her daughter hurriedly helped her uninstall the software, and then warned her repeatedly and carefully: "Mom, don't just scan the QR codes you encounter when you are outside. Those things that claim to be free are probably actually the most expensive."

How do we defend against social engineering attacks in our daily life and work?_Social engineering attacks prevent the leakage of sensitive information and telecom fraud

Social engineering attacks prevent the leakage of sensitive information and telecom fraud_How do we defend against social engineering attacks in our daily life and work?

Indeed, today's deception is no longer as simple as "you won the lottery" back then.

They are like capillaries in the city, penetrating into every aspect of our lives.

Xiao Wu, who had just graduated and started looking for an apartment to rent, saw a well-decorated apartment on a rental website whose price was significantly lower than the general market price. The picture showed an exquisite state and the description had attractive qualities.

After getting in touch with the "landlord", the other party said that he was out of town and could pay a deposit to reserve the house, and sent a photo of his ID card.

How do we defend against social engineering attacks in our daily life and work?_Social engineering attacks prevent the leakage of sensitive information and telecom fraud

Xiao Wu saved his thoughts and used the property management of the community to verify it. Only then did he realize that the house was not being rented out at all.

Those beautiful pictures are just "bait" taken by scammers from the Internet.

🏠 Be wary of the “information trap” at your doorstep

Even the community at home has become the front line of information attack and defense.

Recently, Xiao Liu, a staff member of the Community Department, has been promoting the "National Anti-Fraud Center APP" door by door.

At first, many residents found it troublesome and thought, "I have no money, so I can't be cheated."

Until Xiao Liu told them what happened to Uncle Wang in the neighborhood next door, Uncle Wang received a text message claiming to be from the 'Social Security Bureau'. The text message said that his social security card had been frozen and he had to go in and click on the link to activate it.

Uncle Wang clicked to enter, filled in his ID number, and then filled in his bank card number. However, the pension that had just been issued in the card was immediately transferred away.

You can now realize that those text message links that look like official links are very likely to be the entrance to traps.

At night, the night market is brightly lit and the barbecue stalls are filled with smoke.

There were two young people who were making complaints while playing skewers. One of them said that he was almost deceived by the emergency notice issued by the so-called "bank" today, while the other said that he had just deleted a fraudulent text message with the content of "Flight Delayed".

At another table next to me, an elder brother took over and said, "It's true. Just two days ago, my wife received a phone call. The phone claimed that I had been in a car accident and was being treated in a hospital. She was also asked to transfer money quickly. This scared her and she almost fainted. It wasn't until later that I realized that it was those deceitful guys who were trying to trick people."

This may be the most authentic portrayal of people’s livelihood in China today.

The convenience of technology and the risks of information are like two sides of the same coin, closely intertwined.

The line of defense is not a seamless barrier, but an accumulation of responses from many different situations. Unfamiliar messages from smartphones, unusual QR code scanning traps at the wet market, bewildering "super value temptations" when renting and buying a house, and help prompts from people pretending to be family members in emergencies. In these various moments of life experience, through self-experience, we each independently build boundaries that can play a protective role.

The strongest cornerstone of this line of defense may lie in a well-intentioned reminder between neighbors, a patient explanation between family members, or the extra second of hesitation and thinking before each click of "Confirm."