Pay attention to mobile phone number Security: Reporters investigate that new numbers are not "new" Harassment is followed

Source: Internet
Author: User

Pay attention to mobile phone number Security: Reporters investigate that new numbers are not "new" Harassment is followed

 

As mobile Internet is used more and more frequently, in the virtual world, we need to provide mobile phone numbers when enjoying services. Sometimes, we need to use mobile phone numbers to prove our identity. For example, mobile phone numbers often act as ID cards in the online world. However, have you considered the security of mobile phone numbers?

Miss Yang purchased a new mobile phone number from the carrier in March due to work needs. But this new number, which was just bought as a job, is often used by strangers to ask her strange questions. Ms. Yang also repeatedly communicated with the official Customer Service who sold her numbers online. Customer service not only cannot help Miss Yang solve the current problems, but also repeatedly recommends her new business and plans.

 

Number "instantly" "easy to master" host is troublesome

Miss Huang, who works in Beijing, has a mobile phone number in her hometown. She planned to use this number every time she went home, so she handled the downtime insurance number through manual customer service, after several months, I found that the host of the mobile phone number has become another user. What's even more surprising is that when Miss Huang and the reporter called the operator's customer service again, they found that all the host information of the mobile phone number could not be found.

Miss Huang thought of a series of website services she had registered with this number and wanted to unbind the mobile phone number from the website. However, new troubles had arisen.

How can I "authenticate my account "?!

Mr. FU's daily life is inseparable from his mobile phone. After handling a new couple's number with his family, he binds the registered mobile phone numbers used on many frequently-used websites, and changed to a new mobile phone number, but even so, many of the software's common accounts, but still can not use.

A similar situation occurs in a software download application that Mr. Fu often uses. Although both the email address and mobile phone information are bound, the password can only be retrieved through the mobile phone verification code when changing the password.

About 17% mobile phone numbers for sale

In fact, here we are, Miss Yang, Miss Huang, and Mr. Fu are not alone. With the advent of the mobile Internet era, while enjoying convenient services, the permissions granted to mobile phone numbers are getting higher and higher, just like another "ID card" in the Internet Society ". But is this ID card really safe?

The third-party network security education platform I spring and autumn college used public Internet channels to collect information including mobile, Unicom, telecom, and virtual operators, covering more than 10 provinces in China, the 10182 mobile phone numbers that can be purchased through the official website of the carrier perform a security query on the situation where these numbers are bound to Internet services.

After checking over 10 thousand numbers, we found that about 17% of the numbers had not been unbound from the Internet. According to the operator, about 27% of China Unicom numbers are at risk. The proportions of China Mobile, China Telecom, and virtual operators are over 14%, over 7%, and nearly 3%, respectively, there is a risk that more than 36% of Shanghai numbers are at risk. Jiangsu and Hunan ranked below 28% respectively and 22% respectively. After dividing the 176 websites that can be detected into seven categories, including life, shopping, education, and portal, all the 3472 ununbound information obtained are analyzed, there are 1330 risks in life, accounting for more than 38%, 652 for shopping, accounting for more than 18%, and about 16% for portal websites.

After the reporter entered the mobile phone number, the program automatically calculated the result and displayed the registration information of 12 Internet services, many of them have forgotten to register.

Mobile phone number permission: directly retrieve the account and password

With the popularization and application of the mobile Internet, what kind of privacy information can be obtained by using mobile phone numbers to authenticate user identities and the Internet? What are the permissions of mobile phone numbers? Next, let's look at the reporter's investigation.

Reporters and mobile phone security experts conducted a simulated demonstration using a brand new mobile phone number bought from the carrier. We tried to retrieve the QQ number that was originally bound to the mobile phone number.

After changing the password, the security expert successfully logged on to this unfamiliar QQ number through the mobile phone, and we can directly see some privacy information including contacts in the account. Although this is just a simulated demonstration, experts tell us that in real life, malicious operations in this way will bring serious security risks.

In fact, it is not just QQ. experts tell us that many websites we use in daily use can retrieve their passwords in this way, and even use their mobile phone numbers to log in without the knowledge of the account owner, you can obtain a large number of private information recorded in your account, including your ID card number and address. (Animation) at the same time, according to a report released by the China Internet Network Information Center (CNNIC), by the end of June 2015, the total number of Internet users in China reached 0.668 billion, and the number of mobile Internet users reached 0.594 billion, mobile Internet users account for 88.9% of all Internet users. The number of online payment users reaches 0.359 billion, and the proportion of online payment used by Chinese netizens has increased from 46.9% to 53.7%. This means that there are various types of private information of many netizens, which may only be exposed due to the leakage of mobile phone numbers.

Experts told us that mobile phone users can receive text message verification codes. The network operator applied to the mobile service operator for activating the SMS gateway service. In the current actual operation, mobile service providers are mainly concerned about whether text messages are delivered in a timely manner, whether the content of network operators violates national regulations, and whether the mobile phone number is changed to the host or shut down, due to technical barriers and related privacy protection regulations, network operators are not notified, which causes users to fail to update their personal information in Internet services in a timely manner for various reasons, it is easy to cause potential risks due to information asymmetry.

How can I save my mobile phone number?

Mobile phone numbers, which are more and more personal identities in the mobile Internet era, do not receive sufficient security attention and protection like our ID card numbers.

 

In the face of this new phenomenon, is there a better solution to protect the privacy and security of mobile phone numbers?

Due to the limited number segment Resources of Mobile Service Operators, it is a common practice to recycle mobile phone numbers to enter the market again. (Animation) At present, various operators have clear time requirements for mobile phone numbers from arrearage, revocation to re-sale. Generally, there will be a "retention period" for a period of time, that is, the number still belongs to the user, but the relevant communication service has been stopped. If the account is still in arrears, the number will enter the "Frozen period" from the "retention period", that is, the number belongs to the operator, but it will not be immediately put into the market for sales. This design also helps to cut off the relationship between the number and the original user. However, experts said that such protection measures need to be further improved based on the numerous situations that have emerged.

Experts said that mobile Internet allows more Internet services and communication services to be connected together, so that users can immediately learn the scope of their mobile phone numbers used in the Internet and promptly unbind unnecessary services, this requires the attention of mobile phone users and Internet service providers.

How to verify if your phone number is affected, verification address: http://www.ichunqiu.com/zzg

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.