[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û €}'Q@]}K1HG/s0pFroG]
¶ÌÐÅÕ©Æ smishing[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û $%\iT6B?;kfb4IFroG]
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û B Bd@[k.+wW]~=vd\jFroG]
In computing, Smishing is a form of criminal activity using social engineering techniques similar to phishing. The name is derived from "SMs phISHING".
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û 5lnD
jek3JB=7AFroG]
ÔÚ¼ÆËã»úÁìÓò£¬smishing£¨¶ÌÐÅÕ©Æ£©ÊÇÖ¸ÓÃÀàËÆÓÚÍøÂçµöÓãµÄÉç»á¹¤³Ìѧ¼¼Êõʵʩ·¸×ïÐÐΪµÄÒ»ÖÖÐÎʽ£¬Õâ¸öÃû×ÖÀ´Ô´ÓÚSMs phishing£¨¶ÌÐÅÏ¢·þÎñÕ©Æ£©¡£
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û L*"]; :XuB%|PG#FroG]
Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become more common to see a phone number that connects to automated voice response system, similar to the voice response systems used by many financial institutions, which will ask for your ATM card PIN, email address, and other personal information.
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û p |!XSx_\*e]6FroG]
ÓëÍøÂçµöÓ㷽ʽÀàËÆ£¬¶ÌÐÅÕ©ÆÍ¨¹ýÊÖ»úÎÄ×ÖÐÅÏ¢·Å¡°¶ü¡±ÒÔÓÕʹÄãй¶¸öÈËÐÅÏ¢¡£Õ©ÆÐÅÏ¢Öеġ°¹³¡±£¨Ò²¾ÍÊÇÓÃÀ´Òý³ö¸öÈËÐÅÏ¢µÄ·½·¨£©¿ÉÄÜÊÇÒ»¸öÍøÕ¾µÄÁ´½ÓµØÖ·£¬²»¹ý¸ü³£¼ûµÄÊÇÔÚÐÅÏ¢ÖзÅÈëÒ»¸öÁ¬½Óµ½×Ô¶¯ÓïÒôÓ¦´ðϵͳµÄµç»°ºÅÂ룬Õâ¸öÓ¦´ðϵͳÓëºÜ¶à½ðÈÚ»ú¹¹µÄºÜÏñ£¬»áѯÎÊÄãµÄATM¿¨ÃÜÂë¡¢µç×ÓÓʼþµØÖ·ÒÔ¼°ÆäËû¸öÈËÐÅÏ¢¡£
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û DDZk\-~9UNh`s~FroG]
This is an example of a (complete) smishing message in current circulation: "Notice - this is an automated message from (a local credit union), your ATM card has been suspended. To reactivate call urgent at 866-###-####."
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û izht$h83~
f5;(^ZFFroG]
Ŀǰ¹ã·º´«²¥µÄÒ»¸öթƶÌÐÅÊÇÕâÑùµÄ£º¡°×¢Ò⡪¡ªÕâÊÇÀ´×ÔÓÚ£¨Ä³µ±µØÐÅÓÿ¨»ú¹¹£©µÄÒ»Ìõ×Ô¶¯ÐÅÏ¢£¬ÄãµÄATM¿¨Òѱ»ÔÝͣʹÓá£ÖØÐ¼¤»î£¬Ç벦´ò½ô¼±ºÅÂë866-###-####¡£¡±
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û ?k]#"lUv"Z99FroG]
[ÎÄÕ°æÈ¨ ½ûÖ¹×ªÔØ:¿¼ÊÔÓëÆÀ¼Û j) IH?~Al$
p!W&IFroG]