Now, you need to scan the code when entering specific public places, but some elderly people cannot scan the code because their mobile phone version is too low. At this time, the family will recommend buying a new mobile phone to make travel more convenient. my country is a major

Now, when entering specific public places, you need to scan the code,

, but some elders cannot scan the code because their mobile phone version is too low.

At this time, the family will recommend buying a new phone,

makes travel more convenient.

my country is a major smartphone user country, and the number of mobile phones produced and eliminated every year is huge. With the rapid update of mobile phones, we always have one or two idle phones in our hands, and many people will choose to sell their old phones.

On the street, you can occasionally see someone riding a tricycle, and the small speaker is playing "Recycling old mobile phones and old computers".

At this time, Some people think that the eliminated used mobile phones are not of much use except putting them in the drawer to eat dust. They simply sell them to recycling stores and can also get a part of the converted money .

But we usually store bank card passwords, ID card information, Alipay information, etc. on our mobile phones. Once they are restored by criminals, they will be completely leaked, and there is a possibility that funds will be stolen at any time.

After recycling the old phone, the money in the

account "disappeared"

Recently, Mr. Ma, who lives in Zhongning County, came to the police station to report the case, saying that the money in the bank card bound to Alipay "disappeared". The police investigation found that all the money in the victim's account of was transferred to under the name of Li, the owner of the mobile phone recycling store.

According to Li's account, he runs a mobile phone store, but because of the inability to turn over the capital, he had bad intentions. Because Mr. Ma recently replaced an Apple phone in the store, the store embezzled the victim's trust and obtained the victim's ID card, bank card, and verification code information. By modifying the victim's Alipay payment password form , without the victim's knowledge, the money in the bank card bound to the victim's mobile phone will be transferred to his Alipay without the victim's knowledge.

● Mobile phone recycling has security risks

The deleted data on the mobile phone still has the possibility of being restored, which is one of the main reasons for the leakage of personal information due to the recycling of used mobile phones. Therefore, when recycling old mobile phones, information security is the primary consideration.

restores the phone to factory settings and cleans up all personal information. Then find a special agency to recycle mobile phones.

After all, online telecommunications fraud is emerging one after another. In addition to "Guess Who I am", many of them are fake identities of relatives and friends, and call for help to ask for borrowing money and transfer money to commit fraud .

suspects are increasingly relying on 's illegally obtaining citizens' personal information, and carry out targeted "precision fraud" , with a higher success rate and more difficult to identify.

● Don’t record contact information in too detailed

When storing mobile phone numbers, in order to remember "who is who, where, and what unit", everyone will habitually add this information to the contact’s name. Such as "son-in-law Li XX", "classmate Lu XX", etc.

Once the phone is lost, the mobile phone information is accidentally leaked, or stolen by criminals, will use your identity information to gain the trust of the victim .

Suppose one day, you receive a call from an acquaintance, and the caller ID is from the name in the address book of your mobile phone. Did you put aside your guard easily?

Therefore, when receiving a call from so-called family, leaders, or friends, once the other party asks to withdraw money, be careful. , especially in terms of funds, must personally verify with the parties involved.

has many ways to leak information in mobile phone address book. You can add some code names that are easy to remember as distinction, or record them in paper address book to avoid giving scammers an opportunity to take advantage of.

Mobile phones have become an indispensable tool for daily life

, but because of its powerful function,

is a little careless, and

is also more common for

to "injure" oneself.

When you want to replace a new phone, how should an old phone be handled more securely?

pictures are from the Internet

This article is responsible for editing: Silin

Special thanks