{"id":60899,"date":"2019-07-30T09:00:05","date_gmt":"2019-07-30T01:00:05","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=60899"},"modified":"2019-07-16T14:16:30","modified_gmt":"2019-07-16T06:16:30","slug":"%e9%a7%ad%e5%ae%a2%e6%ad%a3%e5%9c%a8%e8%a6%ac%e8%a6%a6%e6%82%a8%e7%9a%84%e5%80%8b%e4%ba%ba%e8%b3%87%e6%96%99%ef%bc%8c%e6%82%a8%e8%a9%b2%e5%a6%82%e4%bd%95%e9%a0%90%e9%98%b2","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=60899","title":{"rendered":"\u99ed\u5ba2\u6b63\u5728\u89ac\u89a6\u60a8\u7684\u500b\u4eba\u8cc7\u6599\uff0c\u60a8\u8a72\u5982\u4f55\u9810\u9632?"},"content":{"rendered":"\n<p>\u4eba\u5011\u7684\u751f\u6d3b\u8d8a\u4f86\u8d8a\u6578\u4f4d\u5316\uff0c\u5f9e\u8cfc\u7269\u3001\u793e\u4ea4\u3001\u901a\u8a0a\u3001\u5230\u96fb\u8996\u6b23\u8cde\u548c\u73a9\u904a\u6232\uff0c\u73fe\u5728\u90fd\u80fd\u8212\u8212\u670d\u670d\u5730\u900f\u904e\u684c\u4e0a\u578b\u96fb\u8166\u3001\u7b46\u8a18\u578b\u96fb\u8166\u6216\u884c\u52d5\u88dd\u7f6e\u4f86\u5b8c\u6210\u3002\u4e0d\u904e\uff0c\u8981\u4eab\u53d7\u9019\u6a23\u7684\u4fbf\u5229\uff0c\u6211\u5011\u5fc5\u9808\u63d0\u4f9b\u4e00\u4e9b\u500b\u4eba\u8cc7\u6599\u4f86\u7372\u5f97\u670d\u52d9\u3002\u4e0d\u8ad6\u662f\u63d0\u4f9b\u7c21\u55ae\u7684\u59d3\u540d\u548c\u96fb\u5b50\u90f5\u4ef6\u5730\u5740\uff0c\u6216\u8005\u9032\u4e00\u6b65\u63d0\u4f9b\u66f4\u654f\u611f\u7684\u8cc7\u8a0a\uff0c\u5982\uff1a\u8eab\u5206\u8b49\u5b57\u865f\u548c\u4fe1\u7528\u5361\u5361\u865f\uff0c\u9019\u4e9b\u6240\u8b02\u7684\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a\n(PII) \u4e00\u65e6\u63d0\u4f9b\u7d66\u4ed6\u4eba\uff0c\u90fd\u6709\u53ef\u80fd\u8b93\u6211\u5011\u66b4\u9732\u5728\u5371\u96aa\u7576\u4e2d\u3002\u70ba\u4ec0\u9ebc\uff1f\u56e0\u70ba\u99ed\u5ba2\u96a8\u6642\u90fd\u5728\u89ac\u89a6\u9019\u4e9b\u8cc7\u6599\uff0c\u96a8\u6642\u90fd\u5728\u60f3\u8fa6\u6cd5\u7aca\u53d6\u9019\u4e9b\u8cc7\u6599\u4f86\u8b93\u4ed6\u5011\u7372\u5229\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"526\" height=\"526\" src=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/DLP1.jpg\" alt=\"\" class=\"wp-image-11370\" srcset=\"https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/DLP1.jpg 526w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/DLP1-150x150.jpg 150w, https:\/\/blog.trendmicro.com.tw\/wp-content\/uploads\/2015\/02\/DLP1-300x300.jpg 300w\" sizes=\"(max-width: 526px) 100vw, 526px\" \/><\/figure>\n\n\n\n<p>\u5f9e<a href=\"https:\/\/www.ic3.gov\/media\/annualreport\/2018_IC3Report.pdf\">\u7f8e\u570b\u806f\u90a6\u8abf\u67e5\u5c40 (FBI) \u7db2\u969b\u7db2\u8def\u72af\u7f6a\u7533\u8a34\u4e2d\u5fc3 (Internet Crime Complaint Center\uff0c\u7c21\u7a31\nIC3) \u7684\u6700\u65b0\u5831\u544a<\/a>\u5373\u53ef\u770b\u51fa\u9019\u985e\u7db2\u8def\u5a01\u8105\u7684\u7576\u524d\u898f\u6a21\u30022018 \u5e74\uff0c\u500b\u4eba\u8cc7\u6599\u5916\u6d29\u5728\u7db2\u8def\u72af\u7f6a\u6848\u4f8b\u7576\u4e2d\u540d\u5217\u524d\u8305\uff0c\u53d7\u5bb3\u8005\u9ad8\u9054 50,642 \u4eba\uff0c\u76f8\u95dc\u640d\u5931\u8d85\u904e\n1.488 \u5104\u7f8e\u5143\u3002\u800c\u9019\u5f88\u53ef\u80fd\u53ea\u662f\u51b0\u5c71\u4e00\u89d2\uff0c\u56e0\u70ba\u9084\u6709\u66f4\u591a\u53d7\u5bb3\u8005\u4e26\u672a\u5831\u6848\u3002\u53bb\u5e74\uff0c\u8cc7\u6599\u5916\u6d29\u6240\u5c0e\u81f4\u7684\u8eab\u5206\u5192\u7528\u8b93\u53d7\u5bb3\u8005\u8499\u53d7 1 \u5104\u7f8e\u5143\u4ee5\u4e0a\u7684\u640d\u5931\u3002\u6b64\u5916\uff0c\u5c08\u9580\u8a98\u9a19\u4f7f\u7528\u8005\u63d0\u4f9b\u500b\u4eba\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a\u8207\u5e33\u865f\u5bc6\u78bc\u7684<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=136\">\u7db2\u8def\u91e3\u9b5a(Phishing)<\/a>\u653b\u64ca\uff0c\u5176\u9020\u6210\u7684\u640d\u5931\u4e5f\u8d85\u904e\n4,800 \u842c\u7f8e\u5143\u3002<\/p>\n\n\n\n<p>\u9019\u50b3\u9054\u4e86\u4e00\u500b\u76f8\u7576\u660e\u78ba\u7684\u8a0a\u606f\uff1a\u6d88\u8cbb\u8005\u8feb\u5207\u9700\u8981\u63a1\u53d6\u4e00\u4e9b\u4f5c\u70ba\u4f86\u9632\u7bc4\u9019\u4e9b\u7db2\u8def\u7aca\u8cca\uff0c\u4ee5\u4fdd\u8b77\u81ea\u5df1\u6700\u654f\u611f\u7684\u8eab\u5206\u8cc7\u6599\u8207\u91d1\u878d\u8cc7\u8a0a\u3002\u800c\u9019\u4e5f\u662f\u8da8\u52e2\u79d1\u6280\u70ba\u4f55\u64b0\u5beb\u9019\u7bc7\u6587\u7ae0\u7684\u539f\u56e0\uff1a\u5e0c\u671b\u80fd\u5354\u52a9\u60a8\u638c\u63e1\u81ea\u5df1\u7684\u654f\u611f\u8cc7\u6599\uff0c\u4e86\u89e3\u99ed\u5ba2\u7684\u7aca\u53d6\u624b\u6cd5\uff0c\u4ee5\u53ca\u60a8\u8a72\u5982\u4f55\u9632\u7bc4\u3002<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u54ea\u4e9b\u8cc7\u6599\u53ef\u80fd\u9762\u81e8\u98a8\u96aa\uff1f<br> <\/strong><\/h2>\n\n\n\n<p>\u8ffd\u6839\u7a76\u67e2\uff0c\u99ed\u5ba2\u7684\u6700\u7d42\u76ee\u7684\u5c31\u662f\u70ba\u4e86\u8cfa\u9322\u3002\u96d6\u7136\u4ed6\u5011\u4e5f\u53ef\u80fd\u5229\u7528\u7db2\u8def\u52d2\u7d22\u6216<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=12412\">\u52d2\u7d22\u75c5\u6bd2 Ransomware<\/a> (\u52d2\u7d22\u8edf\u9ad4\/\u7d81\u67b6\u75c5\u6bd2)\u4f86\u9054\u6210\u76ee\u7684\uff0c\u4f46\u6700\u666e\u904d\u7684\u4f5c\u6cd5\u9084\u662f\u7aca\u53d6\u8cc7\u6599\u4f86\u8cfa\u9322\u3002\u99ed\u5ba2\u4e00\u65e6\u5077\u5230\u60a8\u7684\u8eab\u5206\u8b58\u5225\u8cc7\u6599\u8207\u91d1\u878d\u8cc7\u8a0a\uff0c\u5c31\u6703\u5c07\u9019\u4e9b\u8cc7\u6599\u62ff\u5230<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=17092\">\u9ed1\u6697\u7db2\u8def<\/a>\u8ce3\u7d66\u72af\u7f6a\u96c6\u5718\u4f86\u5f9e\u4e8b\u5404\u7a2e\u8a50\u9a19\u3002\u72af\u7f6a\u96c6\u5718\u53ef\u80fd\u5229\u7528\u8cb7\u4f86\u7684\u7db2\u8def\u9280\u884c\u767b\u5165\u8cc7\u8a0a\u9032\u5165\u60a8\u7684\u5e33\u6236\u3001\u638f\u7a7a\u60a8\u7684\u5b58\u6b3e\u3002\u6216\u8005\uff0c\u4e5f\u53ef\u80fd\u5192\u7528\u60a8\u7684\u8eab\u5206\u4f86\u7533\u8fa6\u4fe1\u7528\u5361\uff0c\u8b93\u60a8\u6b20\u4e0b\u9245\u984d\u8ca0\u50b5\u3002<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>\u5728\u7f8e\u570b\uff0c\u8eab\u5206\u5192\u7528\u662f\u6d88\u8cbb\u8005\u65e5\u76ca\u9762\u81e8\u7684\u4e00\u9805\u56b4\u91cd\u5a01\u8105\u3002\u5149 2018 \u5e74\u5c31\u6709 <a href=\"https:\/\/www.globenewswire.com\/news-release\/2019\/03\/06\/1748662\/0\/en\/Consumers-Increasingly-Shoulder-Burden-of-Sophisticated-Fraud-Schemes-According-to-2019-Javelin-Strategy-Research-Study.html\">1,440 \u4eba<\/a>\u53d7\u5bb3\uff0c\u9020\u6210 17 \u5104\u7f8e\u5143\u7684\u640d\u5931\uff0c\u6b64\u91d1\u984d\u662f 2016 \u5e74\u7684\u5169\u500d\u4ee5\u4e0a\u3002<\/p>\n\n\n\n<p>\u6b63\u5982\u6211\u5011\u524d\u9762\u6240\u63d0\uff0c\u99ed\u5ba2\u6703\u76e1\u53ef\u80fd\u8490\u96c6\u66f4\u591a\u500b\u4eba\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a\u3002\u4ed6\u5011\u8490\u96c6\u5230\u7684\u8cc7\u6599\u8d8a\u591a\uff0c\u5c31\u8d8a\u80fd\u62fc\u6e4a\u51fa\u60a8\u7684\u5b8c\u6574\u8eab\u5206\uff0c\u8f15\u9b06\u9a19\u904e\u60a8\u6240\u5f80\u4f86\u7684\u6a5f\u69cb\uff0c\u9019\u4e9b\u8cc7\u6599\u5305\u62ec\uff1a\u59d3\u540d\u3001\u5730\u5740\u3001\u51fa\u751f\u5e74\u6708\u65e5\uff0c\u4ee5\u53ca\u4e00\u4e9b\u66f4\u91cd\u8981\u7684\u8cc7\u8a0a\uff0c\u5982\uff1a\u8eab\u5206\u8b49\u5b57\u865f\u3001\u9280\u884c\u5e33\u6236\u7d30\u7bc0\u3001\u4fe1\u7528\u5361\u8cc7\u6599\u3001\u91ab\u7642\u4fdd\u96aa\u7b49\u7b49\u3002<\/p>\n\n\n\n<p>\u7db2\u8def\u5e33\u865f\u5927\u591a\u6703\u8a18\u8f09\u9019\u4e9b\u8cc7\u8a0a\uff0c\u7576\u7136\uff0c\u5ee0\u5546\u6703\u4f7f\u7528\u5bc6\u78bc\u4f86\u52a0\u4ee5\u4fdd\u8b77\uff0c\u6240\u4ee5\u99ed\u5ba2\u624d\u6703\u8cbb\u76e1\u5fc3\u601d\u60f3\u8981\u731c\u6e2c\u6216\u7aca\u53d6\u60a8\u7684\u5e33\u865f\u767b\u5165\u8cc7\u8a0a\u3002\u5373\u4f7f\u662f\u4e00\u4e9b\u60a8\u8a8d\u70ba\u99ed\u5ba2\u4e0d\u6703\u6709\u8208\u8da3\u7684\u5e33\u865f\uff0c\u4e5f\u53ef\u80fd\u70ba\u99ed\u5ba2\u5e36\u4f86\u8ca1\u5bcc\u3002\u4f8b\u5982\uff0c\u60a8\u7684\nUber \u5e33\u865f\u767b\u5165\u8cc7\u6599\u5c31\u53ef\u80fd\u88ab\u99ed\u5ba2\u7aca\u53d6\u4e4b\u5f8c\u62ff\u5230\u7db2\u8def\u4e0a\u8ca9\u8ce3\uff0c\u800c\u8cb7\u5230\u60a8\u5e33\u865f\u7684\u4eba\u5c31\u80fd\u514d\u8cbb\u642d\u8eca\u3002\u9084\u6709\uff0c\u5982\u679c\u60a8\u7684 Netflix \u5e33\u865f\u767b\u5165\u8cc7\u6599\u88ab\u5077\u5230\u7db2\u8def\u4e0a\u8ca9\u8ce3\uff0c\u8cb7\u5230\u60a8\u5e33\u865f\u7684\u4eba\u5c31\u80fd\u514d\u8cbb\u4f7f\u7528\u9019\u9805\u5f71\u7247\u4e32\u6d41\u670d\u52d9\u3002<\/p>\n\n\n\n<p>\u73fe\u5728\uff0c\u99ed\u5ba2\u751a\u81f3\u6703\u76f4\u63a5\u99ed\u5165\u5404\u5927\u6a5f\u69cb\u7684\u7db2\u8def\uff0c\u76f4\u63a5\u7aca\u53d6\u60a8\u7684\u500b\u4eba\u8cc7\u6599\u3002\u904e\u53bb\u5c31\u66fe\u767c\u751f\u904e\u591a\u8d77\u8d85\u5927\u578b\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\uff0c\u5982\uff1a<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=53473\">Uber (\u5f71\u97ff\u5168\u7403 5,700 \u842c\u7528\u6236)<\/a> \u548c <a href=\"https:\/\/blog.trendmicro.com.tw\/?p=52742\">Yahoo (\u5f71\u97ff\u5168\u7403 30 \u5104\u7528\u6236)<\/a>\u3002\u9664\u4e86\u5927\u578b\u6a5f\u69cb\u4e4b\u5916\uff0c\u99ed\u5ba2\u4e5f\u53ef\u80fd\u91dd\u5c0d\u60a8\u500b\u4eba\u4f86\u767c\u52d5\u653b\u64ca\u3002\u6709\u6642\uff0c\u99ed\u5ba2\u6703\u5229\u7528\u4ed6\u5011\u624b\u4e0a\u5df2\u7d93\u638c\u63e1\u7684\u8cc7\u6599\u4f86\u88fd\u9020\u4e00\u4e9b\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\uff0c\u8a98\u9a19\u60a8\u63d0\u4f9b\u66f4\u591a\u8cc7\u6599\uff0c\u4f8b\u5982<a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/news-center\/article\/Beware-Tax-Scams-and-Sextortion-Blackmail-Attempts-as-Email-Scams-Worsen.html\">\u5831\u7a05\u8a50\u9a19\u8207\u6027\u611b\u52d2\u7d22<\/a>\u3002\u751a\u81f3\uff0c\u7576\u99ed\u5ba2\u5df2\u7d93\u638c\u63e1\u60a8\u67d0\u500b\u5e33\u865f\u7684\u5bc6\u78bc\u6642\uff0c\u4ed6\u5011\u6703\u8a66\u5716\u767b\u5165\u60a8\u5728\u5176\u4ed6\u7db2\u7ad9\u7684\u5e33\u865f\uff0c\u770b\u770b\u60a8\u6703\u4e0d\u6703\u5728\u5176\u4ed6\u7db2\u7ad9\u4e0a\u4f7f\u7528\u76f8\u540c\u7684\u5e33\u865f\u5bc6\u78bc\u3002<\/p>\n\n\n\n<p>\u96d6\u7136\uff0c\u9280\u884c\u6700\u5f8c\u5f88\u53ef\u80fd\u6703\u8ce0\u511f\u60a8\u56e0\u8eab\u5206\u906d\u5192\u7528\u6240\u8499\u53d7\u7684\u640d\u5931\uff0c\u4f46\u9664\u6b64\u4e4b\u5916\uff0c\u60a8\u9084\u53ef\u80fd\u9762\u81e8\u5176\u4ed6\u56b4\u91cd\u5f8c\u679c\uff0c\u56e0\u70ba\u7db2\u8def\u8cc7\u6599\u7aca\u76dc\u53ca\u5f8c\u7e8c\u7684\u8a50\u9a19\u5f88\u53ef\u80fd\u6703\u8b93\u60a8\uff1a<\/p>\n\n\n\n<ul><li>\u5fc5\u9808\u81ea\u884c\u627f\u64d4\u91cd\u65b0\u8fa6\u7406\u8eab\u5206\u7684\u82b1\u8cbb\u3002<\/li><li>\u627f\u53d7\u5fc3\u7406\u58d3\u529b\uff1a<a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/the-hidden-costs-of-identity-theft\/\">75% \u7684\u53d7\u5bb3\u8005\u8868\u793a<\/a>\u60a3\u6709\u56b4\u91cd\u7684\u6182\u9b31\u3002<\/li><li>\u4fe1\u7528\u8a55\u7b49\u4e0b\u964d\u3002<\/li><li>\u82b1\u8cbb\u8a31\u591a\u6642\u9593\u548c\u7cbe\u529b\u4f86\u89e3\u6c7a\u76dc\u5237\u722d\u8b70\u6216\u722d\u53d6\u8ce0\u511f\uff1a<a href=\"https:\/\/www.identityforce.com\/blog\/how-much-time-does-identity-theft-recovery-take\">\u6839\u64da\u4f30\u8a08<\/a>\uff0c\u53d7\u5bb3\u8005\u5728\u906d\u53d7\u653b\u64ca\u4e4b\u5f8c\u5e73\u5747\u9700\u8981\u7d04\u516d\u500b\u6708\u7684\u6642\u9593\u8207 200 \u7684\u5de5\u4f5c\u6642\u6578\u4f86\u91cd\u8fa6\u81ea\u5df1\u7684\u8eab\u5206\u3002<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u99ed\u5ba2\u5982\u4f55\u7aca\u53d6\u8cc7\u6599\uff1f<\/strong><\/h2>\n\n\n\n<p>\u99ed\u5ba2\u6709\u8a31\u591a\u6280\u5de7\u53ef\u4ee5\u7aca\u53d6\u60a8\u7684\u8cc7\u6599\u548c\u91d1\u9322\uff0c\u800c\u4e14\u4ed6\u5011\u9084\u6709\u9f90\u5927\u7684\u5730\u4e0b\u7d93\u6fdf\u9ad4\u7cfb\u5728\u80cc\u5f8c\u652f\u6301\u3002\u6b64\u5916\uff0c\u9084\u6709\u9ed1\u6697\u7db2\u8def\u4e0a\u7684\u5404\u7a2e\u7db2\u7ad9\u5728\u52a9\u7d02\u70ba\u8650\u3002\u9019\u4e9b\u7db2\u7ad9\u4e0d\u50c5\u63d0\u4f9b\u4e86\u73fe\u6210\u7684\u5e73\u53f0\u65b9\u4fbf\u4ed6\u5011\u5c07\u5077\u4f86\u7684\u8cc7\u6599\u8ce3\u7d66\u72af\u7f6a\u96c6\u5718\uff0c\u66f4\u4e5f\u63d0\u4f9b\u4e86\u5404\u5f0f\u5404\u6a23\u7684\u99ed\u5ba2\u5de5\u5177\u3001\u8aee\u8a62\u5efa\u8b70\u548c\u7db2\u8def\u72af\u7f6a\u670d\u52d9\u3002\u5730\u4e0b\u7d93\u6fdf\u7684<a href=\"https:\/\/www.bromium.com\/resource\/into-the-web-of-profit\/\">\u7522\u503c<\/a>\u6bcf\u5e74\u53ef\u80fd\u9ad8\u9054 1.5 \u5146\u7f8e\u5143\u3002<\/p>\n\n\n\n<p>\u99ed\u5ba2\u53ef\u4ee5\uff1a<\/p>\n\n\n\n<ul><li>\u5229\u7528<strong>\u7db2\u8def\u91e3\u9b5a\u8a50\u9a19<\/strong>\u4f86\u653b\u64ca\u60a8\uff1a\u4f7f\u7528\u5047\u5192\u4f86\u81ea\u67d0\u6a5f\u69cb (\u5982\u570b\u7a05\u5c40\u3001\u9280\u884c\u3001\u4fdd\u96aa\u516c\u53f8\u3001\u7db2\u969b\u7db2\u8def\u670d\u52d9\u4f9b\u61c9\u5546\u7b49\u7b49) \u7684\u96fb\u5b50\u90f5\u4ef6\u3002<\/li><li>\u767c\u52d5<strong>\u81ea\u52d5\u5316\u653b\u64ca<\/strong>\uff1a\u4f7f\u7528\u60a8\u5728\u5176\u4ed6\u7db2\u7ad9\u4e0a\u7684\u767b\u5165\u8cc7\u8a0a\u4f86\u8a66\u5716\u767b\u5165\u5176\u4ed6\u7db2\u7ad9\uff1b\u6216\u8005\u4f7f\u7528\u4e00\u4e9b\u5de5\u5177\u4f86\u4e0d\u65b7\u5617\u8a66\u5404\u7a2e\u5e38\u898b\u7684\u5bc6\u78bc\u7d44\u5408\uff0c\u5982\u300cpassw0rd\u300d\u3002<\/li><li><strong>\u7d93\u7531\u6f0f\u6d1e\u4f86\u653b\u64ca\u60a8\u9020\u8a2a\u7684\u7db2\u7ad9<\/strong>\uff1a\u8a66\u5716\u99ed\u5165\u60a8\u7684\u5e33\u865f\u3002<\/li><li><strong>\u5c07\u60e1\u610f\u7a0b\u5f0f\u6697\u85cf\u5728\u770b\u4f3c\u6b63\u5e38\u7684\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u7576\u4e2d<\/strong>\uff1a\u7b49\u5019\u4e0d\u77e5\u60c5\u7684\u53d7\u5bb3\u8005\u5c07\u5b83\u4e0b\u8f09\u3002<\/li><li><strong>\u5f9e\u516c\u958b\u7684<\/strong><strong> Wi-Fi <\/strong><strong>\u7121\u7dda\u7db2\u8def\u8a0a\u865f\u7576\u4e2d\u6514\u622a\u60a8\u7684\u79c1\u5bc6\u8cc7\u6599<\/strong>\uff1a\u4f8b\u5982\u7576\u60a8\u7d93\u7531\u516c\u958b\u7684 Wi-Fi \u71b1\u9ede\u767b\u5165\u7db2\u8def\u9280\u884c\u6642\uff0c\u99ed\u5ba2\u5c31\u80fd\u770b\u5230\u60a8\u7684\u4e00\u8209\u4e00\u52d5\u3002<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u6211\u8a72\u5982\u4f55\u9810\u9632\uff1f<\/strong><\/h2>\n\n\n\n<p>\u6240\u5e78\uff0c\u60a8\u6709\u8a31\u591a\u7c21\u55ae\u7684\u6b65\u9a5f\u53ef\u4ee5\u78ba\u4fdd\u8cc7\u6599\u5b89\u5168\u7121\u865e\uff0c\u800c\u4e14\u7d55\u5927\u591a\u6578\u90fd\u4e0d\u7528\u82b1\u9322\uff0c\u4f8b\u5982\uff1a<\/p>\n\n\n\n<ul><li>\u91dd\u5c0d\u6bcf\u4e00\u500b\u7db2\u7ad9\u548c\u61c9\u7528\u7a0b\u5f0f\u90fd\u4f7f\u7528\u8f03\u9577\u3001\u8f03\u96e3\u731c\u6e2c\u3001\u4e14\u975e\u91cd\u8907\u7684\u5bc6\u78bc\u3002\u60a8\u53ef\u501f\u52a9\u4e00\u5957\u7db2\u8def\u5bc6\u78bc\u7ba1\u7406\u54e1\u8edf\u9ad4\u4f86\u5354\u52a9\u60a8\u5132\u5b58\u9019\u4e9b\u5bc6\u78bc\uff0c\u5728\u60a8\u9700\u8981\u767b\u5165\u6642\u96a8\u6642\u53d6\u7528\u3002<\/li><li>\u6bcf\u7576\u5ee0\u5546\u901a\u77e5\u60a8\u7684\u5e33\u865f\u53ef\u80fd\u906d\u5230\u5916\u6d29\u6642\uff0c\u8acb\u7acb\u5373\u8b8a\u66f4\u5bc6\u78bc\u3002<\/li><li>\u53ef\u4ee5\u7684\u8a71\uff0c\u76e1\u91cf\u4f7f\u7528<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=53238\">\u96d9\u56e0\u5b50\u8eab\u4efd\u8a8d\u8b49\uff082FA\uff09<\/a>\u6216\u591a\u91cd\u8a8d\u8b49 (2FA\/MFA) \u4f86\u63d0\u5347\u60a8\u7684\u767b\u5165\u5b89\u5168\u3002<\/li><li>\u7576\u60a8\u8981\u8f38\u5165\u500b\u4eba\u8eab\u5206\u8b58\u5225\u8cc7\u8a0a\u6642\uff0c\u8acb\u52d9\u5fc5\u78ba\u5b9a\u7db2\u5740\u5217\u986f\u793a\u7684\u7db2\u5740\u662f\u5426\u4ee5\u300cHTTPS\u300d\u70ba\u958b\u982d\u3002<\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>    *\u5c0f\u63d0\u9192: FBI\u5728\u4eca\u5e74\u516d\u6708\u63d0\u51fa\u8b66\u544a\uff1a\u4e0d\u8981\u4ee5\u70baHTTPS\u7db2\u7ad9\u5f88\u5b89\u5168\uff0c\u6709\u4e9b\u6697\u85cf\u7db2\u91e3\u653b\u64ca,\u99ed\u5ba2\u70ba\u4e86\u907f\u514d Chrome      \u5c0d\u91e3\u9b5a\u7db2\u7ad9\u63d0\u51fa\u4e0d\u5b89\u5168\u7db2\u7ad9\u7684\u8b66\u544a,2018\u5e74\u5927\u7d04\u670949%\u7684\u91e3\u9b5a\u7db2\u7ad9\u6703\u4f7f\u7528      https \u9032\u884c\u52a0\u5bc6,\u7db2\u5740\u5217\u7684\u639b\u9396\u5716\u793a\u4ee3\u8868\u8457\u9019\u7db2\u9801\u50b3\u8f38\u7684\u8cc7\u6599\u7372\u52a0\u5bc6\u4fdd\u8b77\uff0c\u4e26\u975e100%\u8b49\u660e\u9019\u7db2\u7ad9\u662f\u5b89\u5168\u7684\u3002 <\/p><\/blockquote>\n\n\n\n<ul><li>\u91dd\u5c0d\u4e0d\u8acb\u81ea\u4f86\u7684\u96fb\u5b50\u90f5\u4ef6\u6216\u8a0a\u606f\uff0c\u5207\u52ff\u9ede\u9078\u5176\u4e2d\u7684\u9023\u7d50\u6216\u958b\u555f\u9644\u4ef6\u6a94\u6848\u3002\u5982\u679c\u6709\u7591\u554f,\u5373\u4f7f\u6536\u5230\u4e86\u770b\u4f3c\u719f\u4fc2\u806f\u7d61\u4eba\u7684\u90f5\u4ef6\uff0c\u61c9\u8a72\u76f4\u63a5\u6253\u96fb\u8a71\u6216\u5bc4\u90f5\u4ef6\u4e88\u8a72\u540d\u806f\u7d61\u4eba\uff0c\u800c\u975e\u76f4\u63a5\u56de\u4fe1\u3002<\/li><li>\u5c0f\u5fc3\u907f\u514d\u5728\u793e\u7fa4\u5a92\u9ad4\u4e0a\u5206\u4eab\u904e\u591a\u7684\u500b\u4eba\u8cc7\u6599\u6216\u91d1\u878d\u8cc7\u8a0a\u3002<\/li><li>\u50c5\u5f9e\u5b98\u65b9\u61c9\u7528\u7a0b\u5f0f\u5546\u5e97\u4e0b\u8f09\u61c9\u7528\u7a0b\u5f0f\uff0c\u5982 Apple App Store \u6216 Google Play\u3002<\/li><li>\u7576\u60a8\u9023\u4e0a\u516c\u5171\u7684 Wi-Fi \u7db2\u8def\u6642\uff0c\u5207\u52ff\u767b\u5165\u4efb\u4f55\u654f\u611f\u7684\u5e33\u865f (\u5982\u9280\u884c\u3001\u96fb\u5b50\u90f5\u4ef6\u4fe1\u7bb1)\uff0c\u9664\u975e\u60a8\u7d93\u7531 VPN \u9023\u7dda\u3002<\/li><li>\u5728 PC \u548c\u884c\u52d5\u88dd\u7f6e\u4e0a\u5b89\u88dd\u4e00\u5957\u60a8\u4fe1\u8cf4\u5ee0\u5546\u7684<a href=\"https:\/\/t.rend.tw\/?i=Njc0MA\">\u9632\u6bd2\u8edf\u9ad4<\/a>\uff0c\u6b64\u8edf\u9ad4\u61c9\u5177\u5099\u7db2\u8def\u91e3\u9b5a\u8207\u5783\u573e\u90f5\u4ef6\u96d9\u91cd\u9632\u8b77\u3002<\/li><li>\u6240\u6709\u7684\u4f5c\u696d\u7cfb\u7d71\u8207\u61c9\u7528\u7a0b\u5f0f\u90fd\u61c9\u8a72\u96a8\u6642\u4fdd\u6301\u5728\u6700\u65b0\u7248\u672c\u4ee5\u76e1\u91cf\u6e1b\u5c11\u99ed\u5ba2\u53ef\u5229\u7528\u7684\u6f0f\u6d1e\u3002<\/li><li>\u96a8\u6642\u7559\u610f\u81ea\u5df1\u6240\u6709\u7684\u91d1\u878d\u4ea4\u6613\uff0c\u5982\u6b64\uff0c\u4e00\u65e6\u767c\u751f\u8eab\u5206\u906d\u5230\u5047\u5192\u7684\u60c5\u6cc1\u624d\u80fd\u8fc5\u901f\u5bdf\u89ba\u3002<\/li><li>\u7576\u767c\u751f\u8207\u60a8\u7684\u4fe1\u7528\u76f8\u95dc\u7684\u8cc7\u6599\u5916\u6d29\u4e8b\u4ef6\u6642 (\u5982 Equifax \u4e8b\u4ef6)\uff0c\u8acb\u7acb\u5373\u900f\u904e Equifax\u3001TransUnion\u3001Experian \u53ca Innovis \u67e5\u8a62\u81ea\u5df1\u7684\u4fe1\u7528\u72c0\u6cc1\uff0c\u5fc5\u8981\u6642\u53ef\u7533\u8acb\u51cd\u7d50\u81ea\u5df1\u7684\u4fe1\u7528\u3002<\/li><\/ul>\n\n\n\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/hackers-are-after-your-personal-data-heres-how-to-stop-them\/\">Hackers Are After\nYour Personal Data \u2013 Here\u2019s How to Stop Them<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eba\u5011\u7684\u751f\u6d3b\u8d8a\u4f86\u8d8a\u6578\u4f4d\u5316\uff0c\u5f9e\u8cfc\u7269\u3001\u793e\u4ea4\u3001\u901a\u8a0a\u3001\u5230\u96fb\u8996\u6b23\u8cde\u548c\u73a9\u904a\u6232\uff0c\u73fe\u5728\u90fd\u80fd\u8212\u8212\u670d\u670d\u5730\u900f\u904e\u684c\u4e0a\u578b\u96fb\u8166\u3001\u7b46\u8a18\u578b\u96fb\u8166\u6216 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[129,8],"tags":[699,1283,107],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/60899"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60899"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/60899\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=60899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=60899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}