Xinhua News Agency, Tianjin, April 11 (Reporter Zhou Runjian) Since the end of last year, the "blockchain" has attracted many people’s attention following virtual coins such as Bitcoin. The criminals also took aim at this point and implemented fraud under the banner of "blockchain" and "virtual currency".
As the underlying technology of Bitcoin, "blockchain" is like a database account book, which records all transaction records. Because of its safety and convenience, it has attracted the attention of the financial industry and other industries. At the same time, with the soaring prices of blockchain assets such as Bitcoin, ordinary investors are increasingly interested in blockchain and digital currency investment. There have been many "blockchain" investment fraud cases this year.
Yang Qibo, a security expert of Tencent’s mobile phone housekeeper, said that "blockchain" fraud cases have occurred frequently recently, and criminals used the excuse of "short investment period, high income and low risk" to defraud users and induce them to transfer money for investment. At the same time, they also hide the website domain name and various contact information, so that the deceived can not verify the company’s qualifications, so they believe in fraud routines. Once the victim recharges the "trading website", the criminals will trick him into "recharging the private account" and even directly provide a fake recharge link, and take the opportunity to defraud the victim’s bank account password.
In the face of potential fraud crisis, how can the public avoid being deceived? Yang Qibo made three suggestions: First, we should invest cautiously, don’t believe the promise of "hype", and after receiving the call related to "blockchain", we must search and verify its company information online to prevent credulity of false investment scams; Second, don’t click on unknown links at will, and don’t transfer money to personal accounts easily; Third, you can use third-party mobile phone security software to intercept unknown and encrypted hidden incoming calls through harassment interception function to avoid being deceived.