Beware of "hacking" when shopping and paying online
Beware of "hacking" when shopping and paying online The technology that maintains the security of online shopping and payment is facing increasingly severe challenges from hackers, criminal gangs and intelligence agencies, threatening...
Beware of "hacking" when shopping and paying online. The technology that maintains the security of online shopping and payment is facing increasingly severe challenges from hackers, criminal gangs and intelligence agencies, threatening the global e-commerce market totaling 680 billion yuan each year. Security experts say that the lock symbol on Internet browsers is a symbol of Secure Sockets Layer (SSL), which is a secure network connection. But consumers may soon lose trust in SSL, which means they may no longer have confidence in shopping and paying bills online. SSL is the backbone of e-commerce, ensuring the security of users' login information and passwords, credit card and bank account information when they shop online and pay bills. SSL relies on a special electronic license issued to a secure website, but each web browser verifies the validity of the special electronic license in a different way. Cisco security expert Mary. "It's almost impossible for an average user to verify that the server's license is actually valid and that the URL is valid," Landesman said. Thousands of companies around the world issue SSL licenses, and earlier this year, an Iranian-backed hacker broke into the computer systems of at least two security companies. After hackers took control of the company's computer system, they issued false permissions to dozens of websites, including Google, Yahoo, AOL, Facebook, Skype and other companies, as well as intelligence agencies such as the Central Intelligence Agency (CIA), the British intelligence agency M16, and the Israeli intelligence agency Mossad. The hack, which came to light last month, resulted in the fake license being revoked. But before being discovered, the fake Internet security license may have been used to imitate the real website, making the computer system appear to be safe, allowing hackers to steal the communication data and login information and passwords of the compromised computer system.
Sources and usage
This piece is republished or synchronized with permission and keeps a link back to the original source.