{"id":5187,"date":"2023-11-09T09:37:11","date_gmt":"2023-11-09T02:37:11","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=5187"},"modified":"2023-11-09T09:37:12","modified_gmt":"2023-11-09T02:37:12","slug":"lo-thong-tin-ca-nhan-cach-nhan-biet-som-nhat","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2023\/11\/lo-thong-tin-ca-nhan-cach-nhan-biet-som-nhat\/","title":{"rendered":"Revealing personal information - the earliest way to recognize it"},"content":{"rendered":"<p>When personal information is leaked, bad guys can use that information to steal money, forge identity cards to commit bad acts or many other tricks that affect people&#039;s lives. In part 2 of the series &quot;Recognizing Fraud&quot;, Hieu PC and Anti-Fraud will guide everyone to recognize the risks when personal information is leaked and how to handle it.<\/p>\n\n\n\n<p>In any situation involving sharing information such as ID cards, ATM cards, etc., ask yourself the following 3 questions to limit the disclosure of personal information:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I. What are the risks of providing personal information to strangers?<\/h2>\n\n\n\n<p>You will encounter the following 5 problems that lead to the disclosure of personal information when sharing with strangers:<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_c0deef-49:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_c0deef-49 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_c0deef-49 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_c0deef-49 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5187_c0deef-49 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5187_c0deef-49 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5187_0d2410-f3 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_0d2410-f3 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_0d2410-f3 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>The first:<\/strong>\u00a0The information is used for the wrong purposes of that individual or organization without the provider&#039;s knowledge.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_487b47-9b .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_487b47-9b .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_487b47-9b kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Monday:<\/strong>\u00a0Revealed information may be sold or exchanged with other individuals or organizations.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_771704-5d .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_771704-5d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_771704-5d kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Tuesday:<\/strong>\u00a0When you are harassed by advertising, sales, investments, etc. via phone calls, emails, messages from unwanted individuals or companies, it means your personal information has been revealed.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_b282e2-bc .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_b282e2-bc .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_b282e2-bc kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Wednesday:<\/strong>\u00a0Your information in the hands of an individual or organization that lacks investment in data security will lead to unpredictable consequences later such as data loss and hacking.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_845acb-2a .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_845acb-2a .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_845acb-2a kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertTriangle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M10.29 3.86L1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z\"\/><line x1=\"12\" y1=\"9\" x2=\"12\" y2=\"13\"\/><line x1=\"12\" y1=\"17\" x2=\"12\" y2=\"17\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Thursday:<\/strong>\u00a0Providing data without careful consideration of the authority of that individual or organization can lead to many cases of fraud, identity fraud and affect personal reputation...<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">II. Risks of Revealing Personal Information to Fraudsters?<\/h2>\n\n\n\n<p>Bad actors can use many ways to commit fraud based on leaked personal information such as ID card\/CCCD, phone number, or bank card.<\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_52ad71-34:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_52ad71-34 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_52ad71-34 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5187_52ad71-34 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5187_52ad71-34 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5187_52ad71-34 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5187_3b574b-dd .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_3b574b-dd .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_3b574b-dd kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Sell information on hacker forums, or exchange with other individuals.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_0f4db1-5c .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_0f4db1-5c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_0f4db1-5c kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">&nbsp;Used to scam on social networks, to impersonate, defame, post fraudulent information, or contact to defraud others of money.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_72294b-09 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_72294b-09 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_72294b-09 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Stolen bank card information can be used for online shopping<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_da61b4-0e .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_da61b4-0e .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_da61b4-0e kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">ID card\/CCCD information will be used for purposes such as online identity verification in loan applications, or setting up a bank account or losing money in the bank account the victim is using...<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5187_37f66c-19 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5187_37f66c-19 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5187_37f66c-19 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_alertCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><line x1=\"12\" y1=\"8\" x2=\"12\" y2=\"12\"\/><line x1=\"12\" y1=\"16\" x2=\"12\" y2=\"16\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Your phone number can be harassed, blackmailed, threatened or scammed through many scenarios that bad guys have elaborately orchestrated.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">III. How to Deal with Personal Information Disclosure?<\/h2>\n\n\n\n<p>You need to immediately do the following 6 steps to handle personal information disclosure<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Contact authorities immediately to report loss of personally identifiable information.<\/li>\n\n\n\n<li>Contact the bank immediately to block the card and apply for a new card.<\/li>\n\n\n\n<li>Instantly secure the online accounts you are using such as Facebook, Email,... like resetting passwords, turning on 2-step security mode.<\/li>\n\n\n\n<li>Always stay calm and alert when answering calls from unfamiliar numbers.<\/li>\n\n\n\n<li>Do not rush to trust money or make transactions online. Always be vigilant and research everything carefully.<\/li>\n\n\n\n<li>And of course, don&#039;t forget to immediately alert your relatives and friends to avoid them being scammed via social networks Facebook, Zalo...<\/li>\n<\/ol>","protected":false},"excerpt":{"rendered":"<p>When personal information is leaked, bad guys can use that information to appropriate money, fake identity cards to commit bad acts or many other tricks that affect people&#039;s lives. Coming to part 2 of the series &quot;Recognizing Fraud&quot;, [...]<span class=\"screen-reader-text\"> from Revealing personal information - the earliest way to recognize it<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":5188,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-5187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canh-bao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=5187"}],"version-history":[{"count":1,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5187\/revisions"}],"predecessor-version":[{"id":5189,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5187\/revisions\/5189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/5188"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=5187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=5187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=5187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}