The information of 327 million guests, including names, addresses, phone numbers, dates of birth, passport numbers, payment card numbers and expiry dates of some of them, was leaked at one of marriott’s Sheraton hotels. One stone aroused thousands of waves, in the face of frequent information leakage events, netizens expressed their opinions, some people with “like streaking” to express their psychological feelings; Others expressed the need to “severely punish those responsible, compensate for losses” and properly handle the incident; However, more netizens are concerned about “how to prevent information leakage” and “how to minimize the damage after information leakage”.



These habits may reveal private information

The way of information leakage mentioned above may be “accidentally done” by users, but there are more channels for information leakage, which are traps set by lawbreakers. Many people often have doubts after discovering their information leaked, how on earth private information leaked out? In fact, sometimes you do something that you don’t know can be a source of information. According to “issued by the stewards tencent phone smartphone life: pay virus privacy report, the most common form of life privacy information including: the social platform to share self-time, photograph, the geographical position, visit the website of unknown or take part in the online test, discarded did not deal with id photocopy, delivery sheet, the personal information entrusted to cattle act as purchasing agency tickets, etc.


Zhang, a fan of horoscopes, is a fan of destiny tests and astrolabe readings. After a period drama hit the air, Xiao Zhang saw the test “find out who you were in XX in your past life” and clicked the test with great interest. Because answering a few simple questions could lead to the result of a character in the drama, Zhang didn’t pay attention to whether the page opened was normal or the url was reliable. The day after the test, Zhang received a number of spam messages and harassing phone calls. It turned out that Zhang’s personal information was stolen from an unidentified website and then subjected to spam attacks.

Illegal elements set a trap, purloin user personal information

Driven by interests, criminals will use hacking technology to attack databases, set up fake WiFi and risk WiFi, maliciously spread the TWO-DIMENSIONAL code containing Trojan virus, phishing websites and other means, which can easily steal users’ privacy data. At the same time, artificial information peddling, website vulnerabilities, intelligent hardware vulnerabilities will also cause the disclosure of personal information. Marriott Hotel Group’s Sheraton 500 million guest information leakage incident, is a typical case of criminals stealing user privacy information.

Use security software to protect privacy and prevent fraud

In the face of maliciously obtaining personal information by criminals to harass and defraud, the country, enterprises and individual users need to make joint efforts to defend and resist. National network supervision part of the parallel measures, can suppress such incidents; Enterprises need to constantly upgrade information systems, install anti-leak software, and establish strict firewalls for user information.

Users themselves need to improve security awareness, protect personal information security, refuse to harassment fraud phone. On the one hand, copies of id cards, express delivery sheets and other items containing personal information are properly disposed of; On the other hand, with the help of security software, information leakage can be avoided by identifying phishing websites, risky WiFi and virus detection apps. Even after information leakage, we can also use the harassment interception function to avoid unnecessary answering and protect property security.