1, hungry, many e-commerce companies operate stores without a license, and the kitchen is a mess.
The take-away food sold by five stores online actually comes from a small kitchen. Managers of five stores: "How many orders do we have a day, more than 400 orders, a day, do you think a month?"
It turns out that there are two large freezers in the outer room of this shop, which are frozen vegetables packed in pretreated plastic. When someone orders food, the kitchen staff takes out the corresponding varieties from the freezer, then takes them to the back kitchen and heats them in a big electric kettle. If the rice cooker can't thaw, put it in the microwave oven above the console. After the frozen vegetables are thawed and melted, put them into the lunch box. After that, the delivery staff wrapped it in a plastic bag printed with the words "Hungry" and sent it to the ordering customer.
2, the second-hand car transaction hidden scam: the car is good to let you lie to you and steal you.
Both CheYiPai website and its staff have repeatedly stressed that the auction of used cars here is "open" and "transparent". However, an industry insider told reporters that there is a mystery behind the so-called openness and transparency.
3. CCTV exposed the old toothbrush made of scrap steel used for cleaning Beikou denture.
Guo Lan Medical Equipment City is a large-scale professional medical equipment wholesale market. The reporter also saw this kind of broken steel for sale here. Under the introduction of the store, the reporter saw boss Hou, who specializes in steel crushing business, in a rental house in Foshan. Here, the reporter saw the same broken steel raw materials as the packaging used by Cidu Loyal Medical Products Co., Ltd.
Hou Boss, wholesaler of raw materials of broken steel for dentures: "Well, more than 90% of the products in China are made in Tianjin, because only Tianjin has this kind. How many tons are there in a month? "
4, the mobile APP deduction software was exposed to grab tickets, and the crazy bird in Aauto Quicker was recruited.
Mr. Luo, who lives in Changsha, Hunan, recently found that his mobile phone bill was a bit abnormal. He inquired about the telephone charges for nearly half a year, and found that since 20 151month, the monthly MMS charges of15 yuan have been increased. Moreover, in 2065438+February 2006, 10 yuan's mobile app store information fee was added to the phone bill. He also inquired about the Unicom charges on this mobile phone. Unexpectedly, in June of 20 16, the value-added service fee was as high as 5 1.7 yuan.
5, CCTV exposure public free WIFI can instantly steal all privacy.
Xie Yingying, the host, booked a manicure service with her mobile phone. As a result, after placing the order, the host Chen Weihong mastered the information of Xie Yingying, including the appointment time, the address and telephone number left in the order!
6, CCTV exposure public comments and other platforms to brush out a good reputation as long as 1000 yuan.
Yy platform security business voice chat room brush customer service: "Now you are doing e-commerce, how can you not brush the store?" ! ""If there are more than thirty thousand people in the group, it will be less than forty thousand. Please have a look at this business my friend has handled. There are more than 8,000 channel merchants. "
7. The random inspection of Haitao children's products 1/3 is unqualified or causes children to suffocate.
In 20 15, AQSIQ conducted spot checks on the quality of children's products imported through cross-border e-commerce channels, including toys, clothing, diapers, kitchen utensils and wet wipes. A total of 654 batches were sampled, and 2 17 batches were found to be unqualified, with a failure rate of 33%. Among them, 24 batches of imported toys/KLOC-0 were randomly selected, and it was found that 28 batches of products had small parts that could easily cause children to suffocate or their physical safety performance was unqualified. Products mainly come from Thailand, South Korea, Germany, the United States and other countries.
8. Zhengzhou Hengliyuan and other foods failed to pass the sampling inspection.
This week, the State Food and Drug Administration of the United States randomly sampled 9 18 batches of six types of products, including edible oil, grease and its products, meat and meat products, fruits and fruit products, and roasted seeds and nuts. 9 10 batches of qualified products and 8 batches of unqualified products.
Extended data:
Consumption early warning
Mobile phone consumption
The CCTV 3 15 party was exposed, and promotional booths often appeared in the community. The card reader and QR code were hidden, and all the card numbers and passwords were stolen. Consumer reminder: when you see promotions in the community and on the street, don't swipe your card and scan the QR code easily, and be wary of "picking up sesame seeds and losing watermelon".
Tonic tonic
Red ginseng is a tonic. According to the national standard, the sugar content should not exceed 20%. However, some merchants actually added sugar to it, which increased the weight by 30% and the sugar content soared to 50%. If diabetics take it, it is likely to aggravate their condition. Identification: ① Choose "ugly": red and full of sugar; ② Choose "dry" goods: the sugar content of soft glutinous rice exceeds the standard.
Public WIFI
3 15 party experiment: Xie Yingying, the host, booked a manicure service with his mobile phone. As a result, Chen Weihong, the host, mastered the information of Xie Yingying after placing the order, including the appointment time, the address and telephone number left in the order.
An experiment was done at the party: everyone joined a free public WIFI, and then was surprised to find that when you opened the consumer software, all orders and consumption records were extracted, including your phone number, home address, ID number, bank card number, and even what movies you watched.
information disclosure
There are two reasons for information leakage in the process of experimental interaction. One is that some software on mobile phones did not take necessary protection measures for information data according to the requirements of the relevant regulations of the Ministry of Industry and Information Technology, so that hackers could extract personal information such as the user's name, date of birth, ID number and address from the intercepted data. Once the wireless network login encryption level is low, or the router itself has security holes, it is easy for hackers to invade and intercept the data transmitted by the wireless router.
However, the commonly used financial payment and social instant messaging software has taken strict security measures for account numbers and passwords in key links such as transfer, payment and repayment to prevent information leakage, but consumers should still develop good network usage habits, such as setting complicated login passwords.
References:
Baidu encyclopedia? 20 16 CCTV 3. 15 party