3 ways how Cybercheats Defraud You

As the popularity of online transactions is on the rise, so are the attempts by unscrupulous entities to defraud you and make good with your money. Here are some common ways of cybercheats/defrauding the online citizenry and some must-have precautions when you are transacting online.

Cyber Cheats

Cyber Cheats

Phishing

Most financial (banking, credit/debit card) hack attacks start with ‘phishing’ – a term given to an online scam where fraudsters steal a victim’s personal information by sending out emails that appear to have originated from legitimate financial institutions, mostly banks. These emails usually state that the user needs to urgently update or validate his/her account information after clicking on a link in the email. The link, however, leads the victim to a fraudulent website.

The information that is sought usually includes data such as usernames, passwords , bank account and credit card numbers, card expiry date, etc. Once the user enters his/her details there, the scammer comes in possession of information that can then be used to carry out bank transactions. Sometimes phishing emails also come with an attachment that automatically downloads malware onto computers. This malware could possibly record keystrokes , and steal critical data like logins and passwords without the user knowing. This information is then automatically sent to the scammer via the internet whenever the malware finds an open internet connection.

Pharming

This tactic is a bit more sophisticated . Here, a victim is sent to a fraudulent site by employing the use of a computer virus, which could possibly have originated from a phishing email.

Websites are identified on the internet by way of their IP address. So whenever a user types in a URL, such as www.mybank.com, that address is translated into an IP address via a DNS server on the internet.

Now after a user visits a website for the first time, the DNS entry for that site is usually stored on his PC’s local cache so that his machine does not have to keep accessing the DNS server every time for the same website.

In pharming, a virus attacks the DNS cache and then modifies the entries there so the user is automatically led to a fraudulent site without him even knowing it. After that, it’s scamming as usual, where the user is prompted for his login and password.

It should be noted that some pharming scams also attack DNS servers, but these cases are rare because these servers are usually well protected against such attacks.

Skimming

One of the ways that credit and debit cards can be compromised at points of purchase is by using a skimming device. This is a pocket sized scanner that is usually attached over the card reader. After that, when a customer swipes a credit or debit card, the skimming device secretly records the card’s information. That information is then transmitted to the scammers or stored on the device. The crooks later retrieve the device and use the information to create duplicate cards, or to make online transactions.

Source:– The Times Of India

5 Comments

  1. Lucy Chang June 12, 2013
  2. Ramesh Agarwal June 12, 2013
  3. Neelu Dave June 12, 2013
  4. Sugandha Agarwal June 11, 2013
  5. Jenny Smith June 10, 2013
Games Security
Brand Building
Strategies for Brand building by using Digital Signage
Digital Marketing
How SEO Fits in with Ecommerce Digital Marketing
Windows 10
5 Easiest Troubleshooting Tips for Windows 10 Startup Problems
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
iOS Application Development
9 Benefits to Choose iOS Application for Your Business
Office Apps
9 Best Office Apps for Android for Better Productivity
Printing
Top 7 Photo Printing Apps for Android
Adsense
Link Building Strategies
Link Building Strategies for Your Website in 2017
Guest Posting
6 Tips to Maximise Your SEO Efforts with Guest Posting
On-Page SEO
5 Ways Content Editors can kill your On-page SEO
MAC Software
Internet Privacy
Here’s why you should take your Internet Privacy seriously (and secure it) in the Trump era
Lotus Notes
How To Setup Archive Lotus Notes Emails To Local Disk & Save Locally
Business
Poor Employers in the Age of Technology
Blogging Social Media
Best Apps
12 of the Best Apps for On-the-Go Bloggers in 2017
Go Viral
10 Magical Tactics to Make Your Content Go Viral!
Website Speed
Tips to Optimize Your Website Speed for Better Sales
Mobile Technology
Infographic: How Mobile Technology Can Impact Your Sales
Social Media
Infographic: Social Media Behaviors to Avoid in 2017
Social Video
Infographic: 3 ways Social Video Marketing can Propel your Brand
Data Entry
Infographic: Should You Outsource Your Data Entry? Here are 5 Questions to Ask!