3 ways how Cybercheats Defraud You

As the popularity of online transactions is on the rise, so are the attempts by unscrupulous entities to defraud you and make good with your money. Here are some common ways of cybercheats/defrauding the online citizenry and some must-have precautions when you are transacting online.

Cyber Cheats

Cyber Cheats

Phishing

Most financial (banking, credit/debit card) hack attacks start with ‘phishing’ – a term given to an online scam where fraudsters steal a victim’s personal information by sending out emails that appear to have originated from legitimate financial institutions, mostly banks. These emails usually state that the user needs to urgently update or validate his/her account information after clicking on a link in the email. The link, however, leads the victim to a fraudulent website.

The information that is sought usually includes data such as usernames, passwords , bank account and credit card numbers, card expiry date, etc. Once the user enters his/her details there, the scammer comes in possession of information that can then be used to carry out bank transactions. Sometimes phishing emails also come with an attachment that automatically downloads malware onto computers. This malware could possibly record keystrokes , and steal critical data like logins and passwords without the user knowing. This information is then automatically sent to the scammer via the internet whenever the malware finds an open internet connection.

Pharming

This tactic is a bit more sophisticated . Here, a victim is sent to a fraudulent site by employing the use of a computer virus, which could possibly have originated from a phishing email.

Websites are identified on the internet by way of their IP address. So whenever a user types in a URL, such as www.mybank.com, that address is translated into an IP address via a DNS server on the internet.

Now after a user visits a website for the first time, the DNS entry for that site is usually stored on his PC’s local cache so that his machine does not have to keep accessing the DNS server every time for the same website.

In pharming, a virus attacks the DNS cache and then modifies the entries there so the user is automatically led to a fraudulent site without him even knowing it. After that, it’s scamming as usual, where the user is prompted for his login and password.

It should be noted that some pharming scams also attack DNS servers, but these cases are rare because these servers are usually well protected against such attacks.

Skimming

One of the ways that credit and debit cards can be compromised at points of purchase is by using a skimming device. This is a pocket sized scanner that is usually attached over the card reader. After that, when a customer swipes a credit or debit card, the skimming device secretly records the card’s information. That information is then transmitted to the scammers or stored on the device. The crooks later retrieve the device and use the information to create duplicate cards, or to make online transactions.

Source:– The Times Of India

5 Comments

  1. Lucy Chang June 12, 2013
  2. Ramesh Agarwal June 12, 2013
  3. Neelu Dave June 12, 2013
  4. Sugandha Agarwal June 11, 2013
  5. Jenny Smith June 10, 2013
Games Security
Best Web Designing Tools
Best Web Designing Tools You Can’t Live Without
Email Marketing Software
How to Choose Your Email Marketing Software for Your Business?
Live Chat
4 Reasons Why Live Chat is the Ideal Solution for Customer Support
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
App Builder
7 Excellent Mobile App Builders for Personal and Professional Apps
Android Device
How to Keep Your Data Safe and Secure On Your Android Device?
Android Phones
Exciting Features of Android Phones you Probably Didn’t Know
Adsense
Guest Posting
6 Tips to Maximise Your SEO Efforts with Guest Posting
On-Page SEO
5 Ways Content Editors can kill your On-page SEO
On Page Optimization
Understand the effectiveness and important of On Page Optimization
MAC Software
Best VPN Service
How to Choose the Best VPN Service for Torrenting?
Technology Integration
5 Ways Technology Integration Will Help You Get More Business
Accessories
5 Must Have Portable Accessories in 2017
Blogging Social Media
Blog
5 Effective Ways To Save Time While Writing Blog Posts
Facebook Marketing
6 Tips for Using Video Marketing on Facebook
Time Management
8 Time Management Strategies for Fellow Bloggers
Content Writing
Infographic: 7 Reasons Why Content Is Still King in 2017
Email Marketing
Infographic: The Giant Email Marketing Statistics Guide
Ecommerce
Infographic: How to Create Your Ecommerce Store With Magento
Ways to Backup iPhone
Infographic: Ways to Backup iPhone – Avoid iPhone Data Loss