3 ways how Cybercheats Defraud You

As the popularity of online transactions is on the rise, so are the attempts by unscrupulous entities to defraud you and make good with your money. Here are some common ways of cybercheats/defrauding the online citizenry and some must-have precautions when you are transacting online.

Cyber Cheats

Cyber Cheats

Phishing

Most financial (banking, credit/debit card) hack attacks start with ‘phishing’ – a term given to an online scam where fraudsters steal a victim’s personal information by sending out emails that appear to have originated from legitimate financial institutions, mostly banks. These emails usually state that the user needs to urgently update or validate his/her account information after clicking on a link in the email. The link, however, leads the victim to a fraudulent website.

The information that is sought usually includes data such as usernames, passwords , bank account and credit card numbers, card expiry date, etc. Once the user enters his/her details there, the scammer comes in possession of information that can then be used to carry out bank transactions. Sometimes phishing emails also come with an attachment that automatically downloads malware onto computers. This malware could possibly record keystrokes , and steal critical data like logins and passwords without the user knowing. This information is then automatically sent to the scammer via the internet whenever the malware finds an open internet connection.

Pharming

This tactic is a bit more sophisticated . Here, a victim is sent to a fraudulent site by employing the use of a computer virus, which could possibly have originated from a phishing email.

Websites are identified on the internet by way of their IP address. So whenever a user types in a URL, such as www.mybank.com, that address is translated into an IP address via a DNS server on the internet.

Now after a user visits a website for the first time, the DNS entry for that site is usually stored on his PC’s local cache so that his machine does not have to keep accessing the DNS server every time for the same website.

In pharming, a virus attacks the DNS cache and then modifies the entries there so the user is automatically led to a fraudulent site without him even knowing it. After that, it’s scamming as usual, where the user is prompted for his login and password.

It should be noted that some pharming scams also attack DNS servers, but these cases are rare because these servers are usually well protected against such attacks.

Skimming

One of the ways that credit and debit cards can be compromised at points of purchase is by using a skimming device. This is a pocket sized scanner that is usually attached over the card reader. After that, when a customer swipes a credit or debit card, the skimming device secretly records the card’s information. That information is then transmitted to the scammers or stored on the device. The crooks later retrieve the device and use the information to create duplicate cards, or to make online transactions.

Source:– The Times Of India

5 Comments

  1. Lucy Chang June 12, 2013
  2. Ramesh Agarwal June 12, 2013
  3. Neelu Dave June 12, 2013
  4. Sugandha Agarwal June 11, 2013
  5. Jenny Smith June 10, 2013
Games Security
Sticker Marketing
Creative Ways to Use Stickers to Promote Your Brand
Security
5 Security Threats that are a Big Worry for every Webmaster
Marketing Strategy
The Role of the Blog in Marketing Strategy and its Advantages
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
iPhone X
Everything you need to know about the new iPhone X
iOS 11
Top iOS 11 Tools for the iOS Developers Who Want to Make an Advanced App
Smartphones
Buy 10 Top Smartphones Under Budget with Use of Diwali offers
Adsense
SEO
SEO Fundamentals that Remain Unaffected by Algorithm Changes
Joomla
Top Joomla SEO Tips Which You Must Enable on Your Website
Keyword Research Tools
3 Free Keyword Research Tools You Should Start Using Today!
MAC Software
Shared Hosting
Shared Hosting vs. VPS Hosting! Which Hosting is Best?
Business
How New Tech Helps Small Business Owners
Microsoft Outlook
How to Open Oversized PST File of Microsoft Outlook in Windows
Blogging Social Media
Multilingual
Multilingual Blog, Is It Worth It?
Blogging
Best Blogging Tips You Can Take Use as of Today
WordPress
Give Your Brand a Unique Identity with a Website Built on WordPress
Online Presence
Infographic: How to Maintain a Professional Online Presence as a Service Provider
Smart Cities
Infographic: 3 Reasons Behind the Need for Smart Cities
Customer Loyalty
Infographic: 6 Ways Social Media Can Help Build Customer Loyalty
Messages
Infographic: Top Reasons Why Your Business Needs to Archive Text Messages