With Christmas coming fast, this is a last ditch effort to enlighten, empower and protect online shoppers. The abridged source of the following information is from the National Cyber Alert System by US-CERT, a government organization.
How do attackers target online shoppers?
- Targeting vulnerable computers – If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it.
- Creating fraudulent sites and email messages – Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites that appear to be legitimate or email messages that appear to have been sent from a legitimate source.
- Intercepting insecure transactions – If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted.
How can you protect yourself?
- Use and maintain anti-virus software, a firewall, and anti-spyware software.
- Keep software, particularly your web browser, up to date – Install software updates so that attackers cannot take advantage of known problems or vulnerabilities.
- Evaluate your software’s settings – The default settings of most software enable all available functionality. Apply the highest level of security available that still gives you the functionality you need.
- Do business with reputable vendors – Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor.
- Take advantage of security features – Passwords and other security features add layers of protection if used appropriately
- Be wary of emails requesting information – Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information.
- Make sure your information is being encrypted – Many sites use SSL, or secure sockets layer, to encrypt information.
- Use a credit card – There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection for your debit card.
- Check your statements – Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately.
Robert Siciliano personal and home security specialist to Home Security Source discussing Cyber Monday on the Mike and Juliet Show.
About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- 5 Tips To Secure Online Shopping This President’s Day
Making a purchase online around Presidents day? Keep in mind criminals are working hard to intercept your credit card numbers in various way.
#1 SCAM: Black-Hat SEO: Criminals create fake websites and then use the same techniques as legitimate online businesses regarding search engine optimization, marketing, and online advertising via Google AdWords. They use keywords to
- Mobile Wallets—How I Make Mobile Payments Securely
Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. The plan is to eliminate all our credit cards, store cards, and IDs and use our mobile phones as our primary means of commerce and identification. The technology behind mobile wallet or mobile POS (point
- Epsilon Breach Will Impact Consumers for Years
This week consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton HHonors and others, letting them know that their e-mail addresses have been exposed due to the recent Epsilon data breach. This provides a perfect opportunity for cybercriminals, who may try to take advantage of the breach to send out phishing e-mails
- 10 Tips to Secure Online Holiday Shopping
Robert Siciliano Identity Theft Expert
UK officials shut down an amazing 1200 online retailers who scammed millions from unsuspecting shoppers. Most of the sites originated from identity thieves in Asia who tricked victims into believing they were legitimate sites. Victims then lost money by entered their credit card data, sending checks or giving up banking details.
- Mobile and Phishing – Why It’s More Dangerous
Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. SMiShing is a version of phishing in which scammers send text messages rather than emails, which, as with phishing emails, appear to have been sent by
Leave a Comment
You must be logged in to post a comment.