One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8417162
Date de publication 2023-11-27 11:00:00 (vue: 2023-11-27 11:07:23)
Titre Cartes-cadeaux ou vol de données?Assurer des achats en ligne sûrs cette saison festive
Gift cards or data theft? Ensuring safe online shopping this festive season
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Gift cards have become a go-to Christmas present for many people, but their dramatic rise in popularity has also unfortunately made them a prime target for hackers. The reason why gift cards are such a popular present is because of how practical they are to use. When you’re not sure what to buy someone, gift cards present an easy and accessible way to show someone how much you appreciate them. But don’t allow the convenience of gift cards to get the better of your judgment in regard to security. It’s easy to think that gift cards are safe from cybercriminals, but in reality, gift card fraud (also known as gift card scamming) is a very real threat not only to retailers and business owners but to everyday individuals such as yourself as well.  Overlooking basic cybersecurity hygiene when you’re rushing to score the best deals that you can online has always been a risk you’ve taken in the past, but it also may not be a risk you can afford to take this year. Read on to find out why and how you can prevent it.  Why do scammers like gift cards? Gift card fraud is a bigger problem than most people realize. In 2022, for example, FTC data revealed that nearly $230 million was lost to gift card fraud, affecting more than 48,000 people in total. Gift cards are popular with retailers because they present a very reliable stream of revenue. But at the same time, they prevent a viable opportunity for scammers to get away with easy money because of how difficult they are to track. Scammers like gift card cards because they are easy to break into and also because they do not have the same level of security authentication that credit or debit cards have. Most cybercriminals will steal gift card numbers online from stores offering them. They can accomplish this by using botnets that perform brute force attacks. The only thing a criminal has to do is to test thousands of different combinations of PIN and gift card numbers before hacking into a user’s account and depleting the card of its funds.  Furthermore, once the attack is completed, there’s usually no trace of the criminal’s identity and the funds cannot be traced. And even though most gift cards have limited amounts of money loaded on them (most gift cards run between $15 to $500 at the most), when cybercriminals are running their operations on a large scale they can turn a very sizable profit.  Cybercriminals can also monetize gift cards by illegally selling them on the dark web or other third-party websites. Some of these websites will offer the ability to convert gift cards to cash at 30%+ of the total card value, presenting an easy way to make quick money.  In the next section, we’ll dive into the specific types of gift card fraud that can affect you.  Types of gift card scams  Here are the most common types of gift card scams: Fictitious ads In this method, cybercriminals will post fake but realistic-looking advertisements for items ‘on sale’ on ecommerce websites where they will trick users to into sharing their gift card numbers to purchase the items. Once the money has been received, the ads will disappear, and the victim will be out of luck.  In other words, people can fall for this trick the same way they can fall for other common types of identity theft, with people being unassuming since the threa
Envoyé Oui
Condensat $15 $230 $500 “it ‘family ‘on 000 2022 365 ability above accessible accessing accomplish account activated activation additionally adhere adopt ads advanced advertisements affect affecting afford after agency alert allow also alternatively always amazon amounts another any anything apple appreciate approval apps are area article ask asks assured at&t attack attacker attacks authentication author away basic because become becoming been before being best better between bigger boss botnets break brute business businesses but buy call calls can cannot card cards cards  case cash certainly christmas claim clear code codes codes  combinations comes coming common commonly company completed completely compliant conclusion conducting content convenience convenient convert council create credit criminal criminal’s customer cyber cybercriminal cybercriminals cybersecurity dark data database deals debit deeds demand demanding department deplete depleting designed detect different difficult disappear discussed dive document does doesn’t don’t done dramatic dss easy ecommerce either emails encrypted encryption end endorse ends enforcement ensure ensuring even everyday exactly example fact fake fall family festive fictitious financial find flag force fraud fraudster friend from ftc fun funds furthermore generate generated get gift goes google government great guard hack hackers hacking had happen harmless has have here holiday holidays how however hygiene identity illegally including individuals industry information initially instantly it’s items its judgment know known large law legitimate less level like limited linkedin loaded longer looking lost loved luck made mainstream major make malicious management manager many mastercard may meaning media member member’ message messages method methods million mindset mobile monetize money monitor more most much nearly need never next not notes nothing number numbers nutshell offer offering office once one ones ongoing online only operations opportunity other out over overlooking owners paid party past pay payment pci pdf people perform person personal phone pin platform play point popular popularity pose posing positions post practical present presenting pretending prevent prime problem process profiles profit proper protected provide provided purchase quick read real realistic reality realize really reason received recipient recording red redeemable regard reliable remember requested responsibility rest retailers revealed revenue rise risk ruin run running rushing safe sale’ same scale scam scammers scamming scams scams  scams: score seal season section security selling send set sharing shop shopping should show simply since sizable social solely solutions some someone sort source specific spend standards steal stealing steer stolen stop stores story strategy stream such sure take taken target tell test text texting than that’s theft them then there’s these they’ll thing think third though thousands threat through time times tool total trace traced track tracked transactions transferred trick trusted turn twelve types unassuming unfortunately unsolicited upcoming use user’s users using usually value vein very viable victim victims views visa vulnerable way we’ll web websites well what when where which whole why will won’t words work workspace year you’re you’ve your yourself
Tags
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: