Tag Archive for: Card

How do I safely add a new credit card to Chrome?


Like most major browsers these days, Google Chrome does offer the option to store your credit card information as one of its autofill options

Q: I would like to add a new credit card to my Chrome. In the past, this would be something I could save automatically after entering the information during a checkout, but is it possible to enter it without having to make a purchase first, so it’s there waiting for me when I need to use it? If so, how would I do this and is it safe to do so without making a transaction in the process? 

— Ingrid G., Winter Beach 

A: Like most major browsers these days, Google Chrome does offer the option to store your credit card information as one of its autofill options — which can also include items like passwords, addresses and more — prior to entering it live during an online purchase. 

Source…

Tech security expert warns about sim card scam on T-Mobile customers


It’s Deja Vu for some T-Mobile customers. In August, hackers exposed 50 million customers’ data.

Now there is another issue.  The bad guys finding a way to swap your SIM cards.

How scammers take control of your phone number

Cyber risk expert David Derigiotis with Burns & Wilcox explained how it works.

“Your phone essentially goes dead and the attacker ports out your number to their device and now they start receiving all of your calls, all of your text messages,” Derigiotis said.

The bad guys take control.  Then they call your phone company and tell them they want to switch your information to a new phone.

“The other is, good old-fashioned social engineering,” he said. “They called, they trick the individual pretend that they are you. And they’re asking to port out that number and they’re able to simply do that by deceiving and tricking which is social engineering, taking advantage of that human element.”

Dangers of SIM card swapping

Here’s the real danger. Many of us have authentication for other programs on our computers tied to our phones.  So, think about it.  You try to get into a program on your laptop, it pushes an authentication message to the cellphone the crooks now have in their control.

“If you’re using the text message as a second form of authentication for logging into an account whether it be a banking, email, whatever it may be,” Derigiotis said. “They got access to that second authentication mechanism. That’s what happened to a number of individuals.”

How to protect yourself from T-Mobile scam

So, the best advice, double down on safety around your cell.

“What everyone should do is stop using their cell phone number, stop using that text as a second form of authentication,” he said. “Because we see right here, this is the real weak spot, and breaking through that, and being able to get into an online account.

“I think it’s more important to use some type of app-based authentication, they have different forms out…

Source…

Sixth Member of International Hacking Community Sentenced in SIM Card Scheme


A U.S. court sentenced a member of an international hacking organization to 10 months in prison along with heavy fines in connection with a multi-million dollar hacking scheme.

The perpetrator, Garrett Endicott, 22, of Warrensburg, Mo., pleaded guilty to cyber crimes affiliated with a large-scale SIM hijacking plot, acting U.S. Attorney Saima Mohsin confirmed on Tuesday. Endicott is the sixth and final defendant to be tried in connection with an international hacking group known as The Community.

Members of The Community are known to engage in SIM hijacking or SIM swapping, which is an identity theft technique rooted in exploiting cell phone numbers. The group’s objective is to steal cryptocurrency from victims nationwide, with incidents spanning California, Missouri, Michigan, Utah, Texas, New York and Illinois.

SIM hijacking is usually carried out through bribing an employee of a cell phone provider to have access to certain phone numbers. In other instances, members of the group contacted a cellular service provider pretending to be a victim, and requested that a phone number registered to another user would be switched to a separate SIM card, effectively stealing the number and cell phone account.

From here, the hackers can access sensitive personal information, such as email addresses and financial criteria. Cryptocurrency exchange account information is particularly of interest to hackers within The Community. By having access to the victims’ cell phone numbers, The Community could pass stronger security measures such as a two-factor authentication.

In total, law enforcement officials estimate that the range of cryptocurrency theft value stands at over $9 million among sentenced defendants. 

“The actions of these defendants resulted in the loss of millions of dollars to the victims, some of whom lost their entire retirement savings,” Mohsin said.  “This case should serve as a reminder to all of us to protect our personal and financial information from those who seek to steal it.”

Endicott was ordered to pay $121,549.37 in restitution fees. 

Other defendants convicted in association with The Community’s SIM hijacking schemes were based in Florida, South Carolina,…

Source…

‘Use separate credit card for online shopping, transactions’


Yeo Siang Tiong

KUCHING: Aside from having a security solution that can catch your accidental slips, it is also essential to revisit the card that you are using for online shopping as it will shape the possible losses a malicious link can inflict on your wallet, Kaspersky advises.

According to Kaspersky’s Southeast Asia general manager Yeo Siang Tiong, a credit card is not necessarily more secured than a debit card but disputes are easier to settle if a malicious transaction involves your credit card.

“Banks have insurance schemes and grace periods which allow you to alert them should you monitor a suspicious transaction, so be sure to keep an eye on your card’s balance and recent transactions list and to turn on transaction notifications,” Yeo said.

“With debit, the money loss will be pulled directly from your account. Meaning, it is your own money you are losing.

“And getting it back usually takes longer as compared with credit card – which you just don’t need to pay until the bank’s investigation is done.”

In addition, Yeo revealed that he is a believer of the additional security layer provided by a separate card which is meant only for spending online.

“In case of it being compromised, you can easily cut the card without affecting your main bank accounts.

“Just be sure that if you see anything suspicious, contact your bank immediately and try to cancel the transaction – the faster you do it, the better.”

He said that the same principle applies to having a dedicated e-mail for your online spending needs which severely limit the amount of spam messages you receive and significantly reduce the risk of opening potentially malicious e-mails disguised as sales promotions.

“It is also best to use a credit card with low limit, or you may also set the limit lower according to your spending pattern.

“This is to ensure that cybercriminals, in case they get their hands on it, can only use a limited amount, in turn not inflicting huge monetary impact on you.”

Yeo noted that though it will be easier if your card details are saved across all e-commerce platforms you’re using, data breaches should be enough to warn us about keeping our financial data more…

Source…