Rabu, 07 April 2010

Protect Credit Card from Fraud

Carding or counterfeit credit card to be one part of crime motivated Internet economy, Technological sophistication and omissions giving users the carding gap, Carding just one practice underground economy, the mode of economic crimes committed by illegal attacker.

This attacker is not even the internet or IT expert, and could be a newbie who is practicing a free software module traded and user friendly. Carding is done by several modes, namely:

1. Breaking into the bank database. With specific technical expertise, attackers broke into the bank database. Bank customers' credit card numbers obtained from this method.

2. Skimming, put simply, skimming is the magnetic card data make copy illegally, by using a magnetic card reader device.

3. Merchant transaction. Attacker to read and could have been recording with the camera, three points behind on your credit card. This figure represents the code Verivication Card Value (CVV) of your credit card, a transaction will only be successful if the cashier enter this three digit number.

Credit card user carelessness allows an attacker in launching the action. Consider the following ways to protect credit card carding mode:

1. Recognize and be aware of carding mode
As described above, there are a number of carding mode. Credit card users need to be more vigilant when making transaction merchants. Make sure your credit card is not visible to others when going to swipe it. Attacker could exist around you, and work in teams. As one of the actors to draw your attention, the other players observe the CVV code on back of credit cards. It takes just few seconds to remember three numbers.

2. Cover with tape CVV code,
A simple way to do in CVV code is covered with tape. These help protect the credit card of target players carding.

3. Do not store passwords or account numbers in your phone
Data Information is the most valuable assets targeted by the perpetrator. By storing all important data on the phone, when phone is missing, this gap becomes illegal economic opportunities for the attacker.

Tidak ada komentar:

Posting Komentar