All Top Banking

Security Risks Inherent with Online Shopping

Posted by John B. Frank Wednesday, May 13, 2009





Listed below are just a "few" of the risks when you shop online without HomeATM's PCI 2.0 Certified PED

Shopping online without a HomeATM PCI 2.0 Certified SafeTPIN leaves you vulnerable to cyberthieves. There are many ways in which hackers can steal your sensitiveinformation without you knowing it. Here is a list of some of thepotential threats you face when shopping online without our SafeTPIN:

Privacy-invasive software
– This is software thatmonitors your computer with the intent of stealing sensitiveinformation and is often of a commercial nature.

Spyware
– Softwarethat could be on your computer without you knowing it. Not only canSpyware monitor what you are doing (including watching you type in yourcredit card number), but it can actually change how you interact withyour computer.

Crimeware
– Softwaredesigned specifically for the purposes of identity theft so theattacker can access your online banking or online shopping accounts.

Man-in-the-middle attack (MITM)
– An attacker sitsbetween your computer and the computer you are trying to communicatewith (the shopping site), intercepting, and even changing, theinformation.

Trojan
– You install software that apparentlyperforms a useful function, but it actually has a hidden agenda. Onceinside, the attacker can watch your screen, save their files to yourcomputer and even control your computer.
|
Keystroke logging
– A method of recording yourkeystrokes. This is a very common way to monitor mouse operations andobtain screen shots or monitor what is typed on your keyboard.

Phishing
– You get an official looking email froma trustworthy source (like a bank or PayPal) asking for information ofsome kind (usually passwords, SIN numbers, credit card numbers etc.).Of course, the email is actually from a fraudster posing as someonelegitimate.

Memory sniffing
– A program that effectively “sniffs” out your memory, revealing passwords, credit card data and other such information.

Exploits
– Software or a sequence of commands that take advantage of a bug or vulnerability on your computer to take over your computer.

0 comments

Post a Comment

Powered by Blogger.

Blog Archive

Search This Blog

Our Manufacturing Facility

Learn More About Us

Find out how our patented technology can empower your financial institution.

Our secure two-factor online banking authentication eliminates dangerous passwords and usernames and replicates the same trusted process used to access cash at ATM's. (Insert Bank Issued Card, Enter Bank Issued PIN)

There is an R.O.I. as FI's also earn recurring revenue from each transaction conducted using our PCI 2.0 Certified PIN Entry Device. Our technology also provides a unique real-time P2P "Instant-Transfer" which allows your online banking customer to transfer cash from ANY of their bankcards to ANY other bankcard...with the Swipe of a card.

Help your bank eliminate phishing and your customers avoid identity theft by providing them with the ability to stop typing and start swiping. There is no safer way to conduct financial transactions online than by 3DES DUKPT encrypting the cardholder details, which we do at the mag-head "inside the box/outside the browser."

Total Pageviews

SLIM for PC or SmartPhone

SLIM for PC or SmartPhone
Click to Inquire

Chip and PIN eCommerce and Mobile

Chip and PIN eCommerce and Mobile
Click to Inquire

Kapersky Calls for Mass Adoption of Card Readers

Kapersky Calls for Mass Adoption of Card Readers

Translate This Blog

BobCaps

Search ePayment News (example: NFC)

About Me

My photo
Named one of the best Payment Industry News Blogs 4 Years Running

Feedjit

My Zimbio