This article in informing to be protected from theft victim of credit card data.
Badness of ordinary credit card in term " carding" since existence of internet increased of hundreds gratuity.
The hackers aspires after once this badness, why? Because if only did “ hack” website or deface be thing there is no the profit. And this thing can in detection and arsonist can be catched, if site which in enters has TRACKER ( detector program IP/link) or LOG FILE ( file note activity user/IP is stepping into website).
If carding they can go without footstep after getting the data,they will propagate data between hacker so that difficult to be traced first person who is stealing credit card data.
Some ways applied by hacker in stealing credit card :
1.Sniffer Packet, this way is fastesd way to get data any kind. The activity concept they enough using program which can see or makes logging file from data sent by website e-commerce ( online sale) . In general they set on website which is not is equiped by security encryption or site which is not has security not safe.
2.Made program spyware, trojan, worm and the functioning conspecific become keylogger ( keyboard logger), program notes keyboard activity. Anything which you type to codified. This program disseminated through via E-mail Spamming ( file trojan in attachment), messenger ( yahoo, MSN), or certain site with icon or interesting display of netter to do download and opens the file. This program will note all you computer activities into a file, and will send it to hacker enamel. Sometime this program can be implemented direct if you to step into sites which in making hacker or adult/phorno sites.
** Initial sign is your computer in infiltration is: internet and speed of computer would increasingly slow, if you opened taskmanager will emerge ill defined files.
3. Makes phising site , that is conspecific site or looks like site the original. With link is looking like the original but wrong. example of in Indonesia at the time situs click bca www.klikbca.com, have ever experienced the thing. This site the display same as klikbca but the address is made some different like.
4. Last, this high level: unloads site e-commerce directly and steals all data of the customer clients. This rather difficult way and needs hacker expert or hacker which have been experience of to do. Them uses method injection ( input script which can be implemented by site/server and opens security for its. Then open security and safety system in server and all data can be read.
There are some way done the hackers, but above way is way that is most commonly is done hacker for carding.
Victim is not only happened because there are intention from the perpetrator, but caused by opportunity, attentive... attentive...
Label: credit card safety
Consumer beware, there are hackers on the prowl, and they want your credit card, bank account and lots of other stuff too.
Credit card hackers were once highly gifted computer geniuses. Not so anymore. Today, even the mildly computer literate person can buy software that can do the job of the highly skilled.
Protect yourself
In this day and age, it’s not such a bad thing to be a little paranoid when it comes to security. There are excellent programs available that help in making personal accounts less susceptible to hacker attacks.
- anti-virus programs
- anti-spam programs
- anti-spy ware
- firewalls
It is important, however, to use these programs by updating regularly and running the anti-virus scanner at least once a week. With constant maintenance, programs like the popular keystroke logger, can usually be caught and deleted before any damage can be done.
The keystroke logger is a popular hacking tool. Easily disguised within other programs, it keeps track of every keystroke a targeted user makes; including bank account and credit card numbers and passwords. Hackers hide keystroke loggers inside free downloads, or even when a word is misspelled in a search engine. Last year, one mistyped letter in a Google search would have brought on a bevy of viruses.
Here phishy, phishy
Phishing, as the name implies, lets the hacker go fishing for his prey through email. Thus, the word is derived from the combination: fish-as in reeling in, and phony-as in fake.
A hacker sends out an email that seems to be from a trusted company. This email usually threatens closure of the user’s account unless the instructions in the email are followed. A link to the company website is provided. Once clicked, the user sees the familiar company web page, complete with logos, company information, etc. The email usually reads something like this:
For security reasons, the company is asking you to update your account. Please follow this link and update today. If we don’t hear from you within 48 hours, your account will be closed.
The fish has been reeled in and is now entering personal information on a phony web page. Banks and credit card companies lose more than $1.2 billion yearly to phishing scams.
The easiest way to avoid being taken in by these web con-artists is to know one basic fact: financial institutions and legitimate businesses NEVER ask for personal information by email.
Dmitri Alperovitch, research engineer for CipherTrust, Inc. says, Anytime you get an email from a financial institution that asks you to go to a Web site and enter financial information, a whole bunch of red flags should jump up.
source : http://www.creditcardhacker.com/
The following ten-point checklist when shopping on the internet is recommended.
1. Only use recognized and established retailers.
2. Never disclose your PIN to anyone and never send it over the Internet.
3. Ensure that the locked padlock or unbroken key symbol is shown in the bottom right of your browser window before sending your card details. The beginning of the retailer’s internet address will change from ‘http’ to ‘https’ when a purchase is made using a secure connection.
4. Make sure your browser is set to the highest level of security notification and monitoring. The safety options are not always activated by default when you install your computer.
5. Use up to date versions of web browsers, old ones are less secure.
6. Ensure that the retailer has an encryption certificate. This should explain the type and extent of security and encryption it uses.
7. Check statements from your card issuer as soon as you receive them. Raise any discrepancies with the retailer concerned in the first instance. If you find a transaction on your statement that you did not make, contact your card issuer immediately.
8. Print out your order and keep copies of the retailer’s terms and conditions and returns policy. There may be additional charges such as local taxes and postage, particularly if you are purchasing from abroad.
9. Ensure you are fully aware of any payment commitments you are entering into, including whether you are instructing a single payment or a series of payments.
10. If you have any doubts about giving your card details, find another method of payment.
Protect yourself a victim of card fraud, follow these tips:
- Look after your card, keeping it secure at all times and don't let it out of your sight when making a transaction.
- Carefully discard receipts from card transactions - shred them if possible to prevent 'bin divers' from acquiring information about you and your cards
- Check your receipts against your statements. If you find an unfamiliar transaction contact your card issuer immediately.
- Never write down your Personal Identification Number (PIN) and never disclose it to anyone, even if they claim to be from your card issuer or the police.
- When using a cash machine, be wary of anyone who might be trying to watch you enter your PIN and do not allow yourself to be distracted by anyone trying to talk to you.
- Report lost or stolen cards to your card issuer immediately.
- Have a locally issued credit card for use as an alternative. It will also serve as a back up should you be unfortunate to be a victim of fraud. Avoid Gold and Platinum cards if you don’t actually need the higher limits or other benefits offered.
Other tips:
- Sign any new cards as soon as they arrive. Ensure that you cut up the old cards as soon as the new ones become valid.
- If you carry a bag, carry it firmly with the clasp towards you. A money belt or secure inside pocket is best for valuables.
- Don't leave cards unattended in a bag, briefcase or jacket pocket in a public place and keep your bag or briefcase on your lap.
- At work keep your bag and other personal belongings locked in a cupboard or drawer.
Following is example of deception Case of credit card by stealing credit card data.
a client from a bank which by using transaction through e-commerce experiences loss equal to credit limit at the credit card. The cause is theft of client indentity by using TROJAN.
This thing can be avoided if client to apply procedural of security and safety which had been recommended if doing transaction of online.
Some analysises to deception Case and theft of credit card data, explainable as follows and this addressed to bank institute :
- criminal has some credit cards especially the platinum.Bank has done blacking out step to some the cards.
- Bank must do tighter monitoring, remembers growing of ability of level of technology so that risk cyber-crime excelsior.
Following is some suggestions to avoid theft of credit card data :
- suggested to client is done by replacement of credit card from type magnetic becomes chip type card, nevertheless this thing doesn't guarantee 100% safe,but to steal chip type card data required to be skilled of technology which is enough is height. Usually for replacement of this type card the side of bank requires process 1-2 weeks, or can be quicker.
- if happened losing of credit card in physical, soon reports kepihak bank releasing the card.
Ought to the side of bank releasing credit card, gives explanation to client that losing card has leaking potency. Therefore the card blacked out to be former , then is done replacement with new technology credit card during 3 up to 5 day.
- applies you credit card carefully and effective. Taking a care if doing attentive and online transaction to cyber-crime.
- checks periodical to your credit card invoice.
- applies security system at computer which you applies to do transaction of online. For this information you can pay a visit at website security system of computer like Mc Afee , symantec and etc. Can also you does consultancy with consultant webmaster which you recognizes.
Security for credit card basically was located in number secrecy of the credit card, if number secrecy of the credit card was abused, then the disturbance in the security of the credit card will happen.
This could be said that the level secured this credit card very low.This happened if each transaction, anyone could see the number of this card.
In each online transaction with the credit card, merchant will accept the number of the credit card from user.This will open the occurrence opportunity of the weak security so as to result in this credit card became not safe.For minimized the piercing of the credit card,Occasionally still was needed the signature, despite this fully did not guarantee this credit card was safe.
The theft of the credit card data, could happen because of the weakness of the security system to this credit card.
The credit card company had the aim of reducing the criminal opportunity of not happening higher.
Many methods of getting data information credit card that will be stolen in an online.Manner his one was to see the note of the purchase transaction.
One example was website that carried out the online sale and used SSL script to encryption the credit card data .Website this will send the e-mail to the owner of the number of this credit card through web-server.
The person who will carry out the crime, could see details of this e-mail before the bank carried out the processing.
Other way to protect credit card is by the way of using ” Control Payment number”.
This is fiction number attributed to by card number in real, validity is determined with usage within brief with single merchant.
The crime of the credit card could not be reduced if not in matched with the increase in the security system that enough.Example from the security system was by applying the Introduction system the verification 4-digit the PIN of NUMBER .Code 4-digit only was known by the holder of the credit card.This system was a method that could be used.
Earns also for security system by the way of SMART INDENTIFICATION , or with DIGITAL CODE.
Digital of code is a security method by not presenting 3-4 numeral digits at credit card back at the time of transaction.
Safe applies credit card for amenity of transaction and taking a care and attentive.
Label: Security for credit card
Chain Simon Woon alias Clement citizen Malaysia, steals data credit card with two ways namely steps into host link and applies conventional equipment.
The biggest theft passed host link and bank data computer can get 3000 names. “ that is because of they can steal 7,2 million of 9,2 million data owner of credit card in Indonesia,” says Direktur Narkoba Bareskrim Polri Brigjen Indradi Thanos, 5 maret 2008 .
By the way of conventional, perpetrator applies hand skimmer and chip implant. Both the equipment is glued to EDC ( Electronic Data Capture) merchant. Per data is sold by $ 20 up to $ 50 for 7,2 data. Thief has gotten money's worth Rp. 252 Billions( IRD ) with exchange rate $ 35 per data.
Now have been 24 accuseds is catched. Hit of chain Simon which also is narcotics and drugs cartel still in calculation. Indonesian Police entangles the side of risk card center Visa and also Master to trace where the syndicate applies credit spurious card and how much/many transaction done.
Made known it forger chain credit card causes an uproar world because harming owner from foreign countries for Indonesia, United States, Mid-East, Australian, Thailand, Kanada and Japan. Victim many to be Indonesian, Thailand and Mid-East. Foreign countries police also many coming to Indonesias to see the accuseds.
Head Of Unit III DIREKTORAT narkoba Badan Reskim Polri Kombes M. Hasan Amrozi directing investigation direct of the case estimates syndicate has falsified tens of finite hundreds of thousand credit card. “ They have been five years operates. How much/many is falsified that there are still be investigated. What is clear, credit card false ready to circulate which we to confiscate 7600 cards.” says Amrozi.
According To Amrozi theft of data owner of credit card in bank shouldn't happened if when bank to complement with various secrecies. Now Bank Mandiri Has just and BII expressed by its the data is leaked insider.
Amrozi suggests bank to arrange in layers minimizing three ways in taking care of secrecy of the data. Firstly, data random owner of credit card with various codes and secret code. Second, computer program is locked. Third, applies special password and secret.
To take care of secrecy, only one or two people is allowed to access even a password of perpetrator successfully applies conventional equipment to tap owner data when transacting, not the knows how much/many fund which can be applied.
The the accuseds is ensnared by section 362 Criminal Law ( theft), section 263 Criminal Law ( forgery) and section 480 Criminal Law ( catchment) or pasal 362 KUHP (pencurian), pasal 263 KUHP (pemalsuan) dan pasal 480 KUHP (penadahan). Temporary which bank employee will be added with section of Banking Law.
source: Media Indonesia - 6 Maret 2008
Label: Artikel Up Date