How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from the hit movie “Frozen” through an online seller is a real shopping risk, too.

It may seem that protecting yourself from hackers is impossible, given that it’s been a banner year for identity theft. In 2014, hackers stole tens of millions of email addresses and credit card numbers from US retailer Home Depot and bank JPMorgan and got into Apple’s iCloud service through a password breach, which exposed explicit, personal photos from around two dozen celebrities including actress Jennifer Lawrence.
Fortunately, there are simple steps you can take to protect yourself that don’t require expertise in network penetration technology, said Gary Miliefsky, the founder and CEO of spyware blocker SnoopWall, who has decades of experience in online protection.

But first, a reality check. “Assume you’re already compromised,” Miliefsky said.

That’s because the more we shop online, the more we put ourselves at risk — whether using smartphones or home computers. Online fraud has almost tripled in the past year, according to the 2014 annual online fraud report from Javelin Strategy and Research. There are 60 new identity theft victims every three minutes, according to studies from the nonprofit research firm Identity Theft Resource Center.

People who have more than 20 online accounts and are very active on the Internet are more likely to reuse passwords, which makes them 37 percent more likely to have their accounts compromised, according to another Javelin Strategy and Research report released this month.

Miliefsky said there are three things you can do to stave off basic hacking attempts. First, delete apps you don’t use and clean up ones you do use. Second, when shopping from your smartphone at a mall or other public location, turn off all wireless networks except for mobile data. Third, use credit cards instead of debit cards.

“Try to avoid using a debit card that has direct access to your checking account. Always use credit cards when you can,” because credit cards are insured against fraudulent charges, said Adam Kujawa, head of malware intel at Malwarebytes.

When it comes to app and network controls, many people are unaware of how to take basic precautions, Miliefsky said. One of the most popular flashlight apps for Android and iPhones, Brightest Flashlight, was secretly recording and sharing users’ device ID and location information. The app maker eventually settled charges brought against it by the US Federal Trade Commission. Checking an app’s origins through the Apple App Store or Google Play can go a long way to avoiding headaches.

The same goes for at-home Web browsing. Make sure you’ve disabled add-ons and plug-ins before shopping. This lowers the risk of unauthorized access to your shopping habits and credit card details.

Unauthorized network access is another risk users can take simple steps to reduce when shopping. “Turn off Bluetooth and Wi-Fi when you’re in stores to keep the

Read full article on CNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...