How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from the hit movie “Frozen” through an online seller is a real shopping risk, too.

It may seem that protecting yourself from hackers is impossible, given that it’s been a banner year for identity theft. In 2014, hackers stole tens of millions of email addresses and credit card numbers from US retailer Home Depot and bank JPMorgan and got into Apple’s iCloud service through a password breach, which exposed explicit, personal photos from around two dozen celebrities including actress Jennifer Lawrence.
Fortunately, there are simple steps you can take to protect yourself that don’t require expertise in network penetration technology, said Gary Miliefsky, the founder and CEO of spyware blocker SnoopWall, who has decades of experience in online protection.

But first, a reality check. “Assume you’re already compromised,” Miliefsky said.

That’s because the more we shop online, the more we put ourselves at risk — whether using smartphones or home computers. Online fraud has almost tripled in the past year, according to the 2014 annual online fraud report from Javelin Strategy and Research. There are 60 new identity theft victims every three minutes, according to studies from the nonprofit research firm Identity Theft Resource Center.

People who have more than 20 online accounts and are very active on the Internet are more likely to reuse passwords, which makes them 37 percent more likely to have their accounts compromised, according to another Javelin Strategy and Research report released this month.

Miliefsky said there are three things you can do to stave off basic hacking attempts. First, delete apps you don’t use and clean up ones you do use. Second, when shopping from your smartphone at a mall or other public location, turn off all wireless networks except for mobile data. Third, use credit cards instead of debit cards.

“Try to avoid using a debit card that has direct access to your checking account. Always use credit cards when you can,” because credit cards are insured against fraudulent charges, said Adam Kujawa, head of malware intel at Malwarebytes.

When it comes to app and network controls, many people are unaware of how to take basic precautions, Miliefsky said. One of the most popular flashlight apps for Android and iPhones, Brightest Flashlight, was secretly recording and sharing users’ device ID and location information. The app maker eventually settled charges brought against it by the US Federal Trade Commission. Checking an app’s origins through the Apple App Store or Google Play can go a long way to avoiding headaches.

The same goes for at-home Web browsing. Make sure you’ve disabled add-ons and plug-ins before shopping. This lowers the risk of unauthorized access to your shopping habits and credit card details.

Unauthorized network access is another risk users can take simple steps to reduce when shopping. “Turn off Bluetooth and Wi-Fi when you’re in stores to keep the

Read full article on CNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...