How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from the hit movie “Frozen” through an online seller is a real shopping risk, too.

It may seem that protecting yourself from hackers is impossible, given that it’s been a banner year for identity theft. In 2014, hackers stole tens of millions of email addresses and credit card numbers from US retailer Home Depot and bank JPMorgan and got into Apple’s iCloud service through a password breach, which exposed explicit, personal photos from around two dozen celebrities including actress Jennifer Lawrence.
Fortunately, there are simple steps you can take to protect yourself that don’t require expertise in network penetration technology, said Gary Miliefsky, the founder and CEO of spyware blocker SnoopWall, who has decades of experience in online protection.

But first, a reality check. “Assume you’re already compromised,” Miliefsky said.

That’s because the more we shop online, the more we put ourselves at risk — whether using smartphones or home computers. Online fraud has almost tripled in the past year, according to the 2014 annual online fraud report from Javelin Strategy and Research. There are 60 new identity theft victims every three minutes, according to studies from the nonprofit research firm Identity Theft Resource Center.

People who have more than 20 online accounts and are very active on the Internet are more likely to reuse passwords, which makes them 37 percent more likely to have their accounts compromised, according to another Javelin Strategy and Research report released this month.

Miliefsky said there are three things you can do to stave off basic hacking attempts. First, delete apps you don’t use and clean up ones you do use. Second, when shopping from your smartphone at a mall or other public location, turn off all wireless networks except for mobile data. Third, use credit cards instead of debit cards.

“Try to avoid using a debit card that has direct access to your checking account. Always use credit cards when you can,” because credit cards are insured against fraudulent charges, said Adam Kujawa, head of malware intel at Malwarebytes.

When it comes to app and network controls, many people are unaware of how to take basic precautions, Miliefsky said. One of the most popular flashlight apps for Android and iPhones, Brightest Flashlight, was secretly recording and sharing users’ device ID and location information. The app maker eventually settled charges brought against it by the US Federal Trade Commission. Checking an app’s origins through the Apple App Store or Google Play can go a long way to avoiding headaches.

The same goes for at-home Web browsing. Make sure you’ve disabled add-ons and plug-ins before shopping. This lowers the risk of unauthorized access to your shopping habits and credit card details.

Unauthorized network access is another risk users can take simple steps to reduce when shopping. “Turn off Bluetooth and Wi-Fi when you’re in stores to keep the

Read full article on CNET

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...