SECURE YOUR BANK DETAILS FROM BEING HACKED
- Get link
- Other Apps
To secure online purchases, there is a smart card with dynamic CVV (Card Verification Value, the three digits on the back of the card). A small electronic ink display screen, like the e-readers, is placed in the same location as the static CVV.
A specific chip and a battery inserted in the card make it possible to manage the change of CVV every hour, in total independence from the card chip. At the same time, the issuing banks will be able to delegate or install servers operating with the same algorithm at their premises and thus making it possible to verify that the card is indeed in the possession of its owner at the time of purchase on the internet. A new way to fight against fraud.Is It Really Effective?
Let's go back to the main means of credit card fraud.
1. THEFT
OR PHYSICAL LOSS OF THE BANK CARD
Example:
Has your bank card stolen or misplaced ever happened to you?
You are lucky. Between the professionals of the chip on the lookout for the
slightest inattention and the dizzy like me who have a lot of trouble staying
focused on what they are doing if they have too many requests to deal with at
the same time, it is all right same current that we can no longer find his so
precious CB. Horror! Danger! End of the world! We say to ourselves if it
happens to us.
The risk:
It is clear that the new owner of a lost or stolen bank card
has very little time to act. He can quickly shop on the Internet with this
dishonest purse, or can also resell this ultra-fresh card on the DarkNet for
similar fraudulent use.
To protect himself:
In anticipation, you can scratch the cryptogram
2 COPY TO
DISTRIBUTOR SOL. TRUST A DISCREET PERSON
Example:
You are going to withdraw money from an ATM (isolated most of
the time) and watch out for prying eyes and disturbing characters that may lurk
around. The danger can come from where it is not expected. Indeed, professional
hackers can disguise your bank's ATM with a device recording the magnetic strip
of your card when you enter it (skimmer) and recording your card code either by
the keypad (trapped) or by a discreet camera capturing your code by filming it
over the keyboard.
The risk:
The hacker acting in this way will be able, from reading the
magnetic strip, to reproduce your bank card and with the code that he has
discreetly stolen from you, to reproduce a clone of your card. As the information
captured is digital, it can be sold or sent around the world.
To
protect himself:
Make a habit of going to a well-known cash machine.
3 THEFT
FROM TRADERS
Example:
It has been dismantled on several occasions in France of
networks of cybercriminals hiring in bars or cafes servers equipped with
portable devices allowing the copying of the magnetic strip of the bank card.
Since they have the credit card in hand, they can also copy the cryptogram and
discreetly see you type in your code.
The risk:
It is clear that the new owner of a bank card whose magnetic
strip has been stolen without the real owner knowing it, has plenty of time to
act. As the information captured is digital, it can be sold or sent around the
world.
To protect himself:
Never part with your card except to pay and when you have them
in front of you (the card and the server).
4 THEFT OF COORDINATES BY NFC
Example:
The technique of stealing your bank details by NFC consists of
using a portable, remote and autonomous NFC card reader and walking in places
where the density of passers-by is very high (for example in the metro). The
autonomous device, which can easily be camouflaged in a backpack, will detect
the CBs within its detection range, will record the data emitted by the CBs
responding to NFC commands sent by the hacker's tool.
The risk:
It is clear that the new owner of a bank card whose magnetic
strip has been stolen without the real owner knowing it, has plenty of time to
act. As the information captured is digital, it can be sold or sent around the
world.
To protect himself:
Protect your bank card in a box or a metal box (the protective
pouch of Telepeage boxes can also do the trick).
5 COMPUTER
HACKING
Example:
Because it is so much easier to write down the details of your
bank card in a file in a computer rather than trying to remember it, this ultra-sensitive
information, if it does not benefit from special care , will not resist the professional
curiosity of hackers.
The Technique
Scan hard drives for anything that looks like 16 digits.
The way to protect
Use strong encryption to secure banking and sensitive
information and using antivirus
software is the better and best option.
- Get link
- Other Apps
Comments
Post a Comment