Skip to main content

Banking Tips: Safe Usage of ATM, Debit Card, Credit Card and Net Banking

An Unethical Hacker/Cracker/Cyber Criminal has many ways to gather a credit card number from an Victim. The most common one is known as phishing, Desktop Phishing, Tab Napping.


Ex: – www.paypala.com Instead of www.paypal.com or onlinesbl.com instead of onlinesbi.com or lcalab.com instead of icalab.com [Always check URL before login in any Online Bank account].


HOW A CRIMINAL USES PHISHING METHOD

  • In this technique, the hacker poses as an officer within an organization, let’s say Visa. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.


  • Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let’s say, Snap deal, ebay and search for the database where the retailer stores the information of all of the users who have made recent transactions.



  • The third way is through the online process of buying. Let’s say an adult finds a website with adult content that he or she finds attractive. It’s quite probable that the website is only a masquerade for acquiring credit card information from you.














TIPS TO STOP BANK OR CREDIT CARD FRAUD

There is some way to Protect your credit cards and bank accounts from the 
hackers:-

  • check URL before putting your password and important data” that your sharing your information with right organization or not .

Example if you’re going to do online banking or any online login at that time check your URL that your trying to login in Original website or fake Now You can easily find which one is fake website www.bankofindiaka.com or www.bankofindia.com.

  • Protect your Personal Identification Number (PIN) or secret code when using your card (at the ABM and at a merchant). Memorize your PIN. Do not write it down anywhere. Change your PIN regularly and do not choose one that is too obvious (e.g., your date of birth, address or part of your telephone number). Don’t share your PIN with anyone.



                                  


                                                          website: https://www.ica.in/
                                                          Helpline No: 9968600000
                                                          email: cyberarmy@ica.in

Comments

Popular posts from this blog

cybercrime case studies #1

FACEBOOK FAKE PROFILE CASES Facebook.com is a very popular online community and social networking website. Facebook users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Facebook members are publicly viewable. THE SCENARIOS ·           A   fake profile of a woman is created  on Facebook. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph. The problem is that the profile describes her as a prostitute or a woman of “loose character” who wants to have sexual relations with anyone. Other Facebook members see this profile and start calling her at all hours of the day asking for sexual favors. This leads to a lot of harassment for the victim and also defames her in society. ·     ...

India’s Perspective: Need of Ethical Hacker’s in India

The word hacker has always been associated with a negative meaning.  In actual “hacker’' is someone who can build stuff and solve real-life problems.   It’s essential to get highlighted with difference between a hacker and a cracke r ; a cracker is someone who is adept in security breaking whereas a hacker is someone expert in preventing such incidents. With the rapid spread out of cyber-crime it has become difficult for companies to protect their critical data and security systems from the external threats coming in from the web. These companies are unaware to cope with this crime or don’t have a cyber-incident response plan ready with them. Companies and start-up ventures in India are not exposed or rather vulnerable to cyber-attacks or crimes. They must be aware and need strong security measures to safeguard their business with safety plug-ins. ETHICAL HACKING An ethical hacking has becoming a valued skill in India.... For more click here.. ...

Shop Safely in this FestiveSeason

Online shopping: It is also known as e-shopping in which the purchases made online either by computers or SmartPhones. You can shop online with or without full authentication . E-shopping or online shopping or e-store are all virtual types of stores which allow customers to buy products or services over the internet. It is convenient for the people to shop online without spending their valuable time in markets. But There is risk in ordering things online as Information about user’s activity on the Web is being recorded and there will be privacy losses. Many users are not aware about it. Web users leave a “data shadow” with information about what they read, where they shop, what they buy, whom they correspond with and so on. Mantras to shop online safely: Before Placing An Order Carefully read the terms and conditions, including the small print. These terms and conditions should be available on the merchant’s website. Check t...