|Find high paying job. It's quick! It's Free!!||Earn some quick money by spending just 5 minutes!!|
The comfort of an internet transaction — be it for transferring funds from a bank account, buying an air ticket or just ordering a bestseller — is matchless. But, as most of us know and recent spate of internet frauds reinforce, etransactions can be very risky. Data theft is a reality and will only increase with time. Today banks, for one, are definitely opting for more and more net transactions. Says internet guru Sagar, “In the US, banks never liked to deal with you physically because it was expensive. You could get a loan without anybody even seeing you. Though this was one of the reasons of the sub-prime crisis in the US, this trend is slowly picking up in India too.” While banks have mostly foolproof security systems in place, such as digital signatures and cryptic keys, hackers always manage to stay ahead of technology. There are always going to be programming errors in websites that allows the bad guys to know your password. And, they don’t limit themselves to just bank transactions.
How Hackers do it
Hackers have moved beyond phishing — where a bogus site or email masquerades as the original to make you part with sensitive information. These days, hackers prey on social networking sites, also known as “the weakest link” as far as data security is concerned. Personal information put up on these sites can be used to crack email id and then password. The other preferred hacker method involves the use of tickers that popup at various websites. If you click on a ticker, you may reach an innocent looking site which in turn may tempt you to download, say, a simple e-greeting card. This action may release an ‘.exe’ (self executable) file into your computer. It then keeps a track of all the keywords you type in, including usernames and passwords. These trojan programmes can also sneak into your system when you download music or movies at peer-topeer sites (where you share data between individuals). They simply collect your information and upload it to the hacker.
According to a study by InfoWave in February 2007, more than 785,000 people in 2006 were potentially victims of identity theft due to thousands of personal information leaks occurring at numerous large corporations. The most common reason for these information leaks: internal employees or process issues, not external hackers.
How to dodge Hackers?
- You must exercise restraint in the amount of personal information you upload on the web to minimise misuse. As a rule of thumb, DO NOT give / publish any personal information on the Internet.
- Always check whether a web address begins with ‘http’ or ‘https’ before executing any transaction, advises Sagar. ‘Https’ means a site is secure and the data you key in, travels to the final destination in an encrypted form. In other words, nobody can access it along the way. Also, ensure there is a ‘lock’ symbol at the bottom of the browser. Only then key in your user name.
- Never click on a link of a Bank (sent in emails / published on sites) as the chances of reaching an unknown, potentially phishing site, are higher. Always key in the site name.
- Ideally, delete all emails from an unknown source. If opening one out of curiosity, never give personal data. Banks will never ask for such information as they already have it.
- Don’t shop at an unknown shopping site even if it offers a dream deal. If still tempted, google the site’s security performance and whether there were any hacking attempts on it.
- Never leave transaction receipts at ATM machines, bank wickets, in trash cans, or at unattended gasoline pumps... Ensure that you DESTROY ANY paperwork you no longer need including transation receipts.