Thursday, October 29, 2015

The attack on online stores – Interia

Do you Shop Online we use is safe?

/ © 123RF / Picsel

The War of the network is a reality and that the most cybertarczą blasting in the world is the United States. What do they do to protect themselves against threats to the network? Read more

Infected stores distribute viruses that capture payments and data to the user login. It is the third largest wave of attacks using the exploit kit (exactly explain this term at the bottom of the material), detected by the G DATA experts this year. Worse, they are still continuing. Experts have noticed, starting from 17 October marked increase in the number of attacks exploit kit hindered by antivirus software.

How malware penetrates to-hand shops?

Cybercriminals are shops that have not updated the software exploiting vulnerabilities in the system. Therefore, users of Internet platforms based on Magento, should immediately update the software to the latest version.

What is an exploit kit?

Exploit Kit is a tool containing data or executable code that can exploit one or more vulnerabilities in software running on a local computer or remote. When a user visits the page the victim in this case are stores using the Magento platform, the exploit kit scans the system, looking for vulnerabilities in applications, browser, or operating system. It then uses a vulnerability discovered and secretly introduces an additional code malware to the victim’s computer.

Malicious software, known as exploits are among the most popular tools used by cybercriminals. Malware is most often distributed through websites. Unfortunately, their owners are usually unaware that they were victims of a cyber attack.

What should be considered when making purchases on the Internet? The following tips:

Tip 1: Protect your computer

Never buy over the Internet through a computer that does not have basic protection in the form of a firewall, updated anti-virus scanner, and a fully patched operating system. This is the bare minimum not always stop data thieves (who may use e-mail), because security software should also monitor all digital messages. Without such protection, malware can silently install itself on your computer and open the rear door. This in turn will enable a hacker to take complete control of the Personal Computer, and then … all of the other tips outlined here will be useless.

Tip 2: Beware of occasions

Online shopping offer not only convenience, but also the not inconsiderable save money. With news services comparing prices user quickly find the best price, saving you time and effort of running after the next stores. However, one should be careful: after an online store only has a virtual exhibition. This means that issues such as price, delivery and quality of the goods guarantees and potential customers must rely on information provided by retailers. But the biggest trick is cautious when will we have a real bargain. If, for example, you spot a new iPod at a price of 100 zł, you should be suspicious and carefully study the offer.

Tip 3: Expose fake websites

How can I tell if spotted an opportunity not only lure? Contrary to appearances, it’s simple. Remember that hackers often create fake websites and using different tricks, mostly by copying the look trustworthy sites, not trying to lure potential customers to capture their login details. Therefore, to verify the authenticity of the site you visit, always carefully check the address in your browser. And one more thing: well think about before you enter your data.

When you buy something online stores, always check whether or not administered by a contact phone number and address is real. If at the store there are annoying pop-ups, in which you need to immediately enter information about your credit card, you can be sure that it is a theft. Serious stores publish information about the company and contact information. Typically, also they put in a prominent place conditions for conducting transactions. Take some time to read the privacy policy and pay attention that the page has safety certificates.

Tip 4: Personal Information – protect them

Purchases via the internet involve the payment and administration of the delivery address. This in turn would mean that our personal data. Remember, though, that we need not give such information “from above”. Many fraudulent websites trying to extort various information before the customer be familiar with the product. Stores that use such practices are not trustworthy and should be simply avoided. You should also read the information in lowercase, to then not turned out that acceptance of the terms of service you consent to sell our information to third parties.

Tip 5: Buy only on encrypted pages

While shopping online watch that nobody looked over your shoulder. In the end, no one except you should not be interested in the details of your credit card. That is why encryption is an essential safeguard in online stores. Determining whether a site is encrypted, it is very easy – just see if at the beginning of the website address is shown with “https” instead of “http”.

In addition to an encrypted page the browser will display a small symbol of a key or padlock and the address bar can change color. Before you make any confidential information on the website, calmly look at its safety certificate. Also remember that trustworthy parties usually offer a variety of payment options, most popular of which is a credit card, debit card and a fast, direct payments through different banks. If someone demands payment in advance and it is the only option, use it can be risky.

Tip # 6: Payment card-only online shopping

: Members who wish to exercise maximum caution when using online stores, can create additional difficulties for cybercriminals. Try to get an additional payment card and use it only for online purchases. If the data on the card fall into the wrong hands, this strategy will allow you to limit the damage.

Tip 7: Create a secure password

Even the best access security turns out to be useless if hackers can easily get around by typing a password like “123456 ”. Just as quickly you can break the password in popular combinations of children’s names and dates of birth. To access the login information for online stores, cybercriminals often carry out so-called. “dictionary attacks.” To guard against such attacks, you should create a secure password for each Internet service. In this case also they are special tools to manage passwords. If you do not have such a program, follow the following rule: never use the slogans of words that can be found in a dictionary. A secure password consists of a combination of letters, numbers and characters special and has at least 8 characters. It should exert to invent such a code for another reason – it’s a good exercise for the mind.

Tip 8: Collect receipts

If you do not want in your house piled up a mountain of paperwork, always save receipts of purchases online on your computer. In this way, all purchasing documents are gathered in one place, and you’ll be able at any time to get to them fast access. Keep copies of order confirmations and invoices.

Tip 9: Do not hesitate to use the returns policy

Online shops offer the possibility of returning goods purchased. This means that you can quickly check the product obtained, and within 10 days to return it without giving any reason.

LikeTweet

No comments:

Post a Comment