Thursday August 25th 2011@11:04pm ( interesting article concerning credit card theft)













5 ways thieves steal your credit


Personal data can be stolen in seconds, but knowing how it most often happens can help you protect yourself or, if you’re a victim, minimize the damage.







Image: Woman surprised © Purestock, SuperStock


Almost gone are the days of the good old-fashioned purse snatcher. With less brute force and more skill, thieves need only a minute, sometimes less, to pilfer your credit card data.


“Back in the beginning, they got the imprint of credit cards from the carbon copies they dug out of the trash,” says William Noonan, assistant special agent in charge of the Secret Service’s criminal investigative division. “Technology has changed things.”


The number of compromised records has been on the decline for the past two years, according to the Secret Service, after reaching a record high of 361 million records in 2008. The trend might reverse this year, however, after a recent string of misdeeds.


This spring, criminals hacked, phished or skimmed their way into the systems of Michaels Stores, Sony, marketing firm Epsilon, Citibank and even security expert RSA, among others. In some cases, they obtained only names and emails. In the worst cases, they got credit card numbers.





The schemes are simpler than you think. Here are the most common ways thieves pilfer your credit card information.


Suspects: The toy store trio


Modus operandi: Sally, Simon and Bud walk into a toy store. Sally and Simon roam the aisles, while Bud waits in line to check out. When Bud is at the register, Simon comes running up to the clerk, screaming that his wife has fainted. As Sally and Simon distract the salesclerk, Bud switches the credit card reader at the register with a modified one of his own, says FICO’s fraud chief, Mike Urban. For the next week, the salesclerk unwittingly collects credit card data on the modified reader until the trio returns, takes back the modified reader and restores the original terminal.


Known whereabouts: The trio will hit other retailers and restaurants, but sometimes the threesome will instead be a twosome or a solo criminal.







Using credit card texts to fight ID theft



27CDB6E-AE6D-11cf-96B8-444553540000 width=310 height=223>



27CDB6E-AE6D-11cf-96B8-444553540000 width=300 height=60>





27CDB6E-AE6D-11cf-96B8-444553540000 width=310 height=150>


27CDB6E-AE6D-11cf-96B8-444553540000 width=1 height=1>


Suspect: The waitress at the diner


Modus operandi: The waitress whisks away your credit card and swipes it through the restaurant’s register. Then she pulls a small device — about the size of an ice cube — from her apron and swipes it through that, says Sgt. David Schultz of the Fort Bend County Sheriff’s Office in Texas. While you’re scraping the last of the chocolate frosting from your plate, your credit card information has been stored in the device, known as a skimmer. The waitress returns your card and performs the same magic trick on dozens of credit cards in a week.


Known whereabouts: The data-stealing waitress has been known to moonlight as a bartender, salesclerk or at any other job that allows her to take your credit card out of sight.


Suspect: The Gas Lass


Modus operandi: The Gas Lass parks her car in front of a gasoline station off the turnpike. It’s late. There’s no one around except a sleepy attendant at the register inside. The Gas Lass attaches a skimmer over the credit card reader at the pump. It’s a special skimmer: It emits a Bluetooth signal to a laptop close by, says Noonan. The Gas Lass pays, heads off to the motel next door and sets up her laptop to receive the data from the compromised pump over the next several days.


Known whereabouts: The Gas Lass installs skimmers over ATMs, parking meters, vending machines and other places with unmanned credit card readers.


Suspects: Harry the Hacker and Phishing Phil


Modus operandi: Harry the Hacker installs malware — a type of software that damages or infiltrates a computer or network — onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.


Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke, including passwords to your financial accounts.


Suspects: The rest of the criminal crew


Modus operandi: So what happens to these pieces of data when they’re in no-good hands? They get sold.


The waitress, trio or Gas Lass sells each swipe for $20 to $40, says Urban. Harry the Hacker and Phishing Phil will get $5 to $10 a card and may sell the information online. The person who buys the information verifies it and then sells it to a person who creates fraudulent credit cards with victims’ account information attached to them. The card-maker then sells cards to other criminals who buy goods, such as stereos or baby formula, and sell them to regular consumers.






Click here to become a fan of MSN Money on Facebook



What you can do



  1. Set up mobile alerts for your phone if your financial institution provides the feature. That way, you can be aware of unusual activity as quickly as possible.

  2. Regularly monitor your accounts online, so you can identify fraudulent transactions faster, says Schultz.

  3. Avoid public computers. Don’t log on to your email if your bank corresponds with you there. Urban suggests setting up an email account just for your finances and checking it from safe locations.

  4. Avoid doing business with unfamiliar online vendors, Noonan says. Stick to established merchants and websites.

  5. If your information has been compromised, notify your financial institutions and local law enforcement, which will contact the Secret Service if necessary. Also notify any of the three major credit reporting agencies — Experian, Equifax and TransUnion — to set up a fraud alert on your credit reports.

This article was reported by Janna Herron for Bankrate.com.






 











 







avatar







avatar


To: Sheldon Hyman Re “The technology is there.  Why not have your picture imbedded on your credit card stripe…”  That’s a great idea!  And, it would be better if: when the card is scanned, the card calls for the cashier to proceed “asking for the picture ID and a security pass code (which was previously assigned and choose by the card-holder).”  So, if is not properly enter on the key pad, the transaction would be cancel!!!  Or something similar… like when someone is purchasing wine or any alcoholic beverage… the cash-register is now asking for ID!       


 




ago






I am not advocating one bank over another, but, BofA has a feature called ShopSafe, if you have a Visa credit card. This applies to online purchases. Say you want to buy a coat from XYZ company for $150.24. They want your credit card name, number, exp. date and ID code. You go into your account site, bring up you credit card history. You click onto Services and ”launch” ShopSafe. This pop up allows you to create a customized credit card number just for that transaction of $150.24. The min time the card is good for is 2 mos., although, you can choose any time period more than that. So if your Visa card has a max borrowing amnt of $12,000, say,


you are only on the hook (potentially) for $150.24. That is very good protection, plus, if you make two consecutive mistakes trying to bring up your acct (two separate passwords are required), your acct is frozen until you call the bank and give a reasonable explanation why you made the two mistakes!








  • I was skimmed at my local restaurant. There were three employees in on it that we could determine. When I tried to report it to the local police they wouldn’t even take the report. Putting a review online was my only option. The bank did reverse the charges though – an $800 phone account in Spain.




I’d most be worried about the criminals with the scanning devices. When they get close enough to your purse or wallet, they can extract your credit card info in seconds. I read that wrapping you wallet with a sheet of tin foil prevents this device from working. They also makes wallets now that block card reader transmitters as well.