Thursday, September 14, 2006
Whats That Song Dun Dun Dun Dun
In the popular imagination, the Internet is often perceived as a place highly insecure to use credit cards . A true belief in half, you can still prevent a careful and cautious attitude.
It is thought the Internet as the main place of computer frauds based on the use of illegal credit cards. This statement, however, contains elements of great imprecision. First of all, under the law, you can not talk to computer fraud for the illegal use of credit cards. It is a crime in itself. While computer fraud fall under Article 640ter of the Criminal Code, the scams they see the misuse of credit cards stolen from legitimate owners fall under Article 12 of the special law 197/91.
Often, of course, the two articles help to define the offense, but in any case it is more correct to speak of fraud. In addition, the Internet is the place where the more you use credit cards - also acquired illegally - to complete the purchases. It is not the place where most it is easy to perpetrate identity theft.
The subtraction of the data
Among the techniques of removal of sensitive credit card, only two can be traced specifically to the Internet, while others refer to a traditional offline operations. All techniques, however, usually designed to steal sensitive data needed to complete the transaction: the cardholder name, card number, expiration date and security code (the three digits on the back of card).
subtraction techniques in an Internet
The methods used to gain possession on the Internet credit card data are mainly two. There are traditional ways of hacking, in which the bad guys get in the way in communications systems and steal data, and there are the most innovative techniques of phishing, a real fishing of the fish bite the bait thrown into the sea on the Web In the first case, fraudsters take advantage of advanced computer skills to enter the online database of sites that hold sensitive data, or to intercept communications between customers and sellers (or banks) copying sensitive data.
In the second case, the criminals create pitfalls of virtual users to get directly to their sensitive data. In more advanced phishing (and widespread in the recent times), he lets you believe to be contacted by your bank to renew the information available to the institution itself. Then takes the user on a site - a photocopy of the original in order to deceive him and make him commit the faux pas to report their data.
The traditional techniques
However, the incidence increased in cases of theft of data is provided by traditional techniques, which take place in the real world. In particular, in the case studies are cited as the box and trashing the most popular methods. The first is to intercept the bank-customer communication through the mail, in order to steal all the information necessary. Similarly, the trashing means actions to recover data from old receipts or statements, often thrown away by customers without the necessary care.
These documents, in fact, contain all the necessary information, and for this reason would be more prudent to burn or cut into pieces before throwing them in the garbage. Finally, a technique of appropriation often wrongly overlooked, is that of the direct theft of data through devices called skimmers. These devices capture information directly from the magnetic strip, and allow you to clone the card in every way - to create an actual copy.
web site consumption
On the Internet so do not steal data, but more often you use the stolen data. The absence of direct contact vendor-client facilitates the use of stolen data illegally. Instead, it is not so simple illegal possession of sensitive data, even for the great attention paid by companies to process them.
use credit cards over the Internet is no more dangerous way you use the bar or in a shopping mall. Much greater, however, is the use of stolen data unlawfully - in the real world. Often the general press, and the lover of sensationalism, kicking his hand on insecurity of transactions over the Internet with a credit card. But the danger รจ potenzialmente ovunque. [fonte shinynews ]
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment