Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
How to Safely Shop Online
Message
<blockquote data-quote="Jack" data-source="post: 158" data-attributes="member: 1"><p><strong>Guide : Shopping Safely Online</strong></p><p></p><p><strong><span style="color: #FF0000">Why do online shoppers have to take special precautions?</span></strong></p><p></p><p>The internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else.</p><p></p><p><span style="color: #FF0000"><strong>How do attackers target online shoppers?</strong></span></p><p></p><p>There are three common ways that attackers can take advantage of online shoppers:</p><p></p><ul> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Targeting vulnerable computers</span></strong> - If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases.<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Creating fraudulent sites and email messages</span></strong> - Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites that appear to be legitimate or email messages that appear to have been sent from a legitimate source. Charities may also be misrepresented in this way, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information.<br /> <br /> </li> <li data-xf-list-type="ul"><span style="color: #0040FF"><strong>Intercepting insecure transactions</strong></span> - If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted.</li> </ul><p></p><p><strong><span style="color: #FF0000">How can you protect yourself?</span></strong></p><p></p><ul> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Use and maintain anti-virus software, a firewall, and anti-spyware software</span> </strong>- Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. Make sure to keep your virus definitions up to date. <br /> If you want a second opinion on the security solution you use ,we invite you to start a topic in <a href="http://malwaretips.com/viewforum.php?f=9" target="_blank">"Security Configuration Wizard" Section</a><br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Keep software, particularly your web browser, up to date</span></strong> - Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it.<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Evaluate your software's settings</span></strong> - The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is especially important to check the settings for software that connects to the internet (browsers, email clients, etc.). Apply the highest level of security available that still gives you the functionality you need.<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Do business with reputable vendors</span></strong> - Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor.<br /> Get the sellerâs landline phone number and postal address. Remember, you will be sharing your credit card number, your name and possibly your address and phone number. <br /> Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information . Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the "issued to" information. <br /> We recommend the use of a site advisor: <a href="http://www.mywot.com/en/download" target="_blank">Web of Trust</a> and <a href="https://safeweb.norton.com/" target="_blank">Norton Safe Web</a> are our top choices<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">You should never be asked to tell anyone your cardâs PIN number</span></strong> â even if they claim to be from your bank or the police and never use your Social Security Number or PIN as a password. Treat online marketers as you would telephone marketers or anyone else you donât know. If the deal sounds too good to be true, it probably is, so pass it up. <br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Only provide your payment card number when you are making a purchase</span></strong> and if you have initiated the negotiation and review your statement immediately and thoroughly. Whether you get your statement by postal mail or online, review each transaction carefully to make sure there are none that you did not make and keep records of what you order.<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Take advantage of security feature</span></strong>s - Passwords and other security features add layers of protection if used appropriately <br /> Be wary of emails requesting information - Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email, and use caution when clicking on links in email messages<br /> <br /> </li> <li data-xf-list-type="ul"><span style="color: #0040FF"><strong>Check privacy policies</strong></span> - Before providing personal or financial information, check the website's privacy policy. Make sure you understand how your information will be stored and used (see Protecting Your Privacy for more information).<br /> <br /> <strong><span style="color: #0040FF">Make sure your information is being encrypted</span></strong> - Many sites use SSL, or secure sockets layer, to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. The location of the icon varies by browser; for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser.<br /> <br /> </li> <li data-xf-list-type="ul"><span style="color: #0040FF"><strong>Use a credit card</strong></span> - There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection for your debit card. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can further minimize damage by using a single credit card with a low credit line for all of your online purchases.<br /> <br /> </li> <li data-xf-list-type="ul"><strong><span style="color: #0040FF">Check your statements</span></strong> - Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately.</li> </ul><p></p><p><a href="http://www.us-cert.gov/index.html" target="_blank">US-CERT</a></p></blockquote><p></p>
[QUOTE="Jack, post: 158, member: 1"] [b]Guide : Shopping Safely Online[/b] [b][color=#FF0000]Why do online shoppers have to take special precautions?[/color][/b] The internet offers a convenience that is not available from any other shopping outlet. From the comfort of your home, you can search for items from countless vendors, compare prices with a few simple mouse clicks, and make purchases without waiting in line. However, the internet is also convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers. Attackers who are able to obtain this information may use it for their own financial gain, either by making purchases themselves or by selling the information to someone else. [color=#FF0000][b]How do attackers target online shoppers?[/b][/color] There are three common ways that attackers can take advantage of online shoppers: [list] [*][b][color=#0040FF]Targeting vulnerable computers[/color][/b] - If you do not take steps to protect your computer from viruses or other malicious code, an attacker may be able to gain access to your computer and all of the information on it. It is also important for vendors to protect their computers to prevent attackers from accessing customer databases. [*][b][color=#0040FF]Creating fraudulent sites and email messages[/color][/b] - Unlike traditional shopping, where you know that a store is actually the store it claims to be, attackers can create malicious websites that appear to be legitimate or email messages that appear to have been sent from a legitimate source. Charities may also be misrepresented in this way, especially after natural disasters or during holiday seasons. Attackers create these malicious sites and email messages to try to convince you to supply personal and financial information. [*][color=#0040FF][b]Intercepting insecure transactions[/b][/color] - If a vendor does not use encryption, an attacker may be able to intercept your information as it is being transmitted.[/list] [b][color=#FF0000]How can you protect yourself?[/color][/b] [list][*][b][color=#0040FF]Use and maintain anti-virus software, a firewall, and anti-spyware software[/color] [/b]- Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. Make sure to keep your virus definitions up to date. If you want a second opinion on the security solution you use ,we invite you to start a topic in [url=http://malwaretips.com/viewforum.php?f=9]"Security Configuration Wizard" Section[/url] [*][b][color=#0040FF]Keep software, particularly your web browser, up to date[/color][/b] - Install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it. [*][b][color=#0040FF]Evaluate your software's settings[/color][/b] - The default settings of most software enable all available functionality. However, attackers may be able to take advantage of this functionality to access your computer. It is especially important to check the settings for software that connects to the internet (browsers, email clients, etc.). Apply the highest level of security available that still gives you the functionality you need. [*][b][color=#0040FF]Do business with reputable vendors[/color][/b] - Before providing any personal or financial information, make sure that you are interacting with a reputable, established vendor. Get the sellerâs landline phone number and postal address. Remember, you will be sharing your credit card number, your name and possibly your address and phone number. Some attackers may try to trick you by creating malicious websites that appear to be legitimate, so you should verify the legitimacy before supplying any information . Attackers may obtain a site certificate for a malicious website to appear more authentic, so review the certificate information, particularly the "issued to" information. We recommend the use of a site advisor: [url=http://www.mywot.com/en/download]Web of Trust[/url] and [url=https://safeweb.norton.com/]Norton Safe Web[/url] are our top choices [*][b][color=#0040FF]You should never be asked to tell anyone your cardâs PIN number[/color][/b] â even if they claim to be from your bank or the police and never use your Social Security Number or PIN as a password. Treat online marketers as you would telephone marketers or anyone else you donât know. If the deal sounds too good to be true, it probably is, so pass it up. [*][b][color=#0040FF]Only provide your payment card number when you are making a purchase[/color][/b] and if you have initiated the negotiation and review your statement immediately and thoroughly. Whether you get your statement by postal mail or online, review each transaction carefully to make sure there are none that you did not make and keep records of what you order. [*][b][color=#0040FF]Take advantage of security feature[/color][/b]s - Passwords and other security features add layers of protection if used appropriately Be wary of emails requesting information - Attackers may attempt to gather information by sending emails requesting that you confirm purchase or account information Legitimate businesses will not solicit this type of information through email. Do not provide sensitive information through email, and use caution when clicking on links in email messages [*][color=#0040FF][b]Check privacy policies[/b][/color] - Before providing personal or financial information, check the website's privacy policy. Make sure you understand how your information will be stored and used (see Protecting Your Privacy for more information). [b][color=#0040FF]Make sure your information is being encrypted[/color][/b] - Many sites use SSL, or secure sockets layer, to encrypt information. Indications that your information will be encrypted include a URL that begins with "https:" instead of "http:" and a padlock icon. If the padlock is closed, the information is encrypted. The location of the icon varies by browser; for example, it may be to the right of the address bar or at the bottom of the window. Some attackers try to trick users by adding a fake padlock icon, so make sure that the icon is in the appropriate location for your browser. [*][color=#0040FF][b]Use a credit card[/b][/color] - There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection for your debit card. Additionally, because a debit card draws money directly from your bank account, unauthorized charges could leave you with insufficient funds to pay other bills. You can further minimize damage by using a single credit card with a low credit line for all of your online purchases. [*][b][color=#0040FF]Check your statements[/color][/b] - Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately.[/list] [url=http://www.us-cert.gov/index.html]US-CERT[/url] [/QUOTE]
Insert quotes…
Verification
Post reply
Top