7 Tips for safe online transaction

Today I am going to provide you 7 tips for safe online transaction.

Day by day our life is becoming easier and easier with the raise of internet and other technology. Now days, many of us prefer online shopping over traditional shopping. This is why online shopping is became a hit in the country.

7 Tips for safe online transaction
7 Tips for safe online transaction

The growing fetish for online shopping is now proven by the ecommerce giants like Flipkart and Amazon by their high volume sales figure.

With the growing technologies and internet, we are not only habituated with online shopping, but also with other online transaction like online banking, bill payment, ticket booking etc.. At one hand it makes our life easier and on the other it made us vulnerable to hackers. The biggest example in the recent time is the banking system hack, which affected top banks like SBI, HDFC, ICICI, Axis Bank etc. So this is the time to know how hackers work and prevent ourselves from being hacked and do safe online transaction.

Here I am going to provide you few tips for safe online transaction and how hackers using to steal your information.

  1. Phishing – In this technique, hacker used to make a website or web page which looks exactly like the original website and provide you the link to it via email or other social networking technique. People take it as the original website and try to transact with it by providing their username, password, debit card or credit card information.

    Once you provide your personal information, it sends the details to hacker and then closes the page by showing some kind of error. Now the hackers have information they wanted.

    Prevention from Phishing – You should always go to the website by directly typing its URL (address) manually or if you go through any link always check out the URL of the website where you are transacting before any kind of transaction for safe online transaction. If you believe something suspicious in the URL, close it and type fresh URL on the address bar. Do not ever trust the looks.

  2. Farming – Hacker used this technique to modify your routers configuration and change the DNS setting so that when a user type the actual intended website’s address on the address bar, it will open the phishing website which will look similar to original one. You won’t even notice any change in the address bar as you typed the address of original website. Now onwards, it will work just exactly like phishing attack as mentioned on the previous point.

    In this technique, hackers will send you a link via email or other social network which may look exactly like from the original sender. Once you open the link, a malicious script will try to login to your router by combination of different username and password automatically. Once they succeed in opening your routers configuration, they will change routers DNS configuration so that when you open the original intended website, it will redirect to their phishing website.

    Prevention from Farming – Almost all routers now comes with common username and password. You should always change the default username and password of your router whenever you install any which will help you on safe online transaction.

  3. Vishing – This is also called Voice Phishing, in this kind of attack, the hackers generally targets bank customers. In this technique, hackers will call you by claiming themselves as banks representative and lures you to provide them your personal details like Debit Card/Credit Card number, Customer ID, Password, ATM Number, ATM Pin, OTP, CVV etc. by creating sense of urgency in your mind. Once you provide the information, hackers will use those information for fraudulent activity.

    Prevention from Vishing – You should always remember that Bank never ask such thing over phone or call. If you think this is a genuine case, contact your bank before providing any information. If you suspect that you compromised yourself, contact your bank immediately and change the details as early as possible.

  4. Keystroke Logger – This comes in both software and hardware variant. The software variant comes with infected software or came to you intentionally using social networking or email. Once you click the link, it downloads to your computer unintentionally. Whether it downloaded unintentionally or comes with infected software, it installs itself silently on computer without your knowledge and sends the hacker whatever you type.

    The hardware variant is different and can be identified if you check the computer thoroughly which you are going to use, you can find it. It may come with PS2 or USB port and can be attached at the available port on your computer.

    Prevention from Keystroke Logger – Always use updated antivirus on your system which you use regularly for online transaction. Never click on any link which you do not recognize. If you are in urgent and need to use public computer, make sure the system is properly protected with updated antivirus and check the available ports to identify if any suspicious object attached to it.

  5. Malware / Virus – Hackers use these tools to damage your computer or take control of it. Virus and malwares comes with infected software or infected web page and website. Once Virus and malware infect your system, hackers collected sensitive and personal information for fraudulent activity.

    Prevention from Malware / Virus – Always use updated antivirus on your computer system and mobile phone in which you use your online transaction. Never click on unwanted link or install any unknown software on your computer or mobile.

  6. Sim Swap – Hackers used to get new sim with your number by contacting your mobile network service provider with fake id. Once they get your number, they can access your mobile banking as now a days most of the bank providing mobile banking with your phone number. They can get OTP and anything which is related to you with your mobile number.

    Prevention from Sim Swap – To prevent such kind of mobile number theft, always contact your mobile operator if you do not receive any call or SMS for extended period or if you think there is no service. If you receive any SMS from your mobile operator for probable SIM swap, immediately contact them. Register for instant alert on both your mobile number and email in case of any activity on your account.

  7. Unsafe Apps – As the use of mobile is increasing, this kind of threat is imminent. We tend to use lot of apps on our phone. An unsafe app can gain access to your personal information stored on your phone and send it to hackers for fraudulent activity.

    Prevention from Unsafe Apps – Never install any app from unknown source or authority. Only install apps if you know the source is good enough.

Last but not least, if you believe that your personal data is compromised in any way, change those data immediately without any delay. Always prevent yourself from getting into the trap of hackers and do safe transaction.

Leave a Comment