Today I am going to provide you 7 tips for a safe online transaction.
Day by day our life is becoming easier and easier with the rise of the internet and other technology. Nowadays, many of us prefer online shopping over traditional shopping. This is why online shopping is becoming a hit in the country.
The growing fetish for online shopping is now proven by the e-commerce giants like Flipkart and Amazon by their high volume sales figure.
With the growing technologies and internet, we are not only habituated with online shopping but also with other online transaction like online banking, bill payment, ticket booking etc.. On one hand it makes our life easier and on the other, it made us vulnerable to hackers. The biggest example in the recent time is the banking system hack, which affected top banks like SBI, HDFC, ICICI, Axis Bank etc. So this is the time to know how hackers work and prevent ourselves from being hacked and do the safe online transaction.
Here I am going to provide you with few tips for the safe online transaction and how hackers using to steal your information.
In this technique, hackers used to make a website or web page which looks exactly like the original website and provide you the link to it via email or other social networking technique. People take it as the original website and try to transact with it by providing their username, password, debit card or credit card information.
Once you provide your personal information, it sends the details to hacker and then closes the page by showing some kind of error. Now the hackers have the information they wanted.
You should always go to the website by directly typing its URL (address) manually or if you go through any link always check out the URL of the website where you are transacting before any kind of transaction for a safe online transaction. If you believe something suspicious in the URL, close it and type fresh URL in the address bar. Do not ever trust the looks.
Hacker used this technique to modify your router’s configuration and change the DNS setting so that when a user types the actual intended website’s address on the address bar, it will open the phishing website which will look similar to original one. You won’t even notice any change in the address bar as you typed the address of an original website. Now onwards, it will work just exactly like phishing attack as mentioned on the previous point.
In this technique, hackers will send you a link via email or via any social networking website/app which may look exactly like from the original sender. Once you open the link, a malicious script will try to login to your router by a combination of different username and password automatically. Once they succeed in opening your router’s configuration, they will change routers DNS configuration so that when you open the originally intended website, it will redirect to their phishing website.
Almost all routers now come with common username and password. You should always change the default username and password of your router whenever you install any which will help you in a safe online transaction.
This is also called Voice Phishing, in this kind of attack, the hackers generally target bank customers. In this technique, hackers will call you by claiming themselves as banks representative and lures you to provide them your personal details like Debit Card/Credit Card number, Customer ID, Password, ATM Number, ATM Pin, OTP, CVV etc. by creating the sense of urgency in your mind. Once you provide the information, hackers will use that information for fraudulent activity.
You should always remember that Bank never asks such a thing over the phone or call. If you think this is a genuine case, contact your bank before providing any information. If you suspect that you compromised yourself, contact your bank immediately and change the details as early as possible.
4. Keystroke Logger
This comes in both software and hardware variant. The software variant comes with infected software or came to you intentionally using social networking or email. Once you click the link, it downloads to your computer unintentionally. Whether it downloaded unintentionally or comes with infected software, it installs itself silently on the computer without your knowledge and sends the hacker whatever you type.
The hardware variant is different and can be identified if you check the computer thoroughly which you are going to use, you can find it. It may come with PS2 or USB port and can be attached to the available port on your computer.
Always use updated antivirus on your system which you use regularly for online transaction. Never click on any link which you do not recognize. If you are in urgent and need to use a public computer, make sure the system is properly protected with updated antivirus and check the available ports to identify if any suspicious object attached to it.
5. Malware / Viru
Hackers use these tools to damage your computer or take control of it. Virus and malware come with infected software or infected web page and website. Once Virus and malware infect your system, hackers collected sensitive and personal information for fraudulent activity.
Always use updated antivirus on your computer system and mobile phone in which you use your online transaction. Never click on an unwanted link or install any unknown software on your computer or mobile.
6. Sim Swap
Hackers used to get the new sim with your number by contacting your mobile network service provider with a fake id. Once they get your number, they can access your mobile banking as nowadays most of the bank providing mobile banking with your phone number. They can get OTP and anything which is related to you with your mobile number.
To prevent such kind of mobile number theft, always contact your mobile operator if you do not receive any call or SMS for an extended period or if you think there is no service. If you receive any SMS from your mobile operator for probable SIM swap, immediately contact them. Register for the instant alert on both your mobile number and email in case of any activity on your account.
7. Unsafe Apps
As the use of mobile is increasing, this kind of threat is imminent. We tend to use a lot of apps on our phone. An unsafe app can gain access to your personal information stored on your phone and send it to hackers for fraudulent activity.
Never install any app from an unknown source or authority. Only install apps if you know the source is good enough.
Last but not least, if you believe that your personal data is compromised in any way, change those data immediately without any delay. Always prevent yourself from getting into the trap of hackers and do a safe transaction.