You must know this! How do bank card data steal?

in #life6 years ago

Agree, bank cards now have almost everyone.

In the modern world it is already difficult to do without them. The cards are simple in design, easy to use, and open a number of options that are not available for the cache, for example, shopping for goods through online stores.

But in terms of security, the maps are not at all ideal. Every day a huge amount of data flows into someone else's hands. It ends with the fact that the owner of the money, and if the card is a credit, it's a double fuck. In the end, this all ends with long proceedings with the bank and law enforcement agencies, and not the fact that it will be possible to return their blood.

So how exactly does this data sneak? Let's figure it out.

In general, I can distinguish two types of data theft: "contact" and "contactless."

"Contact" methods are carried out through direct physical contact.

"Non-contact" methods, respectively, are applied without such contact.

Now as you go, you'll understand what I mean.

Contact methods can be called such methods as:

1) Skimming

Information can be stolen from the magnetic strip on the map. To do this, a skimmer is used - this is a device that mimics a portion of the ATM and is fixed over the card slot. The PIN code is stolen by installing a fake keyboard that records tapping, or by installing a small video camera that removes the code set. And they may not steal the pin code, and stupidly remove the grandmother without him, because with online payment it is not necessary.

2) Through terminals for payment

You can also steal data through POS-terminals, if you understand it more clearly, then through that garbage into which you insert a card or put it in the store) They put there virus software or a device like the one put into the ATM.

3) Data theft by service personnel

You can easily fuck these cards in places like bars, restaurants and cafes, where waiters take the visitor's card and take them with them to the cash register. On the way there, the waiter stupidly photographs the map from both sides and receives all the necessary information.

Non-contact methods can be called such methods as:

1) Phishing

I'm talking about fake banking websites and payment systems. Also there are fake sites-copies of various online stores, where filling out the form of payment, instead of registering a purchase from the brow, data is being written.

2) Smartphone applications

It's no secret that applications collect and store too much of your data about you. There is an opportunity to steal this data. And sometimes there are copies of well-known banking applications such as Sberbank Online, which transfer data to the left.

3) Open Wi-Fi networks

Connect to open networks cautiously, bro) Now even a student can intercept access to your smartphone by installing a couple of Kulhacker programs and get all sorts of information.

4) Data theft by phone call

Basically, this is a classic divorce, when the person calls and appears as a bank employee and hangs noodles on his ears, like he needs your data for some sort of verification) or are presented by buyers who want to deposit a deposit and request extra information.

Sort:  

sneaky-ninja-sword-xs.jpg
Sneaky Ninja Attack! You have just been defended with a 5.95% upvote!
I was summoned by @aurus. I have done their bidding and now I will vanish...

woosh
A portion of the proceeds from your bid was used in support of youarehope and tarc.

Abuse Policy
Rules
How to use Sneaky Ninja
How it works
Victim of grumpycat?

Coin Marketplace

STEEM 0.18
TRX 0.15
JST 0.029
BTC 62952.44
ETH 2542.20
USDT 1.00
SBD 2.65