According to Amethyst Risk research, surveys have indicated that online thieves (also known as cyber thieves) are able to guess credit card numbers within approximately 4-5 seconds. The online security experts from the University of Newcastle, United Kingdom, noted that the loopholes on particular websites are the resources whereby thieves enter and locate credit card data. Of course, this high rate of thievery is typically only seen among cyber thieves who frequently visit vulnerable websites including popular online retailer websites.
The vulnerable websites, including popular online retail websites, have been notified of these statistics and informed of the importance about security prevention methods. The question these website owners often ask is: how is the credit card data obtained by the thieves? Of course, it was noted that the data was gained through the loopholes; however, below is a more detailed explanation.
Research has shown that cyber thieves are able to obtain the card data by tracking the information from credit card payments on the retailer websites. The information was obtained by researchers creating an experimental credit card querying system that submitted payment requests to various sites at the same time. By using various combinations of the card number, the expiry date, and the security code, it was seen that the system was able to quickly recover all the information required to replicate a credit card. This is the approach used by the cyber thieves to gain information and create a duplicate credit card.
The team involved with this study showed that 36 of the websites created against which the distributed credit card number-guessing system was shared as evidence. It was seen that eight sites required disclosure and these eight websites changed security systems in order to defend against the attacks. The implementation of defensive measures limited the number of card details obtained. It should be noted that the remaining 28 websites made no disclosure of credit card information shared.
The experimental attack is beneficial in that it indicates a cyber thief is able to run several payment queries simultaneously; thus, obtaining the information in approximately six seconds. Of course, there is no evidence demonstrating that this particularly technique is being used by all cyber thieves making this a credible approach and not a practical one.
By reviewing this particular approach, it is possible for the researchers to learn the technique thieves use to attack their cyber victims; therefore, providing data to create more effective security measures for attacks on large websites.
AMETHYSTS TIPS FOR SMART ONLINE SHOPPING AND ONLINE BAGGING BARGAINS:
To ensure your computer is protected and credit card details less susceptible to cyber theft, it is highly recommended that one have internet security anti-virus software available on the device being used. This anti-virus applies to tablets, computers, phones, and any other device that will be used to access the internet.
Secure Wi-Fi is available at various locations and is essential to ensure internet privacy. When using the internet at home, it is advised that you check the router security settings before use. When using the internet outside the home, it is recommended that you avoid using free Wi-Fi hotspots if completing private online tasks.
A security measure that can be easily completed by you is to use passwords that are not simple to guess. It is also advised you use more than one password for different accounts and do not share the information with others.
Be sure to check the payment systems are secure when purchasing items online and always log out of accounts when you have finished shopping.