Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

The Connection, Inc’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at (732) 291-5938.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 January 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Legislation Identity Theft Tech Terms Machine Learning Computers Files Technology Tips The Internet of Things LiFi Hacks Data Email Net Neutrality Remote Workers Flexibility Company Culture communications Deep Learning Paperless Office Managed IT Service Communication Public Cloud Unified Threat Management Cache Business Outsourced IT Website Language Training Customer Relationship Management Google Docs Fun History Malware File Sharing Test Digital Payment Error Chatbots Mobile Data Dark Data Best Practices Maintenance Hackers Smart Tech Network Management Office 365 IBM Downtime SaaS Disaster Resistance Customer Service Monitors Hosted Solution Taxes iPhone Settings Apps Permission Save Money Servers Proactive Wireless Hardware Chrome Printing Encryption Cloud Computing Managed IT Humor Hiring/Firing Presentation Automation Virtual Desktop Intranet Two-factor Authentication Samsung Business Technology Phishing Retail Disaster Hotspot Monitoring Mouse Mobile Devices Infrastructure Google Calendar Mobile Computing Botnet High-Speed Internet Cabling Connectivity Star Wars Storage Social Networking Hacker Physical Security Distributed Denial of Service Software BYOD Mobile Device Managment Computer Repair Word Law Enforcement Proactive IT Enterprise Content Management Remote Monitoring and Management IT Budget Wearable Technology Android Downloads Quick Tips Marketing Spyware Avoiding Downtime Assessment Collaboration Consumers Personal Information Remote Monitoring Domains Time Management Analytics Chromebook Holiday Unified Communications Writing Telephony Cyberattacks Internet Exlporer Recycling Privacy Administration Competition Saving Time Politics How To Business Continuity Financial USB Upgrades Google Drive Data Management Business Growth PowerPoint Sports Data loss Internet Vulnerability Windows 8 Administrator Favorites Virtualization Mobile Device Managed IT Services Social Media Mobile Security Windows Remote Computing Help Desk Network Current Events Cybersecurity Browser Artificial Intelligence Documents Scam Innovation Travel Cyber Monday Compliance Cables Mobile Office Mirgation Read Only Networking Business Owner WannaCry Webcam Computing Infrastructure Consulting CIO Electronic Medical Records Business Intelligence App Backup Laptop Upgrade Digital Signature Consultation Google Wallet Twitter Public Speaking Internet of Things Features IT Consulting Managed IT services Procurement Nanotechnology Save Time Recovery Big Data Telephone Systems YouTube Cameras Tracking 5G Business Management Scary Stories Security Cameras Information IT Support GPS VPN Mail Merge Legal Remote Worker Computing Wires Zero-Day Threat Alerts Typing Password Operations Managed Services Provider Emoji Mobility Server IT Services Virus Bitcoin Piracy Search Windows 10 Miscellaneous Black Friday Government Document Management Robot Content Filtering Supercomputer Data Backup Finance Budget Touchscreen Regulations Disaster Recovery Virtual Private Network Data Recovery Lithium-ion Battery Techology Managed Service Printer Office Tips Display User HIPAA Co-managed IT Alt Codes Statistics Bluetooth Mobile CCTV Heating/Cooling Specifications Employees Cortana Software as a Service BDR WiFi Cybercrime Backup and Disaster Recovery Tech Support Computer Healthcare Screen Reader IT solutions Wireless Technology Migration Licensing Software Tips VoIP Education Identity Information Technology Bring Your Own Device Environment Notifications Microsoft Excel Conferencing VoIP Small Business Hosted Solutions 3D Printing Smartphone WPA3 Outlook Bandwidth IT Management Authorization Sync Best Practice Development Multi-Factor Security Router Workplace Tips Users Instant Messaging Server Management Point of Sale PDF Websites Meetings User Tips Superfish Managing Stress OneNote Fraud Identities Tablet Comparison Drones Employee-Employer Relationship Office Hard Drive Bookmarks Tip of the week Relocation Application Cryptocurrency Efficiency Data storage IT Technicians Cookies Refrigeration Safety Motion Sickness Experience Enterprise Resource Planning IT Support Digital Security Corporate Profile Saving Money Technology Laws Dark Web Augmented Reality Smart Technology Asset Tracking Electronic Health Records Patch Management eWaste Automobile Wi-Fi Break Fix Tech Term Unified Threat Management Blockchain Alert Microsoft Update Operating System Gadget Antivirus IT Consultant Address Fleet Tracking Project Management Theft MSP Private Cloud Unsupported Software IT service Geography How To Vulnerabilities Solid State Drive Smartphones Productivity Network Congestion Backups Management Authentication Computer Care Shortcut Going Green Hard Disk Drive Spam IoT Business Computing Social SharePoint Data Warehousing Staffing Processors Ransomware Social Engineering Technology Motherboard Black Market Redundancy Gadgets Applications Hacking Tip of the Week Web Server Halloween Microsoft Office Money Access Control RMM Risk Management Hard Drives User Error Firefox Cooperation Staff E-Commerce Cleaning Modem Vendor Management Health Buisness Crowdsourcing Cloud Phone System Firewall Lenovo G Suite Mobile Device Management Utility Computing Passwords Data Breach Permissions Running Cable Google Maps Google Virtual Reality Programming Productivity Facebook Gmail Uninterrupted Power Supply IP Address Knowledge Troubleshooting Human Error ROI Undo End of Support Entrepreneur Data Security Trending Analyitcs Cost Management Employer-Employee Relationship Managed Service Provider Windows 10 Network Security Apple Work/Life Balance

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code