Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

The Connection, Inc’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at (732) 291-5938.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

IT Budget Language Printing Information App Security Cameras Domains Proactive IT Servers Monitoring Superfish Cybersecurity E-Commerce Hacker Education Wireless Smart Technology Cloud Computing Software Bookmarks Documents Tablet Mobile Managed Services Provider Operating System IP Address Botnet Vendor Management Hackers Cleaning Risk Management Fun Social Media Display Staff Cyber Monday Touchscreen Business Technology Remote Worker Cryptocurrency Cortana Break Fix Password Running Cable Smartphone Tech Terms Efficiency Data Security Google Mobile Device Management Mobile Devices Finance Mobile Device Website Productivity Heating/Cooling Settings Big Data Hotspot Hacks User Tips IT Consulting Bitcoin Twitter Personal Information Downtime Cache Holiday Quick Tips eWaste Vulnerability Recovery Cabling Phone System Facebook IT Services Files Storage Analyitcs Tracking Competition Microsoft Office Data Breach Virus Sync Dark Data Authentication Data Chrome Innovation Wasting Time Access Control Microsoft Excel Error Webcam Intranet Human Error Features Apple Small Business Content Filtering Assessment Google Wallet Voice over Internet Protocol Statistics Cybercrime Distributed Denial of Service LiFi Robot Google Maps Antivirus Digital Signature Legislation Hardware Identity Theft Management WiFi Legal Black Friday Net Neutrality Black Market IoT GPS Budget Samsung Corporate Profile Blockchain Workplace Tips communications IT Support Search Disaster Recovery Cooperation Deep Learning Mobility Augmented Reality Permissions Gadget Emoji Passwords Read Only Staffing Software Tips Refrigeration USB Automobile Windows 10 WPA3 Employees Bring Your Own Device Mobile Computing Tip of the week Managed IT Services Smart Tech Test Managed IT services ROI Server Management Identities OneNote Instant Messaging Mirgation CIO Techology Internet Exlporer Presentation Relocation Privacy Phishing Experience Operations Cyberattacks Migration Technology Tips Security Going Green Procurement Screen Reader Shortcut Android Drones Alert IT Support VoIP Development Disaster Specifications Time Management Professional Services iPhone Public Speaking Ransomware Typing How To Alerts Collaboration Social Networking Consumers User Error Politics Tech Term Mail Merge Buisness Data Management Data storage Encryption Asset Tracking 3D Printing Fleet Tracking Enterprise Resource Planning Mobile Security Virtual Private Network VoIP Computer Care Apps Software as a Service Business Management End of Support Computer Server Private Cloud Disaster Resistance Redundancy Computer Repair MSP Analytics Managed IT Backups Cables Monitors Identity Processors Applications Troubleshooting Notes Scam Router Theft Network Congestion SharePoint Productivity Google Calendar Customer Relationship Management Address Uninterrupted Power Supply Patch Management Co-managed IT Business Notifications Application Information Technology Vulnerabilities Nanotechnology Upgrade Halloween IT Technicians Digital Payment Social Update Employee-Employer Relationship Document Management Comparison Browser Meetings File Sharing PDF Proactive Modem Upgrades Wi-Fi Customer Service Chatbots Government Business Growth Enterprise Content Management Mobile Data Motherboard Business Continuity Downloads Office Wires Supercomputer Training Marketing Compliance Hacking Administration Technology Laws Gadgets Spyware Consulting Utility Computing Retail Machine Learning Firewall Virtual Reality YouTube Lenovo Maintenance Unified Threat Management Windows 7 Company Culture Firefox Paperless Office Virtualization Computing Infrastructure Connectivity Law Enforcement Two-factor Authentication WannaCry Sports Business Owner Financial Email Recycling Current Events IT service Websites Digital Taxes Computing Managed Service Provider Alt Codes Bluetooth Mouse Favorites Outsourced IT VPN Automation History Cookies Fraud Google Drive Piracy PowerPoint Spam Smartphones Networking Artificial Intelligence Help Desk BDR Electronic Medical Records Safety Regulations Remote Workers Office 365 Tip of the Week Trending Web Server Hosted Solution Managed IT Service Cameras Gmail Saving Money Saving Time Telephone Systems How To Managed Service Wearable Technology Database Business Computing Data Backup Save Money RMM Miscellaneous Remote Monitoring Internet Programming Communication Unsupported Software Managing Stress Consultation Best Practices Undo Work/Life Balance Public Cloud Telephony Virtual Assistant Computers Laptop Network Internet of Things 5G Social Engineering Health Best Practice Flexibility BYOD Unified Communications Hard Drive Money Point of Sale Entrepreneur Hosted Solutions Outlook Users Network Security Mobile Office Backup and Disaster Recovery Office Tips G Suite Employer-Employee Relationship IT Management Microsoft Cost Management Google Docs Network Management Hard Disk Drive HIPAA Remote Computing Zero-Day Threat Tech Support Mobile Device Managment Data loss Project Management Business Intelligence Technology Star Wars Printer Geography Administrator Infrastructure Bandwidth IT solutions Conferencing High-Speed Internet CCTV Motion Sickness Backup Writing Multi-Factor Security Remote Monitoring and Management User Hiring/Firing Virtual Desktop Avoiding Downtime SaaS Word IBM The Internet of Things Solid State Drive Lithium-ion Battery Knowledge Licensing IT Consultant Windows 8 Travel Wireless Technology Electronic Health Records Humor Save Time Data Warehousing Hard Drives Physical Security Authorization Windows 10 Scary Stories Cloud Permission Crowdsourcing Data Recovery Chromebook Dark Web Healthcare Unified Threat Management Windows Environment Malware

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code