Get Started Today!  321-259-5500

croom new

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

TotalCareIT™’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 321-259-5500.

During the Holidays, Cybersecurity Matters at Work...
Tech Term: Mobile Device Management


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!


Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Email Hosted Solutions Internet Productivity Computer IT Services Backup Data Network Security Mobile Devices Software Productivity Hardware Microsoft Google Ransomware Managed Service Provider Tech Term User Tips Efficiency Windows 10 Workplace Tips Smartphone Business Continuity Android Innovation Disaster Recovery Small Business Cloud Computing Encryption IT Support Social Media IT Support Business Management Smartphones Data Management Server Data Backup Managed IT Services Network Communication Browser App Outsourced IT Office 365 BYOD Facebook Data Recovery Artificial Intelligence Passwords Paperless Office Employer-Employee Relationship Phishing Apps Upgrade Office Windows Big Data Internet of Things Gmail Hosted Solution Vendor Management Mobile Device Management WiFi Save Money Government Holiday Remote Monitoring Windows 10 Managed IT Services Office Tips Wi-Fi Alert Spam Two-factor Authentication Vulnerability Robot Microsoft Office Risk Management Miscellaneous Firewall Wireless Technology VoIP Collaboration Recovery Wireless Quick Tips Customer Service Infrastructure Work/Life Balance Tip of the week VPN Automation IT solutions Password Content Filtering Bandwidth Word Antivirus Virtualization Budget Saving Money How To Cybersecurity Avoiding Downtime Social Document Management Money IT Management Website Hacker Scam Chrome Computing Healthcare Machine Learning Maintenance Downtime Hard Drives Remote Computing Legal Applications communications Tech Support Business Technology Data storage Virtual Reality Apple The Internet of Things SaaS Unified Threat Management IT service Politics Going Green Mobile Device Tablet Education Twitter Bring Your Own Device Blockchain Analytics Customer Relationship Management BDR Information Managed Service Storage Cybercrime Settings Business Intelligence Google Drive File Sharing Training Access Control HIPAA Monitors G Suite Patch Management Best Practice Point of Sale Computers Search Compliance Telephone Systems Lithium-ion battery Cortana Samsung Taxes Heating/Cooling Data Security Hacking Mobile Security YouTube Business Owner Regulations Management Competition Automobile Users Unified Communications How To Virtual Private Network Private Cloud Server Management Safety User End of Support Presentation Network Management Outlook Solid State Drive eWaste User Error Health Augmented Reality Running Cable LiFi IBM Sports Data loss Virtual Desktop Cost Management Upgrades Websites Printing Operating System Electronic Medical Records Router Computer Care Physical Security Administration Botnet Identity Theft Mouse Chromebook Permissions Enterprise Content Management Test Managed IT Legislation Identity Modem Analyitcs Deep Learning Cache Employees Buisness Hacks Google Maps Law Monitoring iPhone Hiring/Firing Spyware FCC Alt Codes Unsupported Software Supercomputer IP Address Networking Alerts ROI Co-managed IT Save Time Dark Data Emoji Undo Statistics Distributed Denial of Service IoT Favorites Laptop Staffing VoIP Fraud Vulnerabilities Troubleshooting RMM Information Technology Google Docs Help Desk Travel Disaster Comparison Cookies Marketing Electronic Health Records Law Enforcement Recycling Remote Monitoring and Management Trending Backups Personal Information Error 5G SharePoint Gadgets Consulting Public Speaking Title II Halloween Typing Mobile Data Relocation IT Budget Servers Mobile Office Licensing OneNote Notes Web Server Corporate Profile Bluetooth Managed IT Service Star Wars Instant Messaging GPS Time Management Development Tech Terms Google Wallet Motion Sickness Uninterrupted Power Supply Refrigeration Specifications Social Networking Nanotechnology Files Identities Gadget Online Zero-Day Threat Entrepreneur CIO Current Events Computer Repair Downloads IT Technicians Managed Services Provider Writing Notifications IT Consultant Scary Stories Cryptocurrency Digital Payment Techology Cooperation Employee-Employer Relationship PowerPoint Black Market Cameras WannaCry Break Fix Assessment Finance Tracking Lenovo Hotspot Cables Theft Drones Hard Disk Drive Black Friday Screen Reader Read Only Mobile Computing Mail Merge Microsoft Excel Company Culture Human Error Administrator Multi-Factor Security Mirgation Motherboard E-Commerce Knowledge Retail Crowdsourcing Cleaning Firefox Bitcoin Unified Threat Management Staff Remote Workers Professional Services Network Congestion CCTV Dark Web Internet Exlporer Authentication Touchscreen Superfish Language Wires Financial Humor Update Meetings Cyber Monday Smart Tech Printers Address Managing Stress Environment Permission Cabling Application Fun Google Calendar Chatbots Features Experience Social Engineering Windows 8 Printer Wearable Technology Wasting Time Display Processors Digital Shortcut Net Neutrality Hard Drive Authorization 3D Printing Computing Infrastructure Security Cameras Webcam Smart Technology Connectivity Bookmarks Business Growth Domains Regulation Emergency CrashOverride USB Flexibility Database Voice over Internet Protocol

      Latest Blog Entry

      When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encry...

      Account Login