Get Started Today!  321-259-5500

croom new

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

A Great Way to Give a Gift
Many of us have utilized the gift card to extend our appreciation for friends, co-workers, and loved ones, and they are typically a pretty well-received gift. The problem is that a lot of money is being diverted from the gift giver, not to the recipient, but to third-party scammers. The IRS has been forthcoming on this issue, stating that gift cards “are the currency of criminals”.

What Is the Scam?
Unfortunately, there are several. The first one we’ll go into briefly (just because you should know about it) requires hackers to go to the store, get all the information off of the card, physically scrape off the little foil sheet to expose the security code, replace the foil sheet, and wait. Eventually the card will get filled, and if the hacker hadn’t triggered the security measures by repeatedly checking the account associated with the card, they would have access to whatever funds were put on the card by the provider.

Another scam we are seeing a lot of is effectively laundering money with cards. The FTC’s website itself identifies one of the big problems: “Gift cards are for gifts, not payments.” How this works is that a scammer will call a potential victim up and give them horrible, or incredible, news to get the victim out of a pragmatic mindset and then take advantage of his/her distraction by making them pay using a loadable gift card. If anyone wants you to pay with a gift card, STOP immediately, it’s a scam. Gift cards are the number one payment method imposters demand. Much like the phishing scams that extort sensitive information from users via email, these gift card scammers take untraceable money via fraud.

The last scam, and the one we are most concerned about as faithful gift card supporters is one where a host will turn computers and Internet of things devices on the websites where consumers access their gift card balances. This botnet attack continually tests the system with millions of combinations of gift card account numbers and stolen PINs or passwords. The machines on the botnet are spread out enough, and mimic human behaviors well enough, to allow these hackers to get the money they want before they are detected. It is estimated by industry professionals that nearly 90 percent of login activity for online accounts that are set up to manage gift cards comes from botnet attackers.

Protection
There are actions you can take to protect yourself. You can buy your gift cards online. While it makes an already impersonal gift a little bit less personal, it could go a long way toward ensuring the recipient gets a gift. If you are going to buy gift cards at a store, make sure the packaging isn’t disturbed and that the foil hasn’t been removed from the security code. Finally, if you can, change the PIN on a card you have received as soon as possible after receiving it (and before using it).

TotalCareIT™’s IT professionals make a living keeping our clients from all manners of threats. If you want more information about how our managed IT services can work to keep your business safe, contact us today at 321-259-5500.

During the Holidays, Cybersecurity Matters at Work...
Tech Term: Mobile Device Management
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Malware Business Business Computing Internet Email Hosted Solutions Productivity IT Services Data Computer Backup Network Security Mobile Devices Productivity Software Hardware Microsoft Google User Tips Ransomware Efficiency Managed Service Provider Workplace Tips Windows 10 Tech Term Smartphone Android Business Continuity Innovation Server Small Business Cloud Computing Disaster Recovery IT Support Upgrade IT Support Encryption Social Media Data Management Communication Business Management Smartphones App Managed IT Services Data Backup Network Browser Phishing Windows Office 365 BYOD Artificial Intelligence Facebook Outsourced IT Data Recovery Apps Employer-Employee Relationship Internet of Things Paperless Office Office Windows 10 Gmail Big Data Passwords Microsoft Office Save Money Remote Monitoring Collaboration Mobile Device Management Managed IT Services Hosted Solution VoIP Vendor Management WiFi Holiday Government Cybersecurity Spam Alert Chrome Office Tips Firewall Wireless Technology Robot Vulnerability Saving Money Recovery Wireless communications Miscellaneous Wi-Fi Risk Management Two-factor Authentication Money Password Work/Life Balance Scam Word Document Management IT Management Virtualization Budget Settings Automation Avoiding Downtime Infrastructure Quick Tips Analytics Website Tip of the week IT solutions Social Hacker Antivirus How To Customer Service Content Filtering Bandwidth Managed Service VPN Unified Threat Management Blockchain Education Tech Support Bring Your Own Device Storage The Internet of Things Tablet Machine Learning Computing Compliance BDR Applications Downtime IT service Customer Relationship Management Data storage Virtual Reality Remote Computing Maintenance Business Technology Apple Politics SaaS Twitter Mobile Device Information Hard Drives Cybercrime Legal Going Green Healthcare Physical Security Network Management Heating/Cooling Sports Chromebook Net Neutrality Botnet Printing Data loss Google Drive Monitors Lithium-ion battery Presentation Administration Safety Patch Management Mouse Hacking Computer Care Access Control HIPAA Augmented Reality Business Owner Networking IBM Samsung Users Management Competition Identity Theft User File Sharing Cost Management Training Virtual Desktop Regulations G Suite Data Security Running Cable Point of Sale Mobile Security Cortana eWaste End of Support Virtual Private Network Private Cloud Telephone Systems YouTube Taxes Business Intelligence Outlook Unified Communications Health Router Computers Best Practice Automobile Search Upgrades Websites How To Solid State Drive User Error LiFi Operating System Electronic Medical Records Server Management Bitcoin Display Processors iPhone Hard Disk Drive Cache Address Employees Tracking Monitoring Google Calendar Chatbots Mobile Office Administrator IoT Shortcut Favorites Refrigeration 3D Printing Cleaning Firefox Printer ROI Wearable Technology Smart Technology Marketing CCTV Vulnerabilities RMM Computing Infrastructure Experience Managed IT Troubleshooting Cookies Electronic Health Records Windows 8 Gadgets Meetings Recycling Remote Monitoring and Management Permissions Touchscreen Consulting Legislation Identity Dark Data Emoji Cabling Star Wars Instant Messaging FCC Unsupported Software OneNote Notes Business Growth Statistics Files Distributed Denial of Service Law Enforcement Digital Development Tech Terms Alerts Deep Learning Google Docs Help Desk Nanotechnology Buisness Hacks Webcam Zero-Day Threat Fraud Hiring/Firing Backups Personal Information Entrepreneur Managed Services Provider Comparison Assessment Finance Title II Co-managed IT Save Time Mobile Data Relocation Employee-Employer Relationship SharePoint PowerPoint Laptop Alt Codes Google Maps Screen Reader Bluetooth Read Only Managed IT Service Application Fun Information Technology Database Gadget Spyware Cables Theft Licensing Trending Writing Notifications Company Culture Human Error Computer Repair Supercomputer Motherboard E-Commerce Specifications Social Networking Black Market Travel Disaster Internet Exlporer Authentication Online Staffing VoIP Remote Workers Downloads Professional Services IT Technicians Halloween Typing Error Smart Tech Printers Break Fix Google Wallet Voice over Internet Protocol Wires Techology Financial Cooperation Identities Law CIO Current Events Retail Crowdsourcing Web Server Corporate Profile Managing Stress Lenovo Permission Hotspot Environment IT Budget Servers Features Black Friday Network Congestion Motion Sickness Uninterrupted Power Supply Hard Drive Mail Merge Authorization Microsoft Excel Undo GPS Time Management Multi-Factor Security Wasting Time Mirgation IP Address Scary Stories Cryptocurrency Connectivity Bookmarks Dark Web Drones Windows 7 IT Consultant Unified Threat Management Security Cameras Staff Mobile Computing Humor Update 5G Social Engineering Analyitcs Cameras WannaCry Enterprise Content Management Superfish Test Language Public Speaking Knowledge Digital Payment Modem Cyber Monday Students Regulation Teamwork Emergency USB Shared resources Flexibility CrashOverride Domains

      Latest Blog Entry

      If your business is one that depends on transportation, you know that coordination is extremely important. With consumers’ reliance on a company’s distribution arm, today’s companies are turning old practices on their heads and utilizing a more technology-driven approach to ...

      Account Login