Connecting over 25 millions NRIs worldwide
Most trusted Name in the NRI media
NRI PEOPLE- OUR NETWORK
 

 

WEB SCAM & Businesses victims of fraud returns from customers to data theft

By Gary Singh &
S
. Mukherjee/Sunita

  • Computer crimes or cybercrimes are criminal acts conducted through the use of computers by cybercriminals who use computers, networks, and the Internet to perpetrate crime.
  • Information Systems Security is precautions to keep Information Systems safe from unauthorized access and use.

Web Template Scam:

Scores of web designers today are incredibly deceitful and are fundamentally scamming their clients out of money through web design fraud and template scams.

While doing some freelance work, there are a lot of web designers out there who offer to do web design service for very cheap. A lot of the time this includes offering their "custom web design" service.

Fraud against Business-- Fraudulent returns from customers to data theft by outsiders

Credit card company figures show that 90 per cent of consumers are reimbursed when their cards are used fraudulently, while 75 per cent of online retailers have to eat the cost when they're the victims of credit card fraud. There is currently no way to avoid this ludicrously high risk, though it can be reduced.

The media is filled with stories of consumer victims of fraud but the reality is that businesses, especially smaller enterprises, are more often the victims of fraud than consumers. The types of fraud can vary wildly, from accounting scams carried out by employees to fraudulent returns from customers to data theft.

New laws also hold businesses accountable for liability in the event of some types of fraud perpetrated by third parties, such as data breaches. Sources of Business FraudIn order to understand the types of fraud that your business may be vulnerable to, you must first understand the different sources of these crimes. Most professionals agree that the top sources of business fraud, ranked in the order of frequency.

Protecting your online business from fraud

Many payment gateway providers use the Address Verification System (AVS). AVS provides a degree of protection by comparing some of the billing details on the order to those held by the cardholders bank - But the transaction may be approved even if the address verification information does not match! The merchant faces the possibility of chargebacks if the payment gateway decides to continue with the transaction on a questionable match.

If you have AVS features in place, check the settings in your interface. AVS should just be used as an indicator of a possible attempt at fraud; a flag to help determine if an order should be more thoroughly investigated.

  • The first is most easily solved using SSL (Secure Socket Layer) an encryption protocol built into current browsers and supported by most Web servers. Base Apache doesn't support it for patent reasons (RSA owns certain algorithms in the US) but Apache SSL does. It is only half of the solution. An SSL exchange is carried out using a public key given to your browser by the server
  • TTP (trusted third party), is a public company which provides a vendor with a digital certificate. TTP require a fair amount of company documentation. it's a three way transaction- the digital certificate provider confirms that the key belongs to a valid certificate used by the company at the domain where the transaction is taking place.

Tips to help you avoid getting hooked by a phishing scam:

  1. If you get an email or pop-up message that asks for personal or financial information, do not reply.
  2. Area codes can mislead. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a “refund.”
  3. Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.
  4. Don’t email personal or financial information. Email is not a secure method of transmitting personal information.
  5. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges.
  6. Be cautious about opening any attachment or downloading any files from emails.
  7. Forward spam that is phishing for information to spam@uce.gov and to the company, bank, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems.
  8. If you believe you’ve been scammed, file your complaint at ftc.gov or in your country with crime department or contact your Consulate Genenal.

24 Mar 10: Cybersecurity Bill Approved

The Senate Commerce Committee Wednesday approved legislation to improve how the federal government and the private sector deal with cyber attacks. Approved by voice vote, the bill would raise the priority of cybersecurity throughout the federal government and streamline cybersecurity-related functions.

Contact: nripress@gmail.com