14th

June, 2013

Tips on Protecting Your Credit Cards from New High Tech Theft

These days professional thieves understand that the key to profitable crime lies in following the money, and that the easiest way to do that is not to walk into a bank but to hack into a credit card account. They can get in and get out without leaving a trace, and vanish with your credit and your cash.

If you are unaware of these high tech thieves, you could lose a lot of money in no time at all. Before putting yourself in that sort of financial risk, you need to know how to protect your credit cards from cyber theft. The information below explains what to look out for so you can avoid any sort of problems.

Credit Card Skimming

An increasingly popular way to steal cards is by installing a skimmer into the imagesinside of the slot in a card reader on an ATM machine or gas station pump. This is a computer recording gadget as thin as a credit card. When you insert your own plastic into the slot this device quickly swipes it and stores all your credit card data, just as you might copy data from your computer hard drive using a USB stick or a computer disc. Later the thief who installed the illegal device returns, retrieves it, and pockets the credit card data of everyone who has recently used the slot to make a purchase or other transaction.

Signs of Credit Card Skimming

Police suggest that when using any of these card slots you should always check to see if the slot is loose or not tightly and snugly attached as it normally should be, or if the slot your card fits into just feels oddly sloppy. You may also see a larger piece attached over the top of the slot. That’s a telltale sign that they slot has been tampered with, and if you encounter any of these things you should notify the police or the proprietor and then go to a different machine to complete your transaction.

RFID Credit Cards

Another devious way to pick the lock on your credit card security system is to take advantage of new credit card scanning technologies that use radio frequency signals. RFID or radio frequency signals have been used for about 10 years or more as a means for tracking packages and items within an inventory. 14784633_sYou may have wondered how companies like FedEx can track packages so easily, and one tool in their arsenal is these small radio frequency emitting chips that they can use to locate a package.

You’ve probably purchased clothes at the mall that had tags inside that were long and thick, about the same size as the paper scrolls inside a fortune cookie, and those are also RFID chips. They can send a signal to alert the store if someone tries to shoplift, but the signal is so weak that once you get your merchandise home it is no longer traceable. Now, RFID technology is being used in some “smart cards” issued by credit card companies. Instead of sliding your credit card through a card reader you simply hold it near the reader and a very weak radio signal transmits your card data. Tap and go card technology now used in Japan and some other tech-savvy countries works on a similar principal. You tap your smart phone against a card reader and it automatically retrieves your credit card information.

Problems with RFID Technology

The security loophole with RFID technology is that if someone passes you on the street or is standing next to you on a subway, in line at a restaurant, in a nightclub, or anywhere else they can also scan your credit cards if they have an RFID enabled reader in their pocket or messenger bag. Thieves are already stealing credit card information in this stealthy and non-invasive manner simply by snatching the card number out of thin air via radio transmission.

Many high security departments within the United States government, for example, use identification cards powered by RFID, and they also require those who use those cards to keep them protected inside an RFID blocking sleeve or protective cover. So although it sounds rather sci-fi, the RFID threat to credit card security is becoming more realistic as card technologies and card readers become more sophisticated.

How to Protect from RFID Theft

RFID blocking credit card sleeves, which are little envelopes or covers made of paper-thin Tyvek fabric, are a simple and practical tool that sounds like a gimmick but really isn’t. Even if you are not concerned about skimmers stealing your card information through the walls of your purse or wallet, these RFID protectors still serve another purpose. dscn1436Most conventional credit cards still rely on an old-fashioned magnetic strip. If the strip is damaged, scratched, or exposed to a strong magnet then it gets scrambled and your credit card will not work when you swipe it. But an RFID protective sleeve is one of the best ways to ensure that your magnetic strip does not get damaged.

You can usually ask your bank for Tyvek sleeves, because many of them offer these to customers to help them protect ATM and credit cards. The teller may not be familiar with RFID technology or the trademarked Tyvek fabric, but if you ask if they can give you a little sleeve made for protecting your credit card they’ll understand. You can also buy Tyvek sleeves online, and they are usually a dollar or less apiece. Just do an online search for “Tyvek credit card sleeves” or “RFID sleeves” and you’ll find what you need.

Crime rings are becoming extraordinarily sophisticated and they can rip off your plastic and then sell your card information to buyers and crime rings scattered all over the globe. This happens within a matter of minutes and hours, not days and weeks. Before you know what hit you they can do irreparable damage to your credit history, your financial identity, and your bank account. That’s why it is particularly important that you treat your plastic like gold, and protect it with updated methods, strategies, and tools.

comments powered by Disqus

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>