{"id":426,"date":"2006-04-05T23:48:42","date_gmt":"2006-04-06T07:48:42","guid":{"rendered":"\/?p=426"},"modified":"2006-04-05T23:59:08","modified_gmt":"2006-04-06T07:59:08","slug":"top-five-credit-card-scams","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=426","title":{"rendered":"TOP FIVE CREDIT CARD SCAMS"},"content":{"rendered":"<p>Jimmy Atkinson has written to tell us about a series&nbsp;he&#39;s involved in&nbsp;at <a href=\"http:\/\/www.findcreditcards.org\/articles\/\" class=\"broken_link\">Credit Card Blog<\/a>&nbsp; &#8220;that may interest readers of Identity Weblog. It&#39;s the Top Five Credit Card Scams. Each day this week, we&#39;re covering a different scam and providing tips to consumers as to how they can protect themselves against identity theft and credit card fraud.&#8221;&nbsp;<\/p>\n<p>The site will definitely give you things to think about.&nbsp; I don&#39;t know a lot about findcreditcards.org.&nbsp; Maybe Jimmy can help us to understand more.<\/p>\n<p>Anyway, here is a sample &#8211; the recent posting on &#8220;skimming&#8221;:<\/p>\n<blockquote><p>One of the most insidious forms of credit card fraud occurs with a little device known as a skimmer. Skimmers are the size of a pager and can be carried by a scam artist to swipe your credit card and steal the information needed to create a counterfeit card with your name on it. Here\u00e2\u20ac\u2122s how it works: You pay at a restaurant or other business and the clerk takes your card. In the back, the clerk swipes your card for the purchase and then swipes it secretly into the skimmer, which records the name and numbers.<\/p>\n<p>The numbers in the skimmer can be downloaded into a computer and emailed anywhere across the globe. They are then used to make fake credit cards that are used by thieves in Europe, Asia, Latin America, and the US. Skimming is responsible for over $1 billion in losses each year.<\/p>\n<p>Skimmers can also be placed on some older ATMs so that when you swipe your own card, the information is stored in the tiny bug and then retrieved at a later date by the scammer. To protect yourself, keep an eye on your credit card bills. Watch for any unusual activity and report it immediately. Also shred all your statements so that the numbers cannot be stolen.<\/p>\n<p>When out and about, keep a close eye on your credit card as well, and report any suspicious activity to the <a href=\"http:\/\/www.ftc.gov\/\">Federal Trade Commission<\/a>.<\/p><\/blockquote>\n<p>It all just shows how hard it is to change an infrastructure once it&#39;s in, no matter how many flaws it has.&nbsp; It&#39;s the problem of exposing your secret (as happens with north american credit cards) rather than using your secret to prove something.&nbsp; InfoCards give us a way to fix this in the online environment.&nbsp; The payment identity provider does not need to release a long-term credit card number &#8211; just a one-time approval (potentially modelled as a credit card number for compatibility purposes).<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the top five credit card scams will probably be of interest to everyone working on privacy and security threat modeling.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/426"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=426"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/426\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}