mercoledì 13 luglio 2011

CREDIT CARD 1


First of all cloning, which allows you to capture data from a card and obviously the owner does not know if the POS or ATM has been tampered with.




Another danger is the phishing scammers likely to reproduce a letter from your bank asking you to provide certain information such as PIN, expiry date. Warning! This refers to information that should never be transmitted over the network nor nor in reality. Also be careful not to throw this information in the bins, by 
which could be retrieved.
Finally, cloning is based on the acquisition of information from 
holder. 

For purchases over the network just will not use the card of unknown sites and take advantage of the protection system made ​​available by the Italian and international banking. Unfortunately, in real life we can not know whether the equipment of 
operators were counterfeit. 
However, we can do something! We can activate a notification service through which 
sms alerts us if the card was used. Sure, it can prevent the damage, but the limit if we block the card promptly.


But technology advances are making progress and analysis of operations systems and predictive systems: monitoring the operations performed, the system detects abnormal use and in this case it does the verification procedure, until 
card lock.
In addition, it is introducing the "liability shift" in case of fraud is addebiatato the economic damage to those who, although they may not have activated control procedures. The most important change, however, is the transition from stripe cards 
the magnetic microchip, which ensures greater safety.
In the future, there will be an additional shield offered by the "token", the mechanisms by which we obtain passwords disposable

Nessun commento:

Posta un commento