credit cards

5 ways thieves steal credit card data

Suspects: Harry the Hacker and Phishing Phil
Suspects: Harry the Hacker and Phishing Phil

Modus operandi: Harry the Hacker installs malware -- a type of software that damages or infiltrates a computer or network -- onto a legitimate website with low security. The malware instantly downloads onto your computer when you visit the site and allows Harry to access your information. In another scenario, Harry puts malware on public computers and gathers the information you share with that computer, says Urban. Harry also infiltrates the computer system of banks, retailers and other businesses and extracts personal account information, Noonan says.

Phishing Phil uses malware to go after your laptop. He sends emails with attachments that promise dancing kittens or some other bait. When the user opens the attachment, malware instantly downloads onto the computer and leaves confidential information vulnerable. Phil also sends emails from a familiar sender with a link to a contaminated website that installs malware onto your computer. Some malware, called spyware, allows Phil to capture every keystroke including passwords to your financial accounts.

advertisement

Show Bankrate's community sharing policy
          Connect with us
Product Rate Change Last week
Balance Transfer Cards 15.66%  0.01 15.67%
Cash Back Cards 16.36%  0.03 16.33%
Low Interest Cards 10.87% --0.00 10.87%
 
Search
advertisement
CREDIT CARD WEEKLY NEWSLETTER

Get advice for managing credit cards, building your credit history and improving your credit score. Delivered weekly.

advertisement

Blog

Jeanine Skowronski

Smartwatch app answers: Which card?

A smartwatch app from Wallaby Financial can recommend what credit card to use based on rewards, balances and credit utilization.  ... Read more

Partner Center
advertisement

Connect with us