Page 9 - index
P. 9







Despite being ripe for credit card skimming or nefarious credit card information storage, these
devices can also dump the information from your cell phone while charging! This attack method
even has a cool name: Juice Jacking!


4.) Apps (desktop or mobile) that ask you for your credit card information outside of the normal
app store.

Chances are this is not a legit application, especially if it is threatening you (you have a virus,
please deposit $10... or I've encrypted all of your files and I'll unlock them for a price.)

5.) Services that claim to be free or a free trial but still need you to input a credit card before you
can start using it. It is almost guaranteed that service is either going to scam you or sign you up
for some paid service that will be impossible to cancel.

Now, if you are wondering how exactly you are supposed to pay for the services you need in
situations like those listed above there are a few options.

One of the easiest is to use your bank or credit card to buy one-time use/reloadable cards that
do not have ties to your personal information.

Just make sure when you are checking out at the store that you go to a clerk, not a self-
checkout lane.

About the Author:

Shaun Murphy, PrivateGiant CEO

Shaun Murphy is one of the nation’s leading experts in communication
security with over 20 years experience in the industry. Shaun worked as a
subject matter expert on high-level government communications software
and hardware systems for numerous agencies. Now, Shaun has dedicated
his life to developing technology solutions for the average consumer. His
mission is to create a protected communications platform in a world where
privacy has almost ceased to exist. Shaun earned his Bachelors of Science
in Computer Engineering from the University of Central Florida. He also
holds a Masters of Computer Science from Florida Tec with a concentration in pattern
recognition and machine learning in communication systems.















9 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   4   5   6   7   8   9   10   11   12   13   14