Identity Fraud on Caffeine! The Threat of the Coffee Shop

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Identity Fraud on Caffeine! The Threat of the Coffee Shop-3 Next

Here's how the fraudster does it:

  1. The fraudster sits in a coffee shop using his or her laptop to create a Wi-Fi hub that's identically named to the venue's legitimate Wi-Fi hotspot.
  2. Customers and coffee lovers log onto the fraudster's hotspot, which contains malware that allows the fraudster to access their machine while he is sitting nearby.
  3. The fraudster accesses the customer's online accounts by hacking their password using cryptography tools such as Cain & Abel.
  4. The customer leaves the coffee shop and the fraudster moves onto his next coffee-drinking victim, all the while amassing access to online accounts for banking, retail and social media, ready for exploitation.

Jumio Inc, a next-generation credentials management company, is cautioning users to be wary of which Wi-Fi network they are connecting to at their local coffee shop. The danger of fraudsters running bogus networks with the same name as the real Wi-Fi network is revealed in new research from Jumio in its soon to be released white paper, "The Fraudsters Playbook."

David Pope, director of marketing and payment fraud expert at Jumio, asserts, "Businesses and consumers alike must be aware that there are many disreputable networks posing as official networks -- their only true purpose is to steal the personal details of unsuspecting Wi-Fi users."

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.