Identity Fraud on Caffeine! The Threat of the Coffee Shop

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Identity Fraud on Caffeine! The Threat of the Coffee Shop-3 Next

Here's how the fraudster does it:

  1. The fraudster sits in a coffee shop using his or her laptop to create a Wi-Fi hub that's identically named to the venue's legitimate Wi-Fi hotspot.
  2. Customers and coffee lovers log onto the fraudster's hotspot, which contains malware that allows the fraudster to access their machine while he is sitting nearby.
  3. The fraudster accesses the customer's online accounts by hacking their password using cryptography tools such as Cain & Abel.
  4. The customer leaves the coffee shop and the fraudster moves onto his next coffee-drinking victim, all the while amassing access to online accounts for banking, retail and social media, ready for exploitation.

Jumio Inc, a next-generation credentials management company, is cautioning users to be wary of which Wi-Fi network they are connecting to at their local coffee shop. The danger of fraudsters running bogus networks with the same name as the real Wi-Fi network is revealed in new research from Jumio in its soon to be released white paper, "The Fraudsters Playbook."

David Pope, director of marketing and payment fraud expert at Jumio, asserts, "Businesses and consumers alike must be aware that there are many disreputable networks posing as official networks -- their only true purpose is to steal the personal details of unsuspecting Wi-Fi users."

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.