Identity Fraud on Caffeine! The Threat of the Coffee Shop

1 | 2 | 3 | 4 | 5 | 6 | 7
Next Identity Fraud on Caffeine! The Threat of the Coffee Shop-3 Next

Here's how the fraudster does it:

  1. The fraudster sits in a coffee shop using his or her laptop to create a Wi-Fi hub that's identically named to the venue's legitimate Wi-Fi hotspot.
  2. Customers and coffee lovers log onto the fraudster's hotspot, which contains malware that allows the fraudster to access their machine while he is sitting nearby.
  3. The fraudster accesses the customer's online accounts by hacking their password using cryptography tools such as Cain & Abel.
  4. The customer leaves the coffee shop and the fraudster moves onto his next coffee-drinking victim, all the while amassing access to online accounts for banking, retail and social media, ready for exploitation.

Jumio Inc, a next-generation credentials management company, is cautioning users to be wary of which Wi-Fi network they are connecting to at their local coffee shop. The danger of fraudsters running bogus networks with the same name as the real Wi-Fi network is revealed in new research from Jumio in its soon to be released white paper, "The Fraudsters Playbook."

David Pope, director of marketing and payment fraud expert at Jumio, asserts, "Businesses and consumers alike must be aware that there are many disreputable networks posing as official networks -- their only true purpose is to steal the personal details of unsuspecting Wi-Fi users."


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.