Identity Fraud on Caffeine! The Threat of the Coffee Shop

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Identity Fraud on Caffeine! The Threat of the Coffee Shop-6 Next

What places should consumers think twice about before connecting to an unsecure Wi-Fi network? Here are the top five locations for online identity theft:

  1. Coffee shops and restaurants: Between interviews and lunch meetings, food and drink establishments are notorious for attracting both unsuspecting workers logging on to get work done and fraudsters looking for easy targets.
  2. Airports and other transportation hubs: The large amount of travelers making the most of their gate times online has become a goldmine for fraudsters.
  3. Hospitals and doctors' offices: Given the potential of using a shared network to access or view personal information like medical records and payment records, medical offices can also serve as a prime spot for identity theft.
  4. Libraries and bookstores: Both of these establishments are places where people commonly go online to get work done, connecting to a shared network and putting their information at risk.
  5. Apartment buildings: While residents are often encouraged to password-protect their personal wireless networks, many people leave their networks free of password protection in favor of convenience. This choice often puts people at risk in their own homes.

Jumio Inc, a next-generation credentials management company, is cautioning users to be wary of which Wi-Fi network they are connecting to at their local coffee shop. The danger of fraudsters running bogus networks with the same name as the real Wi-Fi network is revealed in new research from Jumio in its soon to be released white paper, "The Fraudsters Playbook."

David Pope, director of marketing and payment fraud expert at Jumio, asserts, "Businesses and consumers alike must be aware that there are many disreputable networks posing as official networks -- their only true purpose is to steal the personal details of unsuspecting Wi-Fi users."

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.