How to be safe when making payments with your mobile

The popularity of electronic payments has been growing steadily in recent years.

According to a recent survey by the US Federal Reserve, in 2019 cash payments accounted for only 26% of all payments, while for the remaining 64% credit and debit cards and electronic payment methods were used.

Meanwhile, the COVID-19 pandemic has brought with it drastic changes in the way we shop: e-commerce is facing an increase in demand as governments limit human interaction to limit the spread of the virus, but also because entering into we do most of our shopping online.

And as we make our payments more and more often without cash, new products and payment methods have been created via mobile. Apple Pay, Google Pay, PayPal, Venmo and WeChat Pay have emerged as the most popular mobile payment applications. However, mobile shopping can be risky.

Οι ειδικοί της ESET, της παγκόσμιας εταιρίας ασφάλειας στον κυβερνοχώρο (), show us some of the main dangers and ways in which we can be deceived and advise us on what we can do to protect ourselves.

Dangers

One of the biggest risks you run is the loss of your device and this is because some of your most sensitive data and transaction data are on your mobile device if you are using mobile payment applications. If you do not lock your cell phone properly, criminals can charge your cards or use your apps to make purchases. In addition to ending up with either an empty bank account or overloaded cards, this can damage your creditworthiness, which can make it difficult to get a loan or mortgage in the future.

Smartphones, like other devices, can be infected by malware. Depending on the type of software, cybercriminals can carry out various types of malicious activities.

The keyloggers for example, they can record and transmit to cybercriminals what you type on your mobile, allowing them to obtain the passwords or account credentials you use in payment applications. Another thing cybercriminals can do is develop fake apps that masquerade as something else to attack the payment apps you use. For example, the της ESET ανακάλυψαν ένα trojan που μεταμφιέζεται ως που βελτιώνει την απόδοση της μπαταρίας του κινητού, το οποίο στοχεύει στους χρήστες της επίσημης εφαρμογής PayPal και προσπαθεί να μεταφέρει 1.000 ευρώ στους λογαριασμούς του εισβολέα.

Do not deceive me

Beyond his theft smartphone or trying to infect it with malware, cybercriminals rely on other, more traditional means to lighten your wallet. They are based on cyber fraud.
For example, cybercriminals may pretend to be someone you may already know and ask you for help in dealing with an emergency. The scammer can also access your contact list and pretend to be someone to whom you have already sent money using a mobile payment application.

Cybercriminals can also resort to more common ways of cheating. They can use dating apps to build a relationship and then try to extract money from their victims, citing various reasons, such as that they urgently need money to pay for hospitalization.

Another popular tactic is scams through contests or prizes. Here the would-be victims will be informed that they have won a huge prize, however, to collect it they will have to pay a fee plusς. Φυσικά, δε θα λάβουν ποτέ το «απίθανο» έπαθλο από τον φανταστικό διαγωνισμό στον οποίο δε συμμετείχαν ποτέ, και πιθανότατα δε θα λάβουν ποτέ πίσω και την « payment".

There are also attacks e-fishing, where scammers impersonate the company that uses the app for mobile payments. Fake websites created by scammers try to trick victims into revealing their account password, so they can empty accounts or sell logins to others.

How to protect yourself

The first line of defense to protect you and your money is to activate all the security measures that your mobile phone offers. These include activating a biometric combination (face scan, retina scan, fingerprint scan) and lock code.

Once you do this, it is difficult for someone to break into your cell phone or use mobile payment applications. This is because every time you want to access them or make a transaction or buy something, the device will ask you to verify your identity. However, there is one thing to watch out for: depending on the country, payments up to a certain limit do not require verification of your personal information.

Also, both the devices Android and Apple devices support "find my cell phone" features that allow you to remotely turn off your phone if lost or stolen… and may even allow you to delete data from a lost device remotely .

In addition, most payment applications allow you to enable additional security features, such as two-factor authentication, which you should enable immediately if you have not already done so.

You can also lock applications with additional security measures, such as biometric locks and passwords, while you can enable the same security measures for transactions. You should also enable transaction or payment notifications. Then, if suspicious activity occurs, you will be notified (almost) in real time.

To avoid receiving malicious applications that target your wallet, it is essential that you always check what you are installing on your mobile phone so that you do not install a malicious application disguised as something else. A good rule of thumb is to also check application permissions.

Last but not least, consider using a mobile security software like , to protect yourself from the majority of threats and to stop malicious activities. An added advantage is that fully equipped security products have protection for banking and payment applications.

Tips from a malware analyst

Although the risks associated with using mobile payment applications are real, some of them are more secure than other electronic payment methods, according to Lukas Stefanko, a malware researcher at ESET.
“Using services like Apple Pay or Google Pay is a bit safer than using card for contactless payment, and this is because these two applications do not provide your credit card number to the merchant. Instead, they only provide virtual account names that are created for each payment," Stefanko informs us.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).