{"id":1704,"date":"2010-04-27T19:22:00","date_gmt":"2010-04-28T02:22:00","guid":{"rendered":"http:\/\/www.bspcn.com\/2010\/04\/27\/6-ways-to-protect-yourself-from-credit-card-fraud\/"},"modified":"2010-04-27T19:22:00","modified_gmt":"2010-04-28T02:22:00","slug":"6-ways-to-protect-yourself-from-credit-card-fraud","status":"publish","type":"post","link":"http:\/\/localhost\/wordpress\/2010\/04\/27\/6-ways-to-protect-yourself-from-credit-card-fraud\/","title":{"rendered":"6 Ways To Protect Yourself from Credit Card Fraud"},"content":{"rendered":"
Written by Stan Reybern<\/a><\/p>\n The biggest drawback of using a credit card is the risk of credit card fraud. Unlike debt (which is incurred consciously) credit card fraud can strike at any time, and frequently with no warning to the card holder until it\u2019s too late. And the consequences range from the merely annoying, such as having to call and cancel your stolen card, to the downright catastrophic, such as identity theft. With so much at stake, it pays to know what the most prevalent types of credit card fraud are, how victims are tricked, and how you can protect yourself. Billshrink explains the six most serious threats \u2013 and offers six protection tips \u2013 below.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n The oldest form of credit card fraud is the brazen theft of physical cards by criminals. Consumers are susceptible to theft in any location where they are joined by strangers \u2013 the bank, the supermarket, even a busy city street. Professional pickpockets have trained themselves to detect signs of distraction and move in for the kill when it appears that you are not paying attention. Having your credit cards stolen by such people exposes you to all manner of fraud. If detected early, you can stop the damage by calling your card issuer and canceling the card. However, if the theft goes undetected, there are few limits to what the thief can do: making extravagant purchases, applying for new credit cards, and in some extreme cases, taking out hefty loans in your name.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n Orders placed via Internet and mail are a frequent target of credit card fraud because the actual, physical card is not required or visible for the order. Such transactions allow thieves to use stolen cards without exposing themselves to the risks of in-store shopping (such as being caught on security cameras or apprehended by police.) Unfortunately, card not present fraud penalizes two<\/strong> parties: the original consumer who had their card stolen, and the merchant who unknowingly processed fraudulent orders and will, in all likelihood, have them charged back when the original consumer protests. Card not present orders are also less likely to be investigated, since there are, again, usually no immediate red flags that distinguish stolen card orders from legitimate ones.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n Application fraud is one specific version of what is broadly referred to as \u201cidentity theft.\u201d As the name implies, it essentially involves a criminal using someone else\u2019s name and credentials to fill out a credit card application without their permission. Often times, the thief sets the stage for application fraud by stealing supporting documents from the victim, such as utility bills or bank statements, which are then used to substantiate the thief\u2019s fraudulent credit card application. If and when they are approved for a card in the victim\u2019s name, thieves face few restraints in the damage they are capable of inflicting. FICO scores and payment histories can be ruined in a heartbeat by determined thieves in possession of a fraudulently granted credit card.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n Another more brazen type of credit card identity theft involves what is known as \u201caccount takeover.\u201d Under this method, the criminal gathers pertinent documents and information about a victim in order to call their credit card company requesting a change of address (one controlled by the criminal.) Following the address change, the criminal proceeds to impersonate the victim by submitting \u201cproof\u201d of identity to the credit card company and requesting that a replacement card be sent to the new address. Although some card issuers attempt to thwart account takeover by requiring card holders to submit photocopies of the card in question and its monthly statements, not all of them do, and this remains an extremely problematic form of credit card fraud.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n A more modern form of credit card and bank fraud is the so-called \u201cphishing\u201d attack. Rather than rooting through your trash or swiping your wallet at a busy intersection, sophisticated Internet hackers simply lead victims into an authoritative-looking website (usually one claiming to be their bank or credit card company.) Once the victims land on these websites, they are asked to fork over their credit card or bank details as part of a \u201croutine security check.\u201d At no point is it clear that such websites are stealing your information. Indeed, great care is taken to mimic the look and feel of real bank websites down to the most intricate details (including logos, URLs and slogans), such that the entire process of keying in your information feels natural and safe. Only once you have clicked \u201cSubmit\u201d will your credit card information fall into the hands of ruthless identity thieves.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n Skimming is perhaps the form of credit card fraud most difficult to prevent. While the methods above all involve outside<\/strong> criminals, skimming is when a dishonest employee interferes in legitimate transaction that victims did make. An example would be if you walked into an electronics store and bought an iPod on credit, only to have an unscrupulous clerk record your card data and take a spending spree on your tab. Sadly, this is not only difficult to prevent. It is also difficult to detect, after it has occurred. Generally speaking, the last person a defrauded consumer suspects is the friendly store clerk who checked them out. Therefore, it is only once a particular merchant has been involved with a substantial number of credit card fraud incidents that they are even suspected of skimming, much less investigated or prosecuted for any wrongdoing. A merchant who skimmed only once in a while might, in all actuality, never be suspected of anything for as long as they remained in business.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n One surefire way to reduce your exposure to most forms of credit card fraud is to not always<\/em> leave home with one. For one thing, a criminal can\u2019t swipe what you don\u2019t have on you. But it also reduces the number of physical card transactions you make, which, in turn, limits your chances of being scammed in proportion. If you don\u2019t want to leave home without plastic of some kind, get a credit card with a low limit and bring that. This way, provided the criminal doesn\u2019t have any additional documentation about you, the worst they can do is spend what that card allows, which is purposefully not enough to devastate your finances.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n Leaving your card at home is all well and good to prevent in-person fraud, but what about shopping online? Surely, you can\u2019t be expected to sacrifice the convenience of buying online just to keep prying eyes out of your finances. Luckily, nothing of the sort is needed. By using virtual credit cards (which have a different number than your regular credit card and expire after one use) you can remove the one thing from the equation that attracts criminals: a viable card to steal. Thieves who intercept virtual credit card numbers will soon find that they no longer work, which will send them on their way toward the next victim-in-waiting. Best of all, most banks and credit card companies (including PayPal) now offer virtual cards for little or no cost.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n A key element in several types of credit card fraud, as you now know, are the supporting documents (like bank statements or utility bills) that enable a complete stranger to pose as you to your credit card company. The surest way to prevent criminals from getting their hands on such documents is to shred them before they leave your home. Do not, as many foolishly do, simply toss those papers in the trash and figure that no one will \u201creally\u201d stoop so low as to empty your garbage cans to find them. Professional identity thieves can and will do just that, because they know from experience that it pays off in spades. Don\u2019t take that chance. Instead, invest $40 in a small paper shredder and make it a rule of the household that nothing hits the trash can without being shredded first.<\/p>\n <\/p>\n Image Source<\/a><\/p>\n As a general rule, most banks and credit card companies will never request your account numbers via e-mail. Such requests (in the unlikely event they occur at all) will occur over the phone or, more likely, in person. No matter how official, credible, or authoritative an e-mail or website appears to be, if it is asking for sensitive information \u2013 especially in connection with a \u201croutine security check\u201d \u2013 you can safely assume that you are being scammed and back away. In fact, most banks (on their real<\/strong> websites) explicitly state that they will never approach you for this information in any such manner.<\/p>\n <\/p>\nPhysically Stolen Cards<\/h4>\n
\u201cCard Not Present\u201d Orders<\/h4>\n
Application Fraud<\/h4>\n
Account Takeover<\/h4>\n
Phishing<\/h4>\n
Skimming<\/h4>\n
How to Protect Yourself<\/h3>\n
Don\u2019t Habitually Leave Home With Your Card<\/h4>\n
Use Virtual Credit Cards<\/h4>\n
Shred Your Mail<\/h4>\n
Do Not Submit Credit Card Numbers to Bank Emails<\/h4>\n
Shop Only at Trusted Merchants<\/h4>\n