DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled



Similar documents
Privacy 101. A Brief Guide

RESEARCHBRIEF. Beyond Online Gaming Cybercrime: Revisiting the Chinese Underground Market

The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection

IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

A Cybercrime Hub. Trend Micro Threat Research. Trend Micro, Incorporated. A Trend Micro White Paper I August 2009

T E C H N I C A L S A L E S S O L U T I O N

McAfee S DO s AnD DOn ts Of Online Shopping

Security Guide to Social Networks

Stop Spam. Save Time.

VDI Security for Better Protection and Performance

A consumer research study commissioned by ATG

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

THE OMNICHANNEL CONSUMER

Learn about each tool in parental controls and find out how you can use them to secure you and your family.

Common Mistakes to Avoid When Selecting a Payment Processor

Securing the Mobile App Market

DIGITAL LIFE E-GUIDE. How to Claim Your Online Privacy

This guide aims to get you started on decluttering the most important aspects of your digital life.

How to Configure Your Account s Privacy Settings

10 Quick Tips to Mobile Security

Eco and Ego Apps in Japan

The Changing Face of SSL

Checkout Conversion Optimization Best Practices

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Microsoft SharePoint Use Models and Security Risks

Latest Business Compromise Malware Found: Olympic Vision

What Do You Mean My Cloud Data Isn t Secure?

The Impact of Extended Validation (EV) Certificates on Customer Confidence

TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS

HOW THEY ARE SHOPPING NOW

Correlation and Phishing

MasterCard Special Edition

Web. Paul Pajares and Max Goncharov. Connection. Edition. ios platform are also at risk, as. numbers via browser-based social.

Devising a Server Protection Strategy with Trend Micro

Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

Malware & Botnets. Botnets

Have you ever seen an online ad with a product or brand that you searched just ten minutes ago? That s the result of customized advertising.


WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

Merchant Payment Solutions

Online Shopping Cart Best Practices. How to win online customer trust and convert more sales at the final hurdle

HTTP Virus Protection in the Enterprise Environment

Genie Gateway Buyer s Guide. Introducing the Features, Functions & Tools

Your Digital Dollars Online & Mobile Banking

The Official Guide. Choosing your Point of Sale

Perception and knowledge of IT threats: the consumer s point of view

Contents. Knowledge base

Sending money abroad. Plain text guide

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

TRANSFORMING THE PAYMENT EXPERIENCE INTO A SALES TOOL

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Shop Online with Confidence

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Mistake #1: Assuming that lowest rate means lowest overall cost.

Devising a Server Protection Strategy with Trend Micro

ZeuS: A Persistent Criminal Enterprise

2012 NORTON CYBERCRIME REPORT

Home Automation and Cybercrime

Who Owns Security in the New Ambient Cloud?

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

White Paper. Securing the Rise of the Mobile Apps Market: Code Signing and Mobile Application Development

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

OMNI-CHANNEL NEEDS OMNI-SECURITY

Non thesis phd programs >>>CLICK HERE<<<

Implementing Microsoft File Exclusions in Trend Micro OfficeScan 8.0

They Did What?!? How Your End Users Are Putting You At Risk

Practical guide for secure Christmas shopping. Navid

a CyberSource solution Merchant Payment Solutions

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

N.Y.C. CIVIL COURT COMMUNITY SEMINAR SERIES - IDENTITY THEFT

What You Should Know About Cloud Storage

The Payeezy SM ecommerce Solution It pays to dream big.

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Safety guidance. Buying electrical goods online? The safe shopper s guide. electricalsafetyfirst.org.uk

Beware Of Phishing A Trend Micro White Paper

National Cyber Security Month 2015: Daily Security Awareness Tips

PRICING GUIDE AccessBanking Fee sheet. Moving Forward TM. Still bringing you real banking value

Online Cash Manager Security Guide

Online Banking Fraud Prevention Recommendations and Best Practices

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Best practices for choosing and integrating a mobile payments platform. A GlobalOnePay White Paper

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

Virtualizing Gateway Security

MAXPRO. Cloud CLOUD HOSTED VIDEO SERVICES TO PROTECT YOUR BUSINESS. Video Anytime, Anywhere

1) DOES YOUR SOFTWARE

Wireless (In)Security Trends in the Enterprise

Online Accounting Software TYPES OF PAYMENT GUIDE

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

A number of factors contribute to the diminished regard for security:

Bricks And Clicks A Look At Today s Retail Marketing Trends

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Transcription:

DID YOU KNOW THAT... Javelin Strategy and Research projects a 78% increase in the U.S. shopper volume by 2014. 43% of owners of Webenabled smartphones use these to help them shop (e.g., check prices, read product reviews, and look for promos). Asia/Pacific online shop owners earned US$156.9 billion in 2010. 89.3% of U.K. users shopped online as of October 2010. France users came in second place with an 84.3% reach, followed by German users at 81.7%.

WHY SHOP ONLINE? The Internet, regardless of device (e.g., computer, smartphone, or tablet), allows anyone, anywhere to buy, pay, and simply wait for goods bought online to be delivered straight to their doorsteps. It used to take weeks or even months to buy hard-to-find goods overseas in the past. Now, buying anything can be done in mere days. That is the miracle of online shopping. Convenience, ease, and better deals are just three reasons why more and more users shop online.

WHY TARGET ONLINE SHOPPERS? Online shopping is fast becoming the preferred purchasing method compared to physically buying stuff from stores. With a lot of money changing hands in this space, cybercriminals took notice. Online shoppers have become preferred cybercriminal targets. Case in point, a recent mass compromise affected 8.3 million sites that use the open source e-commerce solution oscommerce.

WHAT ARE CYBERCIMINALS AFTER? Credit card credentials Online banking personal identification numbers (PINs) Other personal data related to online shopping To thwart cybercriminals malicious efforts, keep the following safety precautions in mind.

IF THE OFFER S TOO GOOD TO BE TRUE, IT MOST PROBABLY IS. When looking for the best deals online, watch out for unbelievable offers. Deals that are too good to be true may just be that. Not all online promos are fraudulent though. Popular online shopping sites do give discounts or freebies for big-ticket and overstocked products. It s just a matter of choosing the right sites to buy from. Search for reviews and public opinions to validate your finds.

(BOOK)MARK THE SPOT. If you want to keep buying stuff from a site, it s a good idea to bookmark it. Tempting as it is to simply rely on search engines to find the right shop, don t. Cybercriminals often count on misspelled links to lead victims to spoofed sites. Cybercriminals also employ blackhat search engine optimization (SEO) techniques to poison search results. They modify the content of malicious sites so these would appear as top results. Clicking links to these puts you at the mercy of phishers and in danger of system infections.

KEEP CYBERCRIMINALS HANDS OFF YOUR COFFERS. It s checkout time! This is where you should really be careful as it involves your hard-earned money. One wrong move can mean your loss. Never opt for a payment method that does not offer any kind of buyer protection. Wire transfers and money orders are therefore off the table. Once sent, you have no way of getting your money back. There s no way to stop a shady vendor from simply taking your money and not sending you the goods you paid for. This is exactly why these methods are preferred by scammers.

Paying via credit card offers you better protection via consumer rights laws. Some services also convert cash into credits that can buy goods online. Just make sure these have good dispute systems in case you need assistance.

DON T SHOP IN A HOT SPOT. Just as you won t buy groceries from a store in a bad neighborhood, you should also avoid shopping online in places with unsecure networks or via public hot spots. Not only can bad guys hijack your shopping session while you re connected to an unsafe network, they can also drop malicious files onto your system. The system you re using in an Internet café may already be malware infected to begin with, too. Limit your online shopping when at home. This assures uninterrupted and safe sessions, assuming you keep your system patches up to date and your network secure, of course.

TAKE A STEP CLOSER TO A SECURE ONLINE SHOPPING EXPERIENCE. Though you may already know everything that s just been said, you may slip sometimes. It happens to the best of us. Cybercriminals are after one thing alone your money. They re just waiting for you to slip and give them access to your cash. To ensure anytime, anywhere online safety, regardless of device, use a security solution that protects you from any and all threats. Keeping safe online shopping practices in mind certainly goes a long way. Using a reliable security solution, however, lets you rest easy when making purchases.

TREND MICRO Trend Micro, Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com. TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 US toll free: 1 +800.228.5651 Phone: 1 +408.257.1500 Fax: 1 +408.257.2003 www.trendmicro.com 2011 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.