Protecting Credit Cards

(Image used under: Creative Commons 3.0 [SRC])

Credit and debit cards are very similar other than that credit cards are protected by a federal law that limits your liability for unauthorized transactions. Therefore, it's generally best to use credit cards given a choice because you won't be liable for unauthorized charges (and have a variety of other protections as well. Still, it's not fun to have to replace a credit card so here are some tips to keep them out of the hands of bad guys:

Watch for skimmers

It's not incredibly likely that restaurant servers or other store employees will use a handheld card skimmer, but if you're worried, you can ask to pay at the register. Much more likely is to find a card skimmer "in the wild"; usually attached to a credit card system of a gas pump. Always look for loose or mismatched pieces where the cards would be inserted. Go ahead and give it a firm tub and shake just to see if something comes loose (and if one does, call the police).

Cross out your card number on receipts

This shouldn't be a problem anymore, but I still find stores now and then that have really old credit systems where it's a good idea to make sure the full credit card number isn't visible on the receipt. If it is, scratch it out and if the store/restaurant employee complains, just remind them that printing the credit card number on a merchant copy is against federal law:

According to the federal Fair and Accurate Credit Transaction Act (FACTA), the electronically printed credit and debit card receipts you give your customers must shorten — or truncate — the account information. You may include no more than the last five digits of the card number, and you must delete the card’s expiration date.

Don't let online companies store your card

It's simply a matter of odds. The more places your card is stored online, the more likely it will be caught up in a breach. If you don't shop somewhere often, decline to store payment information.

Use Virtual Cards

If your bank has this feature and you wish to make a purchase with a store you don't know or trust yet, use virtual credit cards. These are one-time use numbers attached to your real credit card, but using a number that's only good under certain restrictions (like a limited number of transactions, specific time span, one-time use at only one store, etc.).

Avoid contactless pay systems

The last thing you should have to worry about is your credit card being accessed remotely without your knowledge, but the wireless chips used in some cards make that possible. For example, the EZ-Pass system uses an RFID chip that can be read and easily copied from hundreds of feet away. Once copied, someone can go through the tolls while leaving you with the bill. If a system doesn't require any physical contact, just proximity, then you're probably using RFID and you're at risk (this is not the same as chip cards that still require actual mechanical contact and can't be waved over a reader to pay.

Tags: ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]