Akamai Technologies, Inc., shared five common shopper profiles observed during the year-end shopping period and the scams they should watch out for.
Dean Houari, Director of Security Technology and Strategy, APJ, Akamai said:
It is no surprise that attackers are looking to take advantage of the flurry of peak retail activity online during the extended shopping festival season since there's much to gain financially, especially in Asia, which accounts for approximately 60 percent of global ecommerce sales. It's essential that both shoppers and retailers work together to learn how to watch out for scams and protect themselves.
Houari added that the number of cyber-attacks continues to rise and mutate all the time, with 2022 seeing a sharp threefold increase in malicious bot attacks.
DO YOU FIT INTO ONE OF THESE SHOPPER PROFILES?
Be wary of saving payment details on merchant websites. While this may be convenient, it can leave data vulnerable if the merchant is breached.
01 THE PLANNER
A Planners have their presents wrapped and ready, months before the holidays or any special occasions. Making and planning purchases well ahead of time, Planners often save their credit card information, logins and other personal information on shopping sites.
Most likely to fall for: Credential Stuffing
- During such attacks, attackers use lists of compromised user credentials to breach into a system via malicious bots, based on the assumption that many users reuse usernames and passwords across multiple services.
Tips to protect against credential stuffing:
Denne historien er fra February 2023-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent ? Logg på
Denne historien er fra February 2023-utgaven av HWM Singapore.
Start din 7-dagers gratis prøveperiode på Magzter GOLD for å få tilgang til tusenvis av utvalgte premiumhistorier og 9000+ magasiner og aviser.
Allerede abonnent? Logg på
Should I Buy Cyberinsurance?
Personal cyberinsurance covers a range of cybercrimes such as cyber extortion, cyberbullying, online fraud, and data loss.
Quick Tips: Five Things To Do If You Get Hacked
It might seem like an obvious choice at first, but many people often resort to panic-clicking device options, rebooting, Googling for solutions, calling tech support (or that tech-savvy friend) for help, all while leaving the compromised device connected.
CLASH OF THE EXECUTIVE SALOONS: BMW 5201 VS MERCEDES-BENZ E200
The BMW 5 series and Mercedes-Benz E-Class are motoring institutions.
SENNHEISER TULLAMORE FACTORY TOUR: HOW THE WORLD'S BEST HEADPHONES ARE MADE IN IRELAND
It’s a relatively common practice for brands to have separate facilities for parts manufacturing and product assembly, whether it’s for cost or other reasons.
Tech Awards 2024 Readers' Choice
BEST OF PERSONAL COMPUTING
Good For Nothing
After a rocky start with the Nothing Phone (1), the company turned things around by releasing the incredible Nothing Phone (2).
A For Affordable AI
The Google Pixel 8a has arrived, offering many features from its flagship siblings at a more affordable price. It maintains a sleek, compact design, making it easy to handle with one hand.
Mercedes Benz EQS SUV
Mercedes-Benz's adoption of electricity has been impressively rapid.
5 Steps To Secure Your Home With A Mesh Network
Firewalls filter data in network traffic to protect the network from a wide variety of malicious attacks and malware.
The Best Hair Straightener
When I first saw the Dyson Airstrait straightener, my immediate feelings were one of cautious optimism.