Kim Komando 5 ways thieves are after your credit cards

Kim Komando also explains the five ways in which the criminals are after your credit card payment. In this photo illustration, there are three Visa credit and debit Cards. (Photo-Illustration by Roberto Machado Noa/LightRocket via Getty Images)

Despite the credit-card issuers are pushing for new safety measures, each and every year, credit card theft is becoming a rampant crime. In fact, the Federal Trade Commission reports that show a significant spike in credit card fraud for the first quarter to the second quarter of this year, with approximately 110,000 reports.

Misappropriation of funds, fraud, and leakage of information have been on the rise. Not surprisingly, 2019 and is on track to be the worst year ever for the with your privacy, online and otherwise. What do you need to be aware of? Click or tap here for 6 of the biggest scams to fool even the savviest of internet users.

How can you stay safe in a digital world, with hackers lurking around every corner? It all starts with a strong password to protect your accounts, and how to create an effective product, it is about more than just throwing in a capital letter and a number. Tap or click here to see the 5 rules you have to follow each and every time you create a new password.

It’s keeping track of your finances is also required to exercise due care. Here’s what you need to know about the five challenges that face you and to be your card bills. So, let’s start with the sneak credit card skimmers, as they are more difficult to detect.

1. Sneaky skimmersCredit card skimmers to sit directly on top of the usual credit card slots and is designed not to interfere with their normal function. You can also make use of what appears to be a normal card reader, and you never know, your information will be taken by a con artist.

The most common locations for credit card skimmers, gas pump and Atm machines. After hours of work, they are often not monitored, which makes it easy for criminals to install and mount on a slotted spoon.

So how can you spot them? The Off-colored plastic with an irregular light, or oddly-shaped people can be a red flag, but a lot of skimmers are so small and hidden, they are difficult to identify. There are a number of different styles, each with their own story, and I can help you to identify it. Click or tap on it to see what the money is to steal card skimmers look like.

How can you avoid such devious devices as well? The pay of a cashier at the gas station, it’s a great way to stay clear of skimmers in a high-risk area. When choosing to use an ATM, try to keep the machines plugged in to your bank instead of the generic units and all of the wonderful people locked away behind doors in the evening.

2. Malicious traders

Pay the cashier and not to the hazard of the merchant, or a point-of-sale fraud. Credit card skimmers or skimming of the software, and can easily be connected to a register, and the report of the sketchy shops will do this, not out of the ordinary.

One of the most powerful tools to fight retail fraud in your wallet: the new chip on your credit or debit card. Not every card uses a chip in it, but that will be a lot more difficult to get the data you want to extract from it. Most of the skimmers scanning the magnetic stripe to extract your data, so your chip may not be copied, in the same way.

You can also choose to have the money to be used on top of a map, you should make sure to wear a little bit more than you need to. A lot of the same bills on your person makes you more vulnerable to attacks and theft.

Are not exploited to the full. Your personal information is in front of your eyes. Click or touch for the 4 essential steps to safer online shopping and banking, in order to protect yourself from potential scammers.

3. Horrible hack to the popular places

Establishments such as fast food restaurants are increasingly high-priority targets for hackers due to the sheer amount of money that passes through their doors each and every day.

Cash and cash equivalents it is the safest way to avoid fraud, but that an alternative strategy is to use your credit card if you’re out to dinner or go shopping instead of using your debit card. A credit card limits you can set a limit to the amount a thief can steal it in one go. If a thief has access to your bank account, it is possible for them to get to you all the way to zero.

RELATED: Scammers are not the only ones with a clever hack. I have made up to 10 pro-tips to help you improve the speed of your Wi-Fi internet access included, spice-up your Netflix queue, will extend the life of your laptop, and much, much more. Tap or click here to see 10 essential digital-life-hacks you’ll wish you knew sooner.

Strong consumer protection laws for fraudulent credit card charges do you mean, you’d be on the hook for $50 at the most. The law is against your debit card is stolen, however, is not as strong. You can also challenge transactions made with a stolen card, but be prepared to wait in order to get your money back. And you don’t need to alert the bank in time, you can get the entire loss on the tip of your nose.

Thieves will do whatever it takes to get your information, but you don’t have to be a victim. Do not sit by passively and allow them to steal your information. Fight back and shop smart.

4. The fear of the free of charge Wi-Fi internet access included

Everyone will need to use the internet while travelling, a hotel, or coffee shop, Wi-Fi, it is usually the default choice. If Wi-Fi is free of charge, that’s even better, is it? Well, not so much.

As we have discussed previously, free of charge Wi-Fi internet access and has a host of its own security. It is easy for network owners to track your activity, and even make it easier for outsiders and hackers to target the computer that you are using on your network. This goes double if you are using a public Wi-Fi at the store or make online purchases. Our advice would be? Wait for it to go shopping or to the bank, until you get to a secure network.

If you can’t wait, you can mask of your network activity by using a VPN to hide your identity, protecting your devices by means of encryption as well as to keep would-be hackers. Tap or click for a comprehensive guide on how to get the Vpn’s working, and how to set it up on a Windows PC or Mac.

5. Angry e-mails to infiltrate into your mailbox

We can’t cover for fraud or hacking without talking about the phishing scams — the most annoying and the most prolific cyber-crime on the internet. It’s so popular is because it is very easy to do and requires the victim to be “the hacker” on its own merits. It’s a classic bait-and-switch to a credit card and identity information.

Usually, users have to find it in your inbox, or a social media platform such as Facebook Messenger. Sometimes the posts look like official government forms, and corporate communications. The one thing they all have in common? They can refer you to a different website in order to trick you into entering your personal information.

No matter what the message, or the web site claims that you should never give out personal information online, unless you know for sure that the website is legitimate. You can usually tell by looking at the browser’s address bar. If the url is long and complex, and it contains a trust “.com” and you have to know and love, it can be a fake.

And don’t forget, be careful when you open an e-mail or message from someone you don’t know and never follow any suspicious external links or downloading unknown files. With a keen eye and a natural skepticism, which is the best way to stay safe, both on-and off-line. Your wallet will thank you for it.

BONUS: 8 ways you’re ruining your computer

We all use computers in one capacity or the other, but that’s not to say that we are all committed to taking care of them. There are things that we can do it time and time again that it is very difficult to make, our machines are in tip-top shape, as it is not running any anti-virus software, whether it’s leaving a ton of tabs open online, so you can get your achievements, it is eventually pulled down.

There are a number of things that you can do in order to make sure that you fast track your way to a certain doom, in terms of your computer, no matter what. We have assembled a number of tips to ensure that you are constantly committing acts of all Windows, faux pas.

What is the digital lifestyle, if you have any questions? Call Kim ‘ s national radio show, and then tap or click, here to find it on your local radio station. You can listen to, or look for, the Kim Komando Show up on your phone, your tablet, tv or on the computer. Tap or click here to see Kim’s perspective.

Copyright By 2019 At The Latest, WestStar Multimedia Entertainment. All rights reserved.

Learn about the latest technology on The Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and gives advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips newsletters and more, visit her web site at

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most popular