comparemela.com

New Delhi [India], December 21 (ANI/PRNewswire): With the holidays around the corner, we're smack in the middle of every shopper's favourite season. Big sales days like Singles' Day, Black Friday, Cyber Monday, and 12.12 all offer many great opportunities for shoppers to get their fill of good deals. Akamai Technologies, Inc., the cloud company that powers and protects life online, shares five common shopper profiles observed during the year-end shopping period and the cyberscams they should watch out for to help consumers and businesses identify potential blind spots, and learn how to protect themselves this holiday season. "The number of cyber-attacks continues to rise and mutate all the time. In 2022, the most alarming has been the sharp increase in malicious bot attacks, where we recorded a three-fold increase of such attacks. What this means for the retail industry is the likelihood of increased credential stuffing, where attackers use lists of compromised user credentials to breach into a system and data scraping attacks, the process of importing information from a website into a spreadsheet or local file saved on your computer." said Dean Houari, Director of Security Technology and Strategy, APJ, Akamai. "It is no surprise that attackers are looking to take advantage of the flurry of peak retail activity online during the extended shopping festival season since there's much to gain financially, especially in Asia which accounts for approximately 60 per cent of global eCommerce sales. It's essential that both shoppers and retailers work together to learn how to watch out for scams and protect themselves," he continued. FIVE TYPES OF YEAR-END SHOPPERS 1. THE PLANNER You can spot a planner miles away! Planners have their presents wrapped and ready, months before the holidays. Making and planning purchases well ahead of time, Planners often save their credit card information, logins and other personal information on shopping sites. Most likely to fall for: Credential Stuffing During such attacks, attackers use lists of compromised user credentials to breach into a system via malicious bots, based on the assumption that many users reuse usernames and passwords across multiple services. Tips to protect against credential stuffing: - Be wary of saving payment details on merchant websites. While this may be convenient, it can leave data vulnerable if the merchant is breached. - Practice good password hygiene, by setting up different passwords for different sites. Better yet - use a password manager to set up unique, difficult-to-guess passwords. 2. THE LAST-MINUTE SCRAMBLER The opposite of Planners, Last-Minute Shoppers often remember its sale day on 11.11 or 12.12 itself, just before the clock strikes midnight. They snag their deals, but it's always down to the wire for them! Most likely to fall for: Phishing In their rush, the Last-Minute Shopper is likely to accidentally click on untrustworthy links and fall prey to phishing scams. What appears to be an email from a reputable retailer with a coveted discount may be fraudulent, but the last-minute shopper doesn't have time to check. With the rise of online marketplaces, this is becoming more common. Earlier this year, Singapore's most popular peer-to-peer sales platform was affected when attackers posing as legitimate buyers directed victims to a fake bank website where they would be asked to give their banking details to receive payment. This resulted in at least 72 people losing over USD 109,000. Tips to protect against phishing - Verify the validity of sites before clicking on them or providing any personal information. - If emails are unsolicited, be alert to any potential errors. Do not proceed if it includes wrong information, or requests to enable macros, adjust security settings or install applications. 3. The Bargain Hunter The price point is the most significant purchase consideration for these shoppers, who would sift through various sites to get a substantial deal. Most likely to fall for: Social Engineering Attacks Bargain hunters would be likely to click on spoofed emails or accept malicious extensions that function as price comparison tools. Attackers prey on buyer's eagerness for a good deal by sending them fake offers that request for their personal data on a page, even impersonating legitimate tools like Google Analytics or Google Tag Manager to compromise code and steal valuable information, impacting shopping sites. Tips to protect against social engineering attacks - Always verify the validity of the offer and the legitimacy of the sender. - Use a good spam filter for emails, as the first barrier of defence against suspicious files and links. 4. The Impulse Buyer Driven solely by emotions, impulse shoppers often do not have a specific product in mind before placing an order. They often respond to time pressure to access a coveted item on a limited-time offer, at a price too good to refuse. Most likely to fall for: Brand Impersonation Attacks Via fraudulent links, cybercriminals impersonate popular brands, tricking victims into sharing personal information, buying contraband products, visiting a fake website, downloading malware, and more. Exacerbating these trends is social media, where attackers can easily impersonate brands, engage with customers seeking to purchase items, and request for their personal details. Tips to protect against brand impersonation - Scrutinize links provided in emails and be on high alert if they are not pointing to the correct location or direct to a third-party site not affiliated with the brand. - If in doubt, reach out to the brand on their official channels to verify offers before clicking on any links to make payments. Make sure to check that accounts are verified. 5. The Researcher Researchers extensively compare products and offer before purchasing. They often have various browser extensions installed on their browsers to make quick comparisons. Most likely to fall for: Extension Malware Attacks Cybercriminals hide viruses behind add-ons, which can then install adverts, gather users' browsing history, and seek login credentials by impersonating famous apps and extensions. Malicious extensions could go undetected especially if security software programs treat known extensions as trusted applications. Most recently, attackers have been using information-stealing malware like FB Stealer, which mimics the harmless and standard-looking Chrome extension Google Translate, to prey on users. Financially motivated, attackers after effectively locking a user out of their Facebook account, abuse access to ask the victim's friends for money. Tips to protect against extension malware attacks - Only install extensions from official Web stores. - If permissions that extensions require even before installing seem suspicious, it'll be best not to install them. Retailers must do their part too! For a cybersafe shopping experience, retailers have a part to play as well. Attacks on popular retail behemoths in the last few years have revealed important lessons for merchants. Prevention is better than cure. Taking proactive steps to monitor potential threats and being ready to block unauthorised access and keep shoppers safe throughout their retail experience is essential. "As web traffic increases, attackers similarly increase their attacks. Case in point, malicious bot attacks tripled during Single's Day last year. These attacks could, immediately or in future, drain customer accounts, damage site functionality, and hold encrypted data ransom -- all at enormous costs to businesses," explained Houari. "To ensure loyalty long term, retailers must make every effort to keep shopper data safe. This could include deploying a bot solution to stop credential stuffing attempts early and using password managers and multi-factor authentication to secure users," he concluded. Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences -- helping billions of people live, work, and play every day.

Related Keywords

Laos , ,News Net ,News Release Publishing ,New Delhi India ,Ecember 21 Ani Prnewswire With The Holidays Around Corner ,E 39 Re Smack In The Middle Of Every Shopper 39s Favourite Season Big Sales Days Like Singles Day ,Black Friday ,Cyber Monday ,Nd 12 All Offer Many Great Opportunities For Shoppers To Get Their Fill Of Good Deals Akamai Technologies ,Nc ,He Cloud Company That Powers And Protects Life Online ,Hares Five Common Shopper Profiles Observed During The Year End Shopping Period And Cyberscams They Should Watch Out For To Help Consumers Businesses Identify Potential Blind Spots ,Nd Learn How To Protect Themselves This Holiday Season Quot The Number Of Cyber Attacks Continues Rise And Mutate All Time In 2022 ,He Most Alarming Has Been The Sharp Increase In Malicious Bot Attacks ,Here We Recordeda Three Fold Increase Of Such Attacks What This Means For The Retail Industry Is Likelihood Increased Credential Stuffing ,Here Attackers Use Lists Of Compromised User Credentials To Breach Intoa System And Data Scraping Attacks ,He Process Of Importing Information Froma Website Intoa Spreadsheet Or Local File Saved On Your Computer Quot Said Dean Houari ,Irector Of Security Technology And Strategy ,Pj ,Kamai Quot It Is No Surprise That Attackers Are Looking To Take Advantage Of The Flurry Peak Retail Activity Online During Extended Shopping Festival Season Since There 39s Much Gain Financially ,Specially In Asia Which Accounts For Approximately 60 Per Cent Of Global Ecommerce Sales It 39s Essential That Both Shoppers And Retailers Work Together To Learn How Watch Out Scams Protect Themselves ,Uot He Continued Five Types Of Year End Shoppers 1 The Planner You Can Spota Miles Away Planners Have Their Presents Wrapped And Ready ,Onths Before The Holidays Making And Planning Purchases Well Ahead Of Time ,Lanners Often Save Their Credit Card Information ,Ogins And Other Personal Information On Shopping Sites Most Likely To Fall For Credential Stuffing During Such Attacks ,Ttackers Use Lists Of Compromised User Credentials To Breach Intoa System Via Malicious Bots ,Ased On The Assumption That Many Users Reuse Usernames And Passwords Across Multiple Services Tips To Protect Against Credential Stuffing Be Wary Of Saving Payment Details Merchant Websites While This May Convenient ,T Can Leave Data Vulnerable If The Merchant Is Breached Practice Good Password Hygiene ,Y Setting Up Different Passwords For Sites Better Yet Usea Password Manager To Set Unique ,Ifficult To Guess Passwords 2 The Last Minute Scrambler Opposite Of Planners ,Ast Minute Shoppers Often Remember Its Sale Day On 11 Or 12 Itself ,Ust Before The Clock Strikes Midnight They Snag Their Deals ,Ut It 39s Always Down To The Wire For Them Most Likely Fall Phishing In Their Rush ,He Last Minute Shopper Is Likely To Accidentally Click On Untrustworthy Links And Fall Prey Phishing Scams What Appears Be An Email Froma Reputable Retailer Witha Coveted Discount May Fraudulent ,Ut The Last Minute Shopper Doesn 39t Have Time To Check With Rise Of Online Marketplaces ,His Is Becoming More Common Earlier This Year ,Ingapore 39s Most Popular Peer To Sales Platform Was Affected When Attackers Posing As Legitimate Buyers Directed Victims Toa Fake Bank Website Where They Would Be Asked Give Their Banking Details Receive Payment This Resulted In At Least 72 People Losing Over Usd 109 ,000 Tips To Protect Against Phishing Verify The Validity Of Sites Before Clicking On Them Or Providing Any Personal Information If Emails Are Unsolicited ,E Alert To Any Potential Errors Do Not Proceed If It Includes Wrong Information ,R Requests To Enable Macros ,Djust Security Settings Or Install Applications 3 The Bargain Hunter Price Point Is Most Significant Purchase Consideration For These Shoppers ,Ho Would Sift Through Various Sites To Geta Substantial Deal Most Likely Fall For Social Engineering Attacks Bargain Hunters Be Click On Spoofed Emails Or Accept Malicious Extensions That Function As Price Comparison Tools Attackers Prey Buyer 39s Eagerness Fora Good By Sending Them Fake Offers Request Their Personal Data Ona Page ,Ven Impersonating Legitimate Tools Like Google Analytics Or Tag Manager To Compromise Code And Steal Valuable Information ,Mpacting Shopping Sites Tips To Protect Against Social Engineering Attacks Always Verify The Validity Of Offer And Legitimacy Sender Usea Good Spam Filter For Emails ,S The First Barrier Of Defence Against Suspicious Files And Links 4 Impulse Buyer Driven Solely By Emotions ,Mpulse Shoppers Often Do Not Havea Specific Product In Mind Before Placing An Order They Respond To Time Pressure Accessa Coveted Item Ona Limited Offer ,Ta Price Too Good To Refuse Most Likely Fall For Brand Impersonation Attacks Via Fraudulent Links ,Cybercriminals Impersonate Popular Brands ,Ricking Victims Into Sharing Personal Information ,Uying Contraband Products ,Isitinga Fake Website ,Downloading Malware ,Nd More Exacerbating These Trends Is Social Media ,Here Attackers Can Easily Impersonate Brands ,Ngage With Customers Seeking To Purchase Items ,Nd Request For Their Personal Details Tips To Protect Against Brand Impersonation Scrutinize Links Provided In Emails And Be On High Alert If They Are Not Pointing The Correct Location Or Direct Toa Third Party Site Affiliated With Doubt ,Each Out To The Brand On Their Official Channels Verify Offers Before Clicking Any Links Make Payments Sure Check That Accounts Are Verified 5 Researcher Researchers Extensively Compare Products And Offer Purchasing They Often Have Various Browser Extensions Installed Browsers Quick Comparisons Most Likely Fall For Extension Malware Attacks Cybercriminals Hide Viruses Behind Add Ons ,Hich Can Then Install Adverts ,Ather Users 39 Browsing History ,Nd Seek Login Credentials By Impersonating Famous Apps And Extensions Malicious Could Go Undetected Especially If Security Software Programs Treat Known As Trusted Applications Most Recently ,Ttackers Have Been Using Information Stealing Malware Like Fb Stealer ,Hich Mimics The Harmless And Standard Looking Chrome Extension Google Translate ,O Prey On Users Financially Motivated ,Ttackers After Effectively Lockinga User Out Of Their Facebook Account ,Buse Access To Ask The Victim 39s Friends For Money Tips Protect Against Extension Malware Attacks Only Install Extensions From Official Web Stores If Permissions That Require Even Before Installing Seem Suspicious ,T 39 Ll Be Best Not To Install Them Retailers Must Do Their Part Too Fora Cybersafe Shopping Experience ,Etailers Havea Part To Play As Well Attacks On Popular Retail Behemoths In The Last Few Years Have Revealed Important Lessons For Merchants Prevention Is Better Than Cure Taking Proactive Steps Monitor Potential Threats And Being Ready Block Unauthorised Access Keep Shoppers Safe Throughout Their Experience Essential Quot Web Traffic Increases ,Ttackers Similarly Increase Their Attacks Case In Point ,Alicious Bot Attacks Tripled During Single 39s Day Last Year These Could ,Mmediately Or In Future ,Rain Customer Accounts ,Amage Site Functionality ,Nd Hold Encrypted Data Ransom All At Enormous Costs To Businesses ,Uot Explained Houari Quot To Ensure Loyalty Long Term ,Etailers Must Make Every Effort To Keep Shopper Data Safe This Could Include Deployinga Bot Solution Stop Credential Stuffing Attempts Early And Using Password Managers Multi Factor Authentication Secure Users ,Uot He Concluded Akamai Powers And Protects Life Online Leading Companies Worldwide Choose To Build ,Eliver ,Nd Secure Their Digital Experiences Helping Billions Of People Live ,Work ,Nd Play Every Day ,

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.