IBM Offers Tips for Safe Online Shopping

by Tech Mainstream Staff


November 26, 2016


IBM Offers Tips for Safe Online Shopping


With Cyber Monday coming up shortly with 36 percent of consumers shopping online for the event, the need for secure and safe shopping is of utmost importance. IBM Security offers safety tips for navigating the online shopping maze.

"Beware of Unexpected Package Tracking Emails" for instance, fake emails masquerading as retailers but instead contain malware, such as Locky Ransomware that will encrypt your computer files and also lock a user out until a ransom is paid.

"Caution with Coupon Codes" especially exercise caution when clicking on an email link to copy a coupon code, even for trusted retailers. Alternatively, copy the code and use it directly in the retailers web site.

"Opt for Credit Over Debit Cards" since credit cards are not tied directly to your checking account are more negotiable when problems arise than a debit card.

"Use Unique Passwords for EACH Online Store" and therefore do not use the same password for all shopping web sites.

"Shopping From The Office?" Do not use your corporate or organization's official email address when shopping online. Also do not use your organization's login password for this purpose.

"Only Use Trusted Apps" from trusted app stores such as Apple and Google Play. Be wary of unknown discount deal apps and apps with only a few reviews.

"Use A Special Shopping Email Address" for online purchases and to isolate spam more easily and therefore preserve your other account(s).

"Don’t Save Your Info", credit card information that is. Because stored credit card information is saved through the retailers web site, this information could be later compromised by hackers who breach the particular website.

"Consider One-Time Use Credit Cards" rather than divulging your credit card information from "non-trusted or entirely new retailers" you can use one-time or pre-paid credit cards or even gift cards.

"Get Creative With Password Reset Questions" and do not provide hackers with questions that are obvious and can be determined online via social engineering techniques. Choose questions based on opinion (e.g. "favorite movie, food, etc.") and not questions related to personal data (e.g. what street you grew up on for example).

"For retailers looking for security insights and recommendations, download the Security Trends In The Retail Industry report from IBM X-Force http://ibm.co/2gIcUmX or check out the X-Force Exchange collection on spam research at http://bit.ly/2fCTg7U"

 

 TECH IN A SECOND     

Read All News...


Upcoming Tech Events

October 29-30, 2019- Training Seminar: SQL Server Live!

November 4-6, 2019- NVIDIA’s GPU Technology Conference

November 4-8, 2019- Microsoft Ignite

November 4-10, 2019- Cloud & DevOps Security Summit

November 5, 2019- Software Defined Operations

November 5-6, 2019- NVIDIA’s GPU Technology Conference

November 6, 2019- ChannelPro SMB Forum 2019

November 13-14, 2019- SMX® East

November 17-22, 2019- Visual Studio Live! Orlando

November 19-22, 2019- Open Data Science Conference

December 2-3, 2019- Future Compute

December 10-11, 2019- Global Growth Marketing Conference 2019

February 4-6, 2020- Social Media Strategies Summit 2020

February 19-21, 2020- SMX West 2020

February 24-26, 2020- DNN Summit 2020

March 15-18, 2020- Strata Data Conference

March 24-25, 2020- AI World Congress 2020

April 15-17, 2020- MarTech

June 8-10, 2020- SMX Advanced 2020

 


Tech Definitions in the News

Arduino is an open-source electronics platform based on easy-to-use hardware and software. It's intended for anyone making interactive projects. Arduino boards are able to read inputs - light on a sensor, a finger on a button, or a Twitter message - and turn it into an output - activating a motor, turning on an LED, publishing something online

Source: https://www.arduino.cc/en/Guide/Introduction/

Augmented Reality is an enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the real-world, thus enhancing one’s current perception of reality.

Source: https://www.realitytechnologies.com/ augmented-reality/

Chatbot is a piece of software that interacts with users in a conversational way.

Source: https://snatchbot.me/insight/250/ intelligent-chatbots


Deep Learning is a new area of Machine Learning research, which has been introduced with the objective of moving Machine Learning closer to one of its original goals: Artificial Intelligence.

Source: http://deeplearning.net/


DevOps is a set of software development practices that combines software development (Dev) and information technology operations (Ops) to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives. Different disciplines collaborate, making quality everyone's job.

Source: https://en.wikipedia.org/wiki/DevOps


Docker is a tool designed to make it easier to create, deploy, and run applications by using containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other dependencies, and ship it all out as one package.

Source: https://opensource.com/resources/what-docker


FogHorn is an intelligent Internet of Things ( IoT) edge solution that delivers data processing and real-time inference where data is created.

Source: https://aws.amazon.com/blogs/architecture/foghorn-edge-to-edge-communication-and-deep-learning/


Hybrid Cloud is a computing environment that combines a public cloud and a private cloud by allowing data and applications to be shared between them.

Source: https://azure.microsoft.com/en-us/overview/what-is-hybrid-cloud-computing/


Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications.

Source: https://kubernetes.io/blog/



WWW2 and WWW3 (k8s) are hostnames or subdomains, typically used to identify a series of closely related websites within a domain, such as www.example.com, www2.example.com, and www3.example.com; the series may be continued with additional numbers: WWW4, WWW5, WWW6 etc. 

Source: https://en.wikipedia.org/wiki/WWW2


Did You Know?

Duck Duck Go Search Engine has six different themes to choose from for its search interface.


Tech Gallery

LG SIGNATURE OLED TV R9 - 4K HDR Smart TV
Image Credit: LG