IBM Offers Tips for Safe Online Shopping

by Tech Mainstream Staff


November 26, 2016


IBM Offers Tips for Safe Online Shopping


With Cyber Monday coming up shortly with 36 percent of consumers shopping online for the event, the need for secure and safe shopping is of utmost importance. IBM Security offers safety tips for navigating the online shopping maze.

"Beware of Unexpected Package Tracking Emails" for instance, fake emails masquerading as retailers but instead contain malware, such as Locky Ransomware that will encrypt your computer files and also lock a user out until a ransom is paid.

"Caution with Coupon Codes" especially exercise caution when clicking on an email link to copy a coupon code, even for trusted retailers. Alternatively, copy the code and use it directly in the retailers web site.

"Opt for Credit Over Debit Cards" since credit cards are not tied directly to your checking account are more negotiable when problems arise than a debit card.

"Use Unique Passwords for EACH Online Store" and therefore do not use the same password for all shopping web sites.

"Shopping From The Office?" Do not use your corporate or organization's official email address when shopping online. Also do not use your organization's login password for this purpose.

"Only Use Trusted Apps" from trusted app stores such as Apple and Google Play. Be wary of unknown discount deal apps and apps with only a few reviews.

"Use A Special Shopping Email Address" for online purchases and to isolate spam more easily and therefore preserve your other account(s).

"Don’t Save Your Info", credit card information that is. Because stored credit card information is saved through the retailers web site, this information could be later compromised by hackers who breach the particular website.

"Consider One-Time Use Credit Cards" rather than divulging your credit card information from "non-trusted or entirely new retailers" you can use one-time or pre-paid credit cards or even gift cards.

"Get Creative With Password Reset Questions" and do not provide hackers with questions that are obvious and can be determined online via social engineering techniques. Choose questions based on opinion (e.g. "favorite movie, food, etc.") and not questions related to personal data (e.g. what street you grew up on for example).

"For retailers looking for security insights and recommendations, download the Security Trends In The Retail Industry report from IBM X-Force http://ibm.co/2gIcUmX or check out the X-Force Exchange collection on spam research at http://bit.ly/2fCTg7U"

 

TECH IN A SECOND     

Read All News...


Upcoming Tech Events

August 12-16, 2019- Visual Studio Live! Microsoft HQ

September 9-11, 2019- Digital Transformation Connect

September 9-11, 2019- WorkSpace Connect

September 17-18, 2019- Developing Modern Web Apps with Azure

September 17-19, 2019- Network Virtualization & SDN Americas

September 25-27, 2019- Talent Connect 2019

October 8-11, 2019- Future in Review Conference

October 23-24, 2019- Android Dev Summit

October 29-30, 2019- Training Seminar: SQL Server Live!

November 4-8, 2019- Microsoft Ignite

November 4-10, 2019- Cloud & DevOps Security Summit

November 5, 2019- Software Defined Operations

November 5-6, 2019- NVIDIA’s GPU Technology Conference

November 13-14, 2019- SMX® East

November 17-22, 2019- Visual Studio Live! Orlando

November 19-22, 2019- Open Data Science Conference


Tech Definitions in the News

Augmented Reality is an enhanced version of reality where live direct or indirect views of physical real-world environments are augmented with superimposed computer-generated images over a user’s view of the real-world, thus enhancing one’s current perception of reality.

Source: https://www.realitytechnologies.com/ augmented-reality/

Chatbot is a piece of software that interacts with users in a conversational way.

Source: https://snatchbot.me/insight/250/ intelligent-chatbots


Deep Learning is a new area of Machine Learning research, which has been introduced with the objective of moving Machine Learning closer to one of its original goals: Artificial Intelligence.

Source: http://deeplearning.net/


DevOps is a set of software development practices that combines software development (Dev) and information technology operations (Ops) to shorten the systems development life cycle while delivering features, fixes, and updates frequently in close alignment with business objectives. Different disciplines collaborate, making quality everyone's job.

Source: https://en.wikipedia.org/wiki/DevOps


Hybrid Cloud is a computing environment that combines a public cloud and a private cloud by allowing data and applications to be shared between them.

Source: https://azure.microsoft.com/en-us/overview/what-is-hybrid-cloud-computing/


Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications.

Source: https://kubernetes.io/blog/



WWW2 and WWW3 (k8s) are hostnames or subdomains, typically used to identify a series of closely related websites within a domain, such as www.example.com, www2.example.com, and www3.example.com; the series may be continued with additional numbers: WWW4, WWW5, WWW6 etc. 

Source: https://en.wikipedia.org/wiki/WWW2


Did You Know?

Duck Duck Go Search Engine has six different themes to choose from for its search interface.


Tech Gallery

LG SIGNATURE OLED TV R9 - 4K HDR Smart TV
Image Credit: LG