Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

The Dangers of Autofill: How Scammers Can Use Browsers to Steal Credit Cards

The Dangers of Autofill: How Scammers Can Use Browsers to Steal Credit Cards

If you’re an avid online shopper, you know the struggle of having to fill out your information each and every time you want to make a purchase. For many, autofill is a way to save time when shopping online. While this feature is convenient, it can also put your data directly into the hands of cybercriminals if a user isn’t careful.

How They Do It

Hackers are able to use autofill to their advantage by adding hidden fields in a sign-up form. These fake sign-up forms try to trick users into giving up more information than they think they are. The form may seem to only ask for a name or email address, but can secretly also take any other information that has been saved in a browser’s autofill. This could include information such as a billing address, phone number, credit card number, security codes, and other sensitive personal data. While this method of attack isn’t necessarily new, whitehat hackers have had trouble finding effective ways to counter the threat.

Prevent an Autofill Attack

Autofill attacks can happen to nearly any user on any browser that has autofill enabled. However, browsers such as Chrome and Safari are particularly prone to these types of attacks, as autofill comes pre-configured when the browser is first downloaded. To avoid these types of attacks, experts suggest using a browser without autofill, such as Firefox. If you want to stick with Chrome or Safari, you may want to consider disabling the autofill feature. If you enjoy the convenience of autofill, make sure you only utilize the feature on sites that have been marked as secure. Otherwise, it’s advised that you take the time to fill in each field by hand to avoid giving information you don’t want to give.

Worried that your sensitive data might be at risk of leaking? Call Info Advantage at (585) 254-8710 today to talk to a security expert about how you can keep your private data safe.

Avoiding Back Pain and Eye Strain in the Office
Business Continuity and the Cloud
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events malware backup technology solutions Productivity Hackers cyber attacks Business practice Ransomware cloud Software Business Management Innovation Business Continuity Mobility Disaster Recovery Microsoft Hardware Office tips Business Computing Efficiency Network Security Windows 10 Mobile Devices Computer Avoiding Downtime Internet hardware solutions business Quick Tips Flexibility data breach email Social Operating System Laptop Education cyber criminals Wi-Fi Health Law Enforcement voip Money Information Technology phone systems Saving Money IT Identity Theft IT Services Smartphone Facebook History Antivirus Small Business Upgrade Risk Management servers IT Support Office 365 data Application Communication internet user Passwords Miscellaneous Humor Personal Information Mobile Computing cloud capabilities BDR Apps Wireless byod Virtual Reality cars Automation Text Messaging Internet Protocol Scalability Encryption Workplace Tips Employer-Employee Relationship Data recovery spam Update Net worth Artificial Intelligence Managed IT Services hardware refreshes How To Server ecommerce Microsoft Office Gadgets time threats Managing Stress Router Cybercrime iPhone Government virtualized servers Video Games Recovery holiday Battery HaaS business continuity plan Reputation Remote Computing ATMs Point of Sale downtime Marketing Password Virtualization Search content Windows Alert Automobile Hosted Solutions Software-based phone systems Legal USB End of Support Worker Commute VoIP right Instant Messaging Internet Exlporer Robot Work/Life Balance Advertising Hosted Solution Relocation Smartphones VPN Private Cloud Users computer network Social Media Google Touchpad PDF Telephone Systems Black Market User Tips Google Drive Telephony Entertainment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name