Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

The Dangers of Autofill: How Scammers Can Use Browsers to Steal Credit Cards

The Dangers of Autofill: How Scammers Can Use Browsers to Steal Credit Cards

If you’re an avid online shopper, you know the struggle of having to fill out your information each and every time you want to make a purchase. For many, autofill is a way to save time when shopping online. While this feature is convenient, it can also put your data directly into the hands of cybercriminals if a user isn’t careful.

How They Do It

Hackers are able to use autofill to their advantage by adding hidden fields in a sign-up form. These fake sign-up forms try to trick users into giving up more information than they think they are. The form may seem to only ask for a name or email address, but can secretly also take any other information that has been saved in a browser’s autofill. This could include information such as a billing address, phone number, credit card number, security codes, and other sensitive personal data. While this method of attack isn’t necessarily new, whitehat hackers have had trouble finding effective ways to counter the threat.

Prevent an Autofill Attack

Autofill attacks can happen to nearly any user on any browser that has autofill enabled. However, browsers such as Chrome and Safari are particularly prone to these types of attacks, as autofill comes pre-configured when the browser is first downloaded. To avoid these types of attacks, experts suggest using a browser without autofill, such as Firefox. If you want to stick with Chrome or Safari, you may want to consider disabling the autofill feature. If you enjoy the convenience of autofill, make sure you only utilize the feature on sites that have been marked as secure. Otherwise, it’s advised that you take the time to fill in each field by hand to avoid giving information you don’t want to give.

Worried that your sensitive data might be at risk of leaking? Call Info Advantage at (585) 254-8710 today to talk to a security expert about how you can keep your private data safe.

Avoiding Back Pain and Eye Strain in the Office
Business Continuity and the Cloud
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 24 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events backup Productivity technology solutions Hackers malware cloud Business practice Software Hardware cyber attacks Mobility Business Management Computer Business Continuity Disaster Recovery Ransomware Innovation Microsoft Business Computing Network Security Mobile Devices Windows 10 Avoiding Downtime Quick Tips business Internet hardware solutions Efficiency Office tips Health Education email Operating System Law Enforcement cyber criminals Laptop Flexibility Social data breach Saving Money voip Miscellaneous Application Upgrade IT Support Office 365 Money Antivirus internet user Small Business Facebook Communication Information Technology servers Personal Information data Smartphone cloud capabilities Passwords Identity Theft Humor Mobile Computing Risk Management IT Services History IT Wi-Fi Data recovery Managing Stress How To Server Artificial Intelligence Managed IT Services Government Net worth Software-based phone systems cars ecommerce phone systems Cybercrime Search Router Workplace Tips Reputation Battery Internet Protocol Video Games Point of Sale hardware refreshes Recovery Remote Computing business continuity plan Gadgets Automobile time HaaS threats Password downtime BDR Touchpad Alert Virtualization Legal virtualized servers Hosted Solutions holiday Virtual Reality byod Marketing Microsoft Office Windows Apps Wireless Encryption Scalability ATMs Text Messaging Update iPhone spam Automation content

Blog Archive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name