Skip to main content

Questions tagged [fraud]

Fraud is wrongful or criminal deception intended to result in financial or personal gain. It is one of the challenges to organisations that Information Security tries to prevent.

2 votes
0 answers
198 views

What are the risks of providing all your credit card information except for security code to a stranger?

I've recently been approached by a person asking me for a donation to Save The Children. while I was inclined to donate, I didn't because they were asking my full name, 16 digits of credit card and ...
Jorge Riv's user avatar
  • 121
40 votes
6 answers
15k views

Which parts of a credit card can I obfuscate and still have it be valid

I was recently the victim of credit card fraud and I suspect it is from a merchant somewhere keeping track of my credit card details. I cancelled the card and received a new one, but I would like to ...
8bitme's user avatar
  • 503
0 votes
1 answer
499 views

Preventing fraud in bitcoin mining pools [closed]

So bitcoin mining pools are very common, almost no one mines alone, because of the great difficulty in mining a block. So mining in a pool has pretty much been the standard. However, how do people ...
James's user avatar
  • 135
2 votes
3 answers
321 views

Should it remain as a general advice to encrypt the whole HDD?

AFAIK, the general advice is to encrypt the whole HDD or at least the whole /home partition (and its Windows equivalent), because nowadays computers tend to store lots of personal, sensitive ...
gaazkam's user avatar
  • 6,147
4 votes
1 answer
54k views

What can be done with the last 4 digits of one's SSN [closed]

If a hacker were to get the last 4 digits of your SSN (and maybe some other info like name, etc), what could they do? To avoid the possibility that they could guess the other digits from date/...
Nate D's user avatar
  • 191
1 vote
1 answer
145 views

Online Voter fraud [closed]

I'm hosting an online singing competition that's at the finale 2 contestants with a cash prize over $10,000 plus a duet with a well known artist in that genera. What we found was that 2 of the finale ...
TomR's user avatar
  • 11
1 vote
1 answer
490 views

How could criminals use stolen EMV credit cards in 2011?

I would like to recall a fraud happened in France in 2011 for which a paper was published (also linked from Ars). I came onto this by following debate on EMV card security and its mandatory ...
usr-local-��ΨΗΕΛΩΝ's user avatar
0 votes
1 answer
180 views

ATM Fraud Question

My neighbor had a guest that used a bank card to fraudulently purchase an iPad online from Apple. Neighbor was able to verify guest was the culprit with evidence and witnesses. There are also ...
gatorback's user avatar
  • 1,531
3 votes
2 answers
178 views

Spam email with my address details

I have registered domain under .xyz 123reg domain registration company. Recently I got an email from ummed.org company informing me that my SEO engine will be going to expire soon and I need to make ...
user155708's user avatar
6 votes
2 answers
2k views

PayPal payment reversal; scammer at work?

For the past several days, I have received several monetary donations through PayPal for exactly 1 US dollar. Several hours after the donation is received, I also receive a notification from PayPal ...
Jonah Bishop's user avatar
1 vote
0 answers
155 views

Is it possible to set up a webpage to force a mobile browser to click on two off-site locations in order to fake a sign-up?

I've recently been victim to a scam. I was signed up to an internet gaming 'club' despite never knowingly having visited their site, read their T&C's nor clicked an agreement. Under UK ...
merefield's user avatar
2 votes
1 answer
2k views

Why Aren't Credit Card PINs Required For Online Transactions

I have never heard of credit card PINs being required for online purchases. Why is this? Wouldn't it drastically reduce online fraud? Physically stolen credit cards couldn't be used in online ...
Elias's user avatar
  • 123
2 votes
1 answer
470 views

Extracting as much information from a browser request as possible?

I am currently working on project that involves identifying spammers who are creating fake accounts on my site. I am interested to know what type of information I would be able to extract. First of ...
Tinker's user avatar
  • 125
1 vote
1 answer
200 views

Self-destructing e-mail [duplicate]

Recently someone whom I more or less trust (let's call him John) showed me a screenshot of an email from someone else (let's call him Paul). It was bad and if it's true then it means Paul is bad ...
Patrycja's user avatar
3 votes
5 answers
10k views

My Apple ID has been compromised. What do I do?

Update: Called Apple today and according to them they could not get an IP-address from user logins or was not allowed to give that out. They also said that I would be able to see any message that had ...
Ogglas's user avatar
  • 777

15 30 50 per page
1
3 4
5
6 7
10