Connect with us

Technology

Don’t let this credit card fraud nightmare happen to you

Published

on

Don’t let this credit card fraud nightmare happen to you

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you’ve been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

“Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?”

Advertisement

I’m sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I’ll be discussing how this could have happened and how to stay safe.

A woman using her credit card to shop online   (Kurt “CyberGuy” Knutsson)

How credit card fraud happens

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of “card skimming,” where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

Advertisement
man with credit card

A man using his credit card to shop on his phone   (Kurt “CyberGuy” Knutsson)

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

Credit card fraud is way too common

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

person using credit card

A woman using her credit card to pay   (Kurt “CyberGuy” Knutsson)

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

The need for identity theft protection

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

Advertisement

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Advertisement
credit card crook

Illustration of a credit card crook   (Kurt “CyberGuy” Knutsson)

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

10 ways to protect yourself from credit card fraud

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

Advertisement

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don’t store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It’s better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

Advertisement

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don’t request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Kurt’s key takeaway

It’s clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Advertisement

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

China’s DeepSeek AI is hitting Nvidia where it hurts

Published

on

China’s DeepSeek AI is hitting Nvidia where it hurts

A chatbot made by Chinese artificial intelligence startup DeepSeek has rocketed to the top of Apple’s App Store charts in the US this week, dethroning OpenAI’s ChatGPT as the most downloaded free app. The eponymous AI assistant is powered by DeepSeek’s open-source models, which the company says can be trained at a fraction of the cost using far fewer chips than the world’s leading models. Shares for Nvidia, the biggest global supplier of advanced AI chips, are currently down over 12 percent in pre-market training,

DeepSeek also claims to have needed only about 2,000 specialized chips from Nvidia to train V3, compared to the 16,000 or more required to train leading models, according to the New York Times. These unverified claims are leading developers and investors to question the compute-intensive approach favored by the world’s leading AI companies. And if true, it means that DeepSeek engineers had to get creative in the face of trade restrictions meant to ensure US domination of AI.

Nvidia, Microsoft, OpenAI, and Meta are investing billions into AI data centers — $500 billion alone for the Stargate Project, of which $100 billion is thought to be earmarked for Nvidia. Investors and analysts are now wondering if that’s money well spent, with Nvidia, Microsoft, and other companies with substantial stakes in maintaining the AI status quo all trending downward in pre-market trading.

Continue Reading

Technology

Scammers find sneaky way to bypass your iPhone's safety features

Published

on

Scammers find sneaky way to bypass your iPhone's safety features

In an alarming development, cybercriminals have devised a new method to circumvent Apple’s built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Scammer’s phishing text message sent to iPhone (Kurt “CyberGuy” Knutsson)

The trick unveiled

Apple’s iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple “Y,” the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they’ve found an engaged target for future attacks.

Advertisement

We reached out to Apple for a comment but did not hear back before our deadline.

Scammers find sneaky way to bypass your iPhone's safety features

Scammer’s phishing text message sent to iPhone (Kurt “CyberGuy” Knutsson)

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Common phishing lures

These deceptive messages often masquerade as notifications from trusted organizations, such as:

  • Undeliverable packages from courier services (USPS, DHL, FedEx)
  • Unpaid road tolls
  • Outstanding payments or fees

The messages typically end with instructions like: “(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari).”

Scammers find sneaky way to bypass your iPhone's safety features

Scammer’s phishing text messages sent to iPhone (Kurt “CyberGuy” Knutsson)

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

The rising threat of smishing

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users’ security and privacy.

Advertisement

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

How to protect yourself

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you’re unsure about a message’s legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

Advertisement

4) Enable message filtering: Use your device’s built-in filtering options to sort messages from unknown senders. Here are the steps:

  • Open Settings
  • Scroll down and click Apps 
  • Tap Messages
  • Turn on Filter Unknown Senders

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

What to do if you’ve been targeted

If you suspect you’ve fallen victim to a smishing attack:

Advertisement
  • Report the incident to relevant authorities and institutions
  • Freeze your credit to prevent potential identity fraud
  • Change passwords and PINs for all your accounts; consider using a password manager to generate and store complex passwords
  • Monitor your finances and online accounts for suspicious activity
  • Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Kurt’s key takeaways

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Retro Remake opens preorders for its PS One FPGA clone

Published

on

Retro Remake opens preorders for its PS One FPGA clone

Retro Remake’s Taki Udon announced last night that preorders had opened for the SuperStation One, a clone of the PS One variant of the original PlayStation. The $149.99 Founders Edition preorders are sold out already, but you can still preorder the standard $225 SuperStation One for $179.99 right now, with shipping expected in “Q4 or Earlier.”

While the SuperStation One looks like a PS One — complete with ports compatible with the original PlayStation controller and memory cards — it plays more than just PlayStation 1 games. It’s a custom MiSTER field-programmable gate array (FPGA) machine, as Polygon points out. That means rather than emulating game consoles, its hardware can actually function just like those consoles, with cores ranging from the Atari 5200 and NES to the PlayStation and Sega Saturn.

Retro Remake currently offers the system in black, gray, and translucent blue. It comes with a 64GB Micro SD card and has three USB-A ports, an ethernet port, and an NFC reader that you can use to trigger specific games to load. It uses USB-C for power.

On the video side of things, the SuperStation One will have an HDMI port, along with VGA, DIN10, composite, and component ports geared for retro gaming setups. You’ll also find a 3.5mm audio jack and a digital audio port. Finally, there’s an expansion slot to support Retro Remake’s planned SuperDock accessory that adds a slot-loading disc drive, a 2280 m.2 SSD bay, and four more USB-A ports. That’s not up for preorder yet, but you can put down a $5 preorder deposit for it with an order of the SuperStation One.

Continue Reading
Advertisement

Trending