Next November 24th the Black Fridaya date that has already been established as the starting signal for a period of great consumption as it links with Christmas and the January sales.
This era is plagued by Internet traps such as «phishing», «vishing» or «sim swapping», which are some of the main cyber threats that lurk during periods of high consumption.
How to avoid being a victim of these traps on Black Friday?
To the advice from consumer organizations of taking extreme precautions when faced with offers, those of the cybersecurity experts to avoid risks, scams and fraud.
The main ones: do not rush and verify before clicking on a link to make a purchase and be suspicious of prices that may be too good to be true.
The call has also been made to check for grammatical errors on websitesand from sites that do not provide information on their physical addresses, phone numbers or contact emails.
Given the increase in online purchases starting this week, the National Cybersecurity Institute of Spain (INCIBE) has insisted on the importance of using «official» websites of the stores that each consumer likes the most.
They have also stressed the importance and usefulness that it can have do quick searches to find reviews and opinions from other users about unknown websites; be wary of prices that are too low and offers that may be suspicious and also be wary of sites that offer items that are out of stock in most stores.
Jorge Sanz, director of the master’s degree in Cybersecurity at the U-Tad university center specialized in new technologies, has stressed the importance of taking extreme precautions at the «key» moments of those massive shopping periods such as «black Friday» in the face of the realization that Cybercrimes increase during these dates.
The most used types of cyberattack
The six most frequent cyberattacks are fraudulent online stores are the «phishing» -deceive the user by posing as a person, company or service that inspires trust; he «vishing» -a fraudulent phone call requesting personal information pretending to be an entity with which the consumer has a relationship-; or the duplicate sim card -The attacker poses as a victim and asks a company for a duplicate card.
Added to them are the «reverse bizum» – instead of sending, the attacker sends a payment request – or the classic Identity theft by exploiting a data breachwhich allows the criminal to obtain account numbers and passwords and use them to make purchases through impersonation and even sell them to other offenders so that they can use that data fraudulently.