Lompat ke konten Lompat ke sidebar Lompat ke footer


 Everyone will agree, my friend, that crime is everywhere and can target anyone indiscriminately. The key word is that crime may not occur because of the intention of the perpetrator, but it can happen because of the opportunity. Maybe some of us are used to being wary of crimes that can happen on the road or at home, such as robbery, theft, and even robbery. However, many of us are not aware of crimes in the digital world, even though you know, pal, that crimes can also be committed through channels such as cellphones, the internet, to your debit/credit card if you’re not careful.

There are various forms of digital crime that can occur in society, buddy. But, there are at least three digital crimes that occur most often and you should be aware of! Let’s take a cup of coffee and read it carefully~

1. Card Skimming

Card skimming is the act of stealing ATM/debit card data by illegally copying (reading or storing) information contained on magnetic strips. What is a magnetic strip, really? Okay, if you have an ATM/debit card, take a look now, on the back of your card there must always be a black line, right, pal? Well, the black width line serves to store all important information on your ATM card, such as the card number, validity period, to the customer’s name. Well, the way to copy the information on the magnetic strip is by using a card reader (card skimmer) placed in the card slot on an ATM/debit machine or even an Electronic Data Capture (EDC) machine when you shop using a debit or credit card.

In addition to these actions, the perpetrator will also try to get your ATM/debit card PIN by peeking at the button you press when transacting at an ATM machine/EDC device or it could be by placing a small camera installed in a hidden corner of the ATM machine. Well, if the perpetrator has obtained a copy of your information from the magnetic strip and your ATM/debit card PIN, then the perpetrator will create a fake card using the data that has been obtained and transact using the PIN that has also been obtained. Ihiiii… isn’t it really dangerous, pal? So… limit your personal activities on social media such as uploading birthday wishes or congratulating someone’s birth and even other important moments because criminals can track your possible ATM/debit card PIN codes based on these special dates. Remember, pal.. Social media is okay… but use it wisely and stay careful.

2. Phishing

Unlike card skimming, which uses an ATM/debit card as a channel to commit crimes, phishing perpetrators actually use internet banking channels to get data from your credit card, pal. Phishing is the act of asking (provoking) computer users to disclose confidential information by sending fake important messages, which can be in the form of emails, websites, or other electronic communications. Well, because the messages seem real and are usually followed by threats, users are often trapped by sending sensitive personal information such as user ID, password/PIN, credit card number, credit card validity period, and Card Verification Value (CVV). Keep in mind, buddy, this CVV code is usually 3 separate numbers located behind your ATM/debit or credit card. Now that you know the importance of the 3 digit number on the back of your card, be careful not to let it be known by people who have bad intentions.

3. Carding

Well, because people today really like shopping online, my friend, digital crime has also penetrated into e-commerce channels. One form of crime is carding. Carding is an online shopping activity using illegally obtained debit or credit card data. Compared to other crimes, carding is relatively easy to do because it does not require a physical card and only relies on data from the debit/credit card to be targeted. Usually, perpetrators will find and get data from debit or credit cards, either through fake marketing, fake merchants, recording sensitive data by individuals at merchants, or from lost cards. Once the person gets all of our data, starting from the card number, expiration date, validity period, CCV, card limit and other information, the perpetrator will use the data to make online shopping transactions and the financial bill will be borne by the victim. Oops… I really don’t want this, my friend, for this to happen.