How to Stay Safe While Shopping Online

Source

Online Shopping

Online shopping has become the most convenient way to make purchases. Shopping online allows customers to research products, read customer reviews, and shop around for the best prices. But with all this convenience comes a lot of vulnerability. Hackers, fake websites, and even fake companies can scam online shoppers out of their money. Below are some tips to remain safe when shopping online.

Source

Never use a Public Computer or Public Network

When making online purchases, you should always use your own computer and especially never use a public computer at a café.  Computers that you do not have control over may have key loggers installed on them that record every keystroke you make, allowing someone else to steal all the information that you typed such as your name, address, and credit card information. 

Not only is it dangerous to use a public network to make purchases, but hackers can also easily access your personal network if it is not password protected and encrypted.  Encryption scrambles your data into cyphertext so that only the intended party can decrypt it to read the actual plaintext message.  

Examine the Store Website

You should only shop from reputable stores with adequate websites.  Be wary of stores that you have never heard of.  The website should have links that actually work and include customer service contact information.  Any website that asks you for personally identifiable information and especially credit card information should use Secure Socket Layer (SSL) to protect your information.  Any easy way to determine if a website is using SSL is to look for “HTTPS” at the beginning of the website URL instead of just “HTTP”.  Some browsers may also display a padlock icon as well to denote the use of SSL. 

Avoid fake websites and phishing schemes.  A phishing scheme is any scheme that uses websites or emails that impersonate legitimate websites and emails in order to steal personally identifiable information.  If you receive a sketchy email that gives you a link, Goggle the company’s website and navigate to the page instead of trusting the link.  One effective method of detecting phishing websites is to examine the URL and pay special attention to the part of the web address that comes before the .com.  

Use Credit Cards

Credit Cards and Paypal are the safest means of payment for online purchases.  There is often no way to recover cash or even debit card payments that used for scam purchases.  Paying with cash significantly eliminates an audit trail, making difficult to even prove that a payment was made.  Credit card companies offer fraud protection and do not hold cardholders responsible for fraudulent charges.  Credit card users receive protection under the Fair Credit Billing Act.  

Be Smart

When shopping online, you are responsible for your own safety. Use your head and be smart. If something seems to be too good to be true, it’s probably a scam. Protect your information and never give out your social security number or too much personal information. Check your credit card statements regularly and keep receipts and payment confirmations.

If you found this article useful or have any additionally tips, please leave a comment below.  Thanks for reading!

Trusted Sources

More by this Author


Comments 2 comments

myi4u profile image

myi4u 5 years ago from United Kingdom

Great info! No matter how protected our computers are, it is still very dangerous when using public network for security related access. I have recently discovered an Android app where it can detect any user who are currently using facebook/twitter in the same network. When detected, I can actually log in as them from the app and browse their profile. It is just an mobile app and yet it can do so much. Imagine what a full-blown computer software can do when tapped into the same network?!


ArtVandelay66 profile image

ArtVandelay66 5 years ago Author

Thanks for sharing myi4u! This can be pretty scary stuff. I bet the Android app doesn't even require the user to be that computer/network savvy. Imagine how much easier it would be for a seasoned hacker to gain someone's information. Even with a protected network, a "brute force attack" could be used to quickly try countless character combinations in an attempt to hack a password.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working