They can steal money from your card online in less than two hours

Electronic commerce has become essential for many users and companies. It is an option that we have to acquire a wide variety of products from anywhere. Now, keep in mind that this also adds a security and privacy risk. It is especially dangerous if we do not take appropriate measures. Today we echo a test conducted by computer security experts where they show how our leaked bank card data can be used on the network in less than two hours.

Data from a leaked card is used in less than two hours

Bank cards are one of the most recurring ways to pay online. It is true that we have a wide range of possibilities to make payments, but it is one of the most comfortable and also safe, as long as we take the necessary measures. The problem is when we make mistakes and that card data is leaked on the Internet.

A group of computer security researchers wanted to demonstrate how long it takes to use a bank card on the network that has been stolen. That is, they have consciously leaked the data of an anonymous card to see what happens. They have shown that since they leaked that card data, less than two hours passed until they made a micro transaction with the aim of verifying if that card is really active.

The purpose of this test is none other than to demonstrate how fast the data of the leaked cards travel in the network. In a matter of two hours they can end up in the Dark Web, sold in some forum and can be used by any user who pays for it. This is because there are bots in the network specifically designed to track this type of data and perform the necessary tests to verify the validity of the cards before putting them on sale.

This is a very important problem, as we can imagine. This means that any failure we make on the Internet when making a payment or entering the data in a form could result in the theft of the card. They could control our balance in a matter of two hours or less.

anonymous-hacker

How to prevent the theft of bank card data

The first and most important thing is to always use common sense . We must buy only on pages and platforms that are reliable and official, that are encrypted and always accessing from the URL directly and never from third-party links.

It is also vital that we use official programs , downloaded from reliable sites and that are perfectly updated. Sometimes vulnerabilities may arise that are exploited by hackers to carry out their attacks. It is essential that we have the latest patches and updates installed not only in those applications, but also in our systems.

Finally, something necessary is the use of security tools . Our data may be leaked due to keyloggers and Trojans that collect the personal information we enter. It is vital that we have a good antivirus capable of adding a security layer.