• Card cloning: Credit card cloning, or skimming, is where
Page 47

If you've noticed an error in this article please click here to report it so we can fix it.
someone obtains your credit card details, copies them on to a bogus card and uses that card.
• Chip and PIN: Credit and debit cards now contain an embedded microchip and are authenticated automatically using a PIN code.
• Keylogging: Keystroke logging is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware their actions are being monitored.
• Malware: An abbreviated form of malicious software is designed to infiltrate or damage a computer system without the owner's consent.
• Phishing: Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by masquerading as a trustworthy entity c in electronicommunication