{"id":4563,"date":"2014-04-22T10:00:14","date_gmt":"2014-04-22T14:00:14","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=4563"},"modified":"2020-12-23T12:05:59","modified_gmt":"2020-12-23T17:05:59","slug":"security-tips-online-money-transfer","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-tips-online-money-transfer\/4563\/","title":{"rendered":"Some Tips on Safely Transferring Money"},"content":{"rendered":"<p>In spite of occasional <a href=\"https:\/\/www.kaspersky.com\/blog\/heartbleed-howto\/\" target=\"_blank\" rel=\"noopener nofollow\">catastrophic Internet-wide security vulnerabilities<\/a>, we\u2019re at the point where it\u2019s increasingly futile to try to avoid conducting financial transactions online. If you\u2019re reading this, chances are you probably do a bit of banking, buying, and \u2013 as we\u2019re about to discuss \u2013 money transferring online.<\/p>\n<p>It\u2019s no secret that the Web is a bit of a mess, as far as security is concerned, but it\u2019s also unquestionable that conducting financial transactions online is incredibly convenient, whether you\u2019re paying taxes or a parking ticket or making good on a bet via PayPal. For sure, there are a number of risks faced by anyone attempting to send money online, but there is also a long list of common sense protections available to anyone who knows what to look for. In the end, I think the good outweighs the bad, both broadly on the internet as a whole and specifically regarding money transactions there.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06043734\/43.gif\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4564\" alt=\"43\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06043734\/43.gif\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><b>Securing Yourself<\/b><\/p>\n<p>First and foremost, you have to ensure that your computer or mobile device is secure before you even worry about the transaction itself. To start, make sure your operating system and any software or applications that may be involved in the financial transaction are up-to-date. If you\u2019re on a traditional computer, this means making sure you\u2019re working with the latest version of Windows or OS X or any other operating system. For Windows, you should just set the updates to install automatically. For a Mac, just keep your eyes on the App Store icon and install any update as soon as possible when one becomes available. On traditional machines, you definitely want to double check and make sure you are working with the latest version of the browser, too, because you\u2019ll probably be conducting these transactions over the Web. Once you are sure you are on the most recent version of the operating system and browser, which you can generally figure out pretty easily somewhere in your browser\u2019s settings menu, then you are ready to move on.<\/p><blockquote class=\"twitter-pullquote\"><p>Don\u2019t go transferring money on communal work machines, public computers, or friends\u2019 devices. #Kaspersky #tip<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fk2Vb&amp;text=Don%26%238217%3Bt+go+transferring+money+on+communal+work+machines%2C+public+computers%2C+or+friends%26%238217%3B+devices.+%23Kaspersky+%23tip\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Mobile devices are a bit different. For these, you\u2019ll also want to guarantee you are working with an up-to-date operating system, be it iOS or Android or Blackberry or Windows Mobile or whatever. The mobile environment differs slightly from the desktop computer in that you probably aren\u2019t going to conduct your transactions over the Web. It\u2019s more likely that you will use some sort of money transfer application. So, go ahead and make sure that application is totally updated. In fact, while you\u2019re at it, you may as well update all your other apps as well, because it\u2019s always possible for an attacker to achieve device-access through some other vulnerable application.<\/p>\n<p>The reason we want to make sure we have all of our updates installed is because security updates ensure that most known vulnerabilities are closed off. Of course, there will be some bugs that don\u2019t get patched for whatever reason, but on the whole, it\u2019s nearly impossible to compromise a fully patched device. Sure, there are zero-days, but only a fool would burn a zero-day to skim banking information from a standard consumer.<\/p>\n<p>The last thing you want to do to protect your personal machine is to make sure you are running <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\"> a solid anti-virus program<\/a> on both your mobile device and your traditional computer. It\u2019s well-known that malware is an issue for the PC, but it\u2019s also increasingly apparent that crooks are targeting the Android platform as well,<a href=\"https:\/\/www.kaspersky.com\/blog\/faketoken-2014q1\/\" target=\"_blank\" rel=\"noopener nofollow\"> particularly with financial malware<\/a>. Running an anti-virus will ensure that you are keeping malware that could be designed to steal personal payment information off the device you are about to move money with. Beyond that, the best anti-virus products offer a <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/safe-money\/\" target=\"_blank\" rel=\"noopener nofollow\">safe money feature<\/a> that runs payment websites against a list of trusted sites, checks to make sure your connection with them is secure, and also makes sure the systems on which the transfer is occurring are patched and secure.<\/p>\n<p>Also, never ever perform a transfer on a machine that you don\u2019t control. Work machines are fine if you are the only person that uses them. Don\u2019t go transferring money on communal work machines, public computers, or friends\u2019 devices.<\/p>\n<p><b>Securing the Web<\/b><\/p>\n<p>Now that your personal machine is nice and secure, you want to make sure (inasmuch as it\u2019s possible at least) that the websites you\u2019re interacting with are secure as well. The obvious first step here is to avoid sketchy money transfer services. I can\u2019t pretend to know all the trustworthy money transfer services out there, but you should be safe with PayPal, MoneyGram, Western Union, Venmo, and any number of others. It\u2019s up to you; just make sure you do a bit of research.<\/p>\n<p>Once you\u2019ve decided on your service, make sure it offers <a href=\"https:\/\/www.kaspersky.com\/blog\/the-wonders-of-hashing\/\" target=\"_blank\" rel=\"noopener nofollow\"> strong encryption<\/a>. Look at the address bar and make sure you see the padlock and \u2018HTTPS,\u2019 because you want to make sure you are transmitting any information over an encrypted channel. You may even want to examine the certificate, though your browser likely does that for you, so long as you are up-to-date. Beyond that, just look out for shady banner advertisements that may constitute adware and attempt to steal information from your browser sessions. This is why it\u2019s doubly important to choose a reliable payment service.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06043733\/paypal-cert.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4565\" alt=\"paypal-cert\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/04\/06043733\/paypal-cert.png\" width=\"599\" height=\"435\"><\/a><\/p>\n<p>If you are using a site that requires login \u2013 and I certainly hope you are \u2013 then you want to make sure you are using <a href=\"https:\/\/www.kaspersky.com\/blog\/21st-century-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\"> a strong, long, and unique password<\/a>\u00a0with a mixture of letters, numbers, symbols, spaces, and uppercases. This is serious business. I write this a lot, but I won\u2019t judge you for using a weak password to protect a throw-away email account that you use to sign up for mailing lists. However, it\u2019s incredibly foolish to use anything other than the best of passwords to protect an account on which you plan to handle money. Financial accounts truly warrant strong and unique passwords (you can check your password\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/password-check\" target=\"_blank\" rel=\"noopener nofollow\">here.<\/a>)<\/p>\n<div class=\"pullquote\">Financial accounts truly warrant strong and unique passwords<\/div>\n<p>Assuming you have a strong password, the next step is to implement <a href=\"https:\/\/www.kaspersky.com\/blog\/podcast-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener nofollow\">some form of two-factor authentication<\/a> on whatever site you are using. This way, you will have to confirm any logins using an SMS or email-based security code. This serves two purposes: it raises the barrier of entry into your account, and it also lets you know if someone is trying to access your account. If you get a two-factor notification when you aren\u2019t attempting to login, then that is a pretty good indication that it is time for a <a href=\"http:\/\/free.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">security scan of your computer<\/a> and password change (because it means someone likely has your password and is trying to access your account).<\/p>\n<p>The last thing to do is to use some sort of transaction guarantor, like Verified-By-Visa or 3D Secure, which will require another one-time password from you before the transaction can go through.<\/p>\n<p>If you follow all these steps and keep an eye on your bank account or credit card balance, then you should be safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A series of security tips and guidelines to follow if you are planning to conduct money transfers online.<\/p>\n","protected":false},"author":42,"featured_media":4566,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[354,621,97,131],"class_list":{"0":"post-4563","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-financial-security","9":"tag-money-transfer","10":"tag-security-2","11":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-tips-online-money-transfer\/4563\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-tips-online-money-transfer\/3362\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-tips-online-money-transfer\/3247\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-tips-online-money-transfer\/3667\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-online-money-transfer\/3729\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-tips-online-money-transfer\/3785\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-tips-online-money-transfer\/3785\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-tips-online-money-transfer\/4563\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-tips-online-money-transfer\/4563\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/financial-security\/","name":"Financial Security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4563"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4563\/revisions"}],"predecessor-version":[{"id":38213,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4563\/revisions\/38213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4566"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}