The information provided on this website does not, and is not intended to, act as legal, financial or credit advice; instead, it is for general informational purposes only. Information on this website may not be current. This website may contain links to other third-party websites. Such links are only for the convenience of the reader, user or browser; we do not recommend or endorse the contents of any third-party sites. Readers of this website should contact their attorney, accountant or credit counselor to obtain advice with respect to their particular situation. No reader, user, or browser of this site should act or not act on the basis of information on this site. Always seek personal legal, financial or credit advice for your relevant jurisdiction. Only your individual attorney or advisor can provide assurances that the information contained herein – and your interpretation of it – is applicable or appropriate to your particular situation. Use of, and access to, this website or any of the links or resources contained within the site do not create an attorney-client or fiduciary relationship between the reader, user, or browser and website owner, authors, contributors, contributing firms, or their respective employers.
Credit.com receives compensation for the financial products and services advertised on this site if our users apply for and sign up for any of them. Compensation is not a factor in the substantive evaluation of any product.
There are several things people freak out about when their wallets or purses have been stolen: knowing a thief has your ID (and your home address), losing irreplaceable gift cards or cash, and having to cancel your credit cards. That’s usually the first thing people do — call their banks — but it’s easy to act quickly when you realize you’ve been robbed. Sometimes, it’s not that simple.
Thieves steal credit and debit cards all the time without taking the physical card. The most common kind of card theft results from data breaches. Last year, millions of U.S. consumers had their cards replaced after their information was compromised in one of the massive cyberattacks on retailers, even if their cards didn’t show unauthorized activity. People have gotten used to the idea that data breaches are inevitable, but there are lots of daily activities that put your cards at risk for theft, without you noticing.
A Pennsylvania woman was recently arrested for allegedly swiping customer cards on a personal card reader while she worked the drive-thru at a Dunkin’ Donuts, WFMZ reports, reportedly using the information to create duplicate cards and charge more than $800 to the accounts.
That’s not the first time a story like this has popped up, and it’s likely to happen again, because the situation presents an easy theft opportunity to drive-thru workers: Customers hand over their cards and usually can’t see what the cashier is doing with it on the other side of the window. It’s not like you should avoid the drive-thru for fear of card theft, but it’s one of many reasons to regularly check your card activity for signs of unauthorized use.
How often do you see your server process your dinner payment? Usually, he or she takes your card away from your table and completes the transaction out of your sight. Many restaurant workers have taken advantage of this situation to copy customers’ cards and fraudulently use the information.
People are pretty trusting when making orders over the phone, assuming that whoever takes the order is entering the credit or debit card number, expiration date and security code into a payment system, not just copying it down for their own use. On the flip side, it might not be the person on the other end of the call you should worry about — plenty of people read their card information aloud within earshot of strangers, making it easy for someone nearby to write down the numbers.
Most radio-frequency identification (RFID)-enabled credit and debit cards have a symbol (four curved lines representing a signal emission) indicating the card has the technology for contactless payment. If you have one of these cards, you have the ability to use tap-and-pay terminals found at some retailers, because your card sends payment information via radio frequencies, received by the terminal.
That same technology also allows thieves to use RFID scanners to copy your card data if they get close enough to it and your card isn’t protected. If you’re not sure your card has RFID technology, call your issuer, and if it does, use signal-blocking materials and products to protect it.
Thieves have been installing copying devices at gas pumps and ATMs for years: They tamper with card readers to install skimmers that copy your card data when you swipe it, so a thief takes your credit or debit card information while you complete an otherwise routine transaction. Experts advise you look closely at card readers for signs of tampering, use ATMs serviced by your bank and check your card activity regularly for signs of fraud.
That’s really the best way to combat credit card theft: Watch closely for it. With online banking and mobile applications, it’s easy to check your accounts every day, making it more likely you’ll spot something out of the ordinary than if you only looked at card activity once a week or so. You can also check your credit score for sudden changes, which can be a sign of fraud or identity theft. You can get two of your credit scores for free every 30 days on Credit.com, or download the free Credit.com mobile app for iOS and Android for on-the-go access to your credit report.
Image: iStock
October 19, 2023
Identity Theft and Scams
May 17, 2022
Identity Theft and Scams
May 20, 2021
Identity Theft and Scams