Feeds

Fraudsters feast on credit card scam

Bogus gadget site funds takeaway fraud

Choosing a cloud hosting partner with confidence

Fraudsters are dining out on the proceeds of a new credit card scam.

Con men are using credit card details harvested from a bogus (and now defunct) gadget website – called www.instant-av.co.uk – to fund huge restaurant orders.

One London restaurant alone lost £10,000 supplying food and drink against stolen card details traceable to the website, according to anti-fraud alert site Early Warning. Other takeaways and restaurants in the London area have also been hit by the scam.

Meanwhile, consumers who forked out for goods such as iPods and consoles on offer through the bogus site are also being left out of pocket. None of the goods were ever delivered, while the credit card accounts of those ordering were being raided.

Only operational for a month and now shut down, instant-av.co.uk did not display the "padlock" security symbol that indicates credit card details are being transmitted across an encrypted link. Google has suspended payment facilities on sites believed to be associated with the scam, and London police have been notified.

London restaurants should be wary of any orders they may receive over the telephone where the customer wants to pay with more than one credit card, especially when punters say the order will be collected by taxi.

Early Warning managing director Andrew Goodwill said consumers should be wary of offers that seem too good to be true.

"There will always be internet fraud, and no doubt these fraudsters will be up and running again quickly, but there are simple ways to enjoy the benefits of shopping online. Firstly, always look for the padlock symbol that shows the site is secure. And never be blinkered by an apparent bargain – it could cost you dear," he said. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?