There are several things people freak out about when their wallets or purses have been stolen: knowing a thief has your ID (and your home address), losing irreplaceable gift cards or cash, and having to cancel your credit cards. That’s usually the first thing people do — call their banks — but it’s easy to act quickly when you realize you’ve been robbed. Sometimes, it’s not that simple.
Thieves steal credit and debit cards all the time without taking the physical card. The most common kind of card theft results from data breaches. Last year, millions of U.S. consumers had their cards replaced after their information was compromised in one of the massive cyberattacks on retailers, even if their cards didn’t show unauthorized activity. People have gotten used to the idea that data breaches are inevitable, but there are lots of daily activities that put your cards at risk for theft, without you noticing.
A Pennsylvania woman was recently arrested for allegedly swiping customer cards on a personal card reader while she worked the drive-thru at a Dunkin’ Donuts, WFMZ reports, reportedly using the information to create duplicate cards and charge more than $800 to the accounts.
That’s not the first time a story like this has popped up, and it’s likely to happen again, because the situation presents an easy theft opportunity to drive-thru workers: Customers hand over their cards and usually can’t see what the cashier is doing with it on the other side of the window. It’s not like you should avoid the drive-thru for fear of card theft, but it’s one of many reasons to regularly check your card activity for signs of unauthorized use.
How often do you see your server process your dinner payment? Usually, he or she takes your card away from your table and completes the transaction out of your sight. Many restaurant workers have taken advantage of this situation to copy customers’ cards and fraudulently use the information.
3. On the Phone
People are pretty trusting when making orders over the phone, assuming that whoever takes the order is entering the credit or debit card number, expiration date and security code into a payment system, not just copying it down for their own use. On the flip side, it might not be the person on the other end of the call you should worry about — plenty of people read their card information aloud within earshot of strangers, making it easy for someone nearby to write down the numbers.
4. RFID Scanners
Most radio-frequency identification (RFID)-enabled credit and debit cards have a symbol (four curved lines representing a signal emission) indicating the card has the technology for contactless payment. If you have one of these cards, you have the ability to use tap-and-pay terminals found at some retailers, because your card sends payment information via radio frequencies, received by the terminal.
That same technology also allows thieves to use RFID scanners to copy your card data if they get close enough to it and your card isn’t protected. If you’re not sure your card has RFID technology, call your issuer, and if it does, use signal-blocking materials and products to protect it.
5. Card Skimmers
Thieves have been installing copying devices at gas pumps and ATMs for years: They tamper with card readers to install skimmers that copy your card data when you swipe it, so a thief takes your credit or debit card information while you complete an otherwise routine transaction. Experts advise you look closely at card readers for signs of tampering, use ATMs serviced by your bank and check your card activity regularly for signs of fraud.
That’s really the best way to combat credit card theft: Watch closely for it. With online banking and mobile applications, it’s easy to check your accounts every day, making it more likely you’ll spot something out of the ordinary than if you only looked at card activity once a week or so. You can also check your credit score for sudden changes, which can be a sign of fraud or identity theft. You can get two of your credit scores for free every 30 days on Credit.com.
More on Identity Theft:
- Identity Theft: What You Need to Know
- 3 Dumb Things You Can Do With Email
- How Can You Tell If Your Identity Has Been Stolen?