Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Travel Smart – Your Boarding Pass And Social Media Don’t Mix
Facebook   X   LinkedIn   Email

Travel Smart – Your Boarding Pass And Social Media Don’t Mix

December 5, 2023

Exciting, fun, and fabulous! Those words only begin to describe the joys of an upcoming trip. Getting caught up in the whirlwind is easy and so is sharing a snapshot of your boarding pass online. Cybercriminals love finding boarding passes and itineraries posted on public platforms like social media, and what they can do with that information is, well, criminal. Nothing puts a damper on a vacation like finding your identity stolen and even worse, that you may have helped.

Boarding pass details enable several cybercrimes that can target you before, during, and after a trip. Your PII like legal name, address, and ticket number are all displayed and so is your passenger name record (PNR). A PNR is a six-digit numerical code representing an extensive digital file on the traveler. That file is available to a hacker who knows how to get it.

The personal data in a PNR includes all contact info (name, address, phone, email), frequent flyer and bonus miles info, travel itinerary, credit card numbers, and billing data. It’s all in a hacker’s possession thanks to posting an innocent picture of your boarding pass.

Identity Theft and Data Dynamite

Having your PNR number posted online can upend the best of travel plans. Identity theft allows a hacker to open credit and other accounts in your name, get a mortgage, or buy a new car. They can cancel or change your airline and hotel reservations and steal your travel miles and points. This happened to Hilton Honors members several years ago.

Even an email address in the wrong hands, especially when partnered with social engineering tactics, is like data dynamite. With a hacker pretending to be someone else, socially engineered phishing emails can lead to your job and employer. That connection can lead to financial fraud crimes and malware attacks like ransomware. Unfortunately, it’s not a stretch for these things to happen.

Smart Travel, Smart Vacation

Data theft is a crime with limitless opportunities and many social media posts inadvertently enable it. For travel, consider an electronic boarding pass rather than a printed one. That way leaving it in an airplane seat pocket or on the floor of the terminal won’t happen. Keep your travel itinerary off social media and other public internet spaces. It leaves a timeline of when your home will be empty and vulnerable to break-ins and a time when you may not be able to so diligently log in to check your accounts. Do your best to monitor your bank and credit accounts for unusual activity, even when traveling.

No one wants a cybercriminal going with them on vacation, so keep your travel PII where it belongs – with you.


Social Media Free Giveaway Scams Come With Hefty Costs

Scams & Phishing

Social Media Free Giveaway Scams Come With Hefty Costs

That $750 you were promised for filling out a survey was never intended to be paid but is in fact a giveaway scam you just fell for. You may think there’s no real harm in filling out a bogus survey, but the real thing about these scams is that it’s stealing your PII (personally identifiable information). The enduring and timeless nature of scam giveaways show that, people don’t change much when it comes to getting something for nothing. READ FULL STORY

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Scams & Phishing

Email Identity Crisis! Top Brands For Email Phishing And How To Tell The Difference

Some say impersonation is the greatest form of flattery, but it this case, it’s all about email phishing. Cybercriminals use some companies more than others because they’re well-known globally and have better odds for success. According to APWG’s Phishing Activity Trends Report, the U.S. saw over one million email phishing attacks in the first quarter of this year alone, the highest total on record so far. A look at who these companies are and how to avoid email phishing in their name benefits us all. READ FULL STORY

Government Agencies Issue Warning About Plugging In

Your Security

Government Agencies Issue Warning About Plugging In

The FBI and the FCC recently issued a warning about something many of us do all the time. We plug our mobile devices in USB slots to charge them while on the go. In today's world, charging stations for mobile devices are found almost everywhere. From bars to airports, and even ride-sharing vehicles, these charging stations are often offered as a courtesy by their owners. However, it is important to exercise caution when using these stations to avoid becoming a victim of "juice-jacking." READ FULL STORY

QR Code Dangers And The Risks Behind Using Them

Mobile Security

QR Code Dangers And The Risks Behind Using Them

There’s danger now lurking behind those busy black-and-white boxes that are QR codes and that now seem to be found everywhere for everything, including viewing restaurant menus. Always a quick way scan for information, more businesses are using them now more than ever. A study by Ivanti takes a look at what’s really going on behind QR’s and their findings should make anyone think twice before they reach to scan a QR code with their mobile device. READ FULL STORY

Oversharing On Social Media: If Opportunity Knocks, Know When Not To Answer

Your Security

Oversharing On Social Media: If Opportunity Knocks, Know When Not To Answer

Sharing online can be irresistible, especially when quizzes, surveys and other fun opportunities allow your voice to be heard. It’s important to note that bad actors are constantly trolling social media sites for personal information. One of their biggest allies are the viral social media quizzes and surveys that pop-up on sites like Facebook. They give hackers gold nuggets of information that can be used for future cyberattacks. With online quizzes and oversharing providing the fuel for an attack, knowing it’s avoidable to begin with is perhaps most disturbing of all. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...