Summer is here, and so is summer travel. But just as travel is set to boom, scamsters are also dusting off their playbooks, looking for their next victims. And it all begins from the one place you are most likely to go to once the idea of travel has been planted - Internet.
Whether you are planning on a destination domestically or internationally, the first thing you will do is browse the web. McAfee, an American cybersecurity company, released its new report titled Safer Summer Holidays, detailing the responses of some 7,000 people across seven countries including India.
[ALSO READ: 5 tips to avoid being a travel scam victim]
There are a number of things to keep in mind before and during your travel. Before your travel, when you are booking various things, these are some things to be wary of:
Fake websites: You may have seen that after you searched for a holiday destination, suddenly you started seeing ads for various things related to your search everywhere you went on social media. That's how the internet works. But among the cluster, there may be some bad actors that may look convincing.
Fishy payment methods: More often than not, scamsters will try to get you to pay using the payment method they want, sometimes even demanding cryptocurrency and gift cards that can't be traced or returned.
Cross-check every hotel booking, flight booking, etc yourself and don't just leave everything to the travel agent because you don't want to find out that the hotel booking doesn't exist.
Using public WiFi: The McAfee report emphasised the risks of using public WiFi.
Using VPN and incognito modes: McAfee suggests that people use VPN or at least the incognito or private modes during the initial stages of researching for travel. This way, the report states, people would be shielded from bad actors tracking web traffic and search activity from reaching out.
Fake USB Charging Ports: This is a warning that the US FBI regularly gives out. You must have seen those charging cables or USB ports at public places like airports. It is best to avoid USB cable ports and abandoned charging cables to charge your phone as they could have been planted by hackers to steal your mobile information.