Q&A: Why there's a chip on your credit card (2024)

Q. My bank just re-issued all my credit and debit cards and the new ones have a chip in them. What's that about?

Q&A: Why there's a chip on your credit card (1)

A. That chip is a security measure that's been in credit and debit cards around the world for a while now. It's finally arrived in the U.S. in response to the major data breaches that happened at retailers last year. The chip, working with newer model payment systems, creates a unique ID for that transaction. So even if a hacker broke into the retailer's systems, they wouldn't be able to use the information to drain your bank account. This all sounds great, but there are still a few obstacles. Find out why cards with chips aren't as secure as you would hope.

Get the best price for airline tickets

Q. I'm buying an airline ticket for Thanksgiving, and I'm worried the price is going to drop after I buy. Should I buy now or wait?

A. First, head over to Kayak and look up your ticket. Then look at the Price Trend box on the left to see what prices have done historically and what price changes it thinks are coming up. You'll probably see that you should buy now. However, just in case the price does drop after you buy, head over to Yapta. It will keep an eye on ticket prices and alert you if there's enough of a drop to get you a partial refund. Want to save more? Learn two more secrets that help you get the lowest online airfare.

How to avoid malicious websites

Q. I clicked on a link in an email saying I had won an iPad, but the site I went to wanted too much information so I left. Did I make the right decision?

A. Yes, you were on a malicious site. This is a site hackers set up to trick you into giving away personal information, or to slip viruses onto your system. One key way you can tell is if it asks for information and there's no "https://" at the beginning of the Web address. That means the site isn't encrypted and anyone can see the information you're sending. Learn two more ways to tell you're on a malicious website and how to avoid emails that send you there. Also, read to the end to find out how hackers disguise malicious files so you don't spot them until it's too late.

Upgrade to iOS 9?

Q. I have an iPhone 6 and I'm wondering if I should take the free upgrade from iOS 8 to iOS 9?

A. iOS 9 has several features that are worth the upgrade. It uses your hardware more efficiently, so you should see better battery life. Plus it has a Low Power Mode for those times when your battery is running on fumes and you aren't near an outlet. You also get a Siri upgrade that makes it easier to use and lets you change your phone settings with voice commands. Learn more about iOS 9, plus whether you should upgrade to Apple's newest Mac operating system and its latest iPhone.

Webcam snoopers are real

Q. I got a webcam so I could chat with my grandson, but now I'm worried about someone using it to snoop on me. Am I just being paranoid?

A. Creeps do have ways to snoop on webcams in people's houses. In fact, there have been several arrests and court proceedings based around this kind of snooping. One precaution a lot of people take is to unplug or cover the webcam when it isn't in use. You can also avoid the programs that snoopers use, such as RATs or remote access tools. They generally get these on your system by posing as tech support calling about a problem with your computer. If you don't let them in, then they can't do anything. Get the full details on RATs, how to keep snoops from accessing your computer and webcam remotely, and how to deal with other gadgets in your home that have cameras.

Bonus: How safe is that file really?

Q. I got an email from someone I don't know and there's a picture attached. I'm curious what it is, but don't want a virus. Pictures can't have viruses, right?

A. They can if it's a disguised malicious file. Files are identified by their extension, which is the three letter ".xyz" at the end of the file name. Most viruses are going to be ".exe". However, thanks to a quirk of Windows, hackers can make it look like an image (.jpg), music file (.mp3) or something else. As a rule, you should never download or view unsolicited attachments. Still, find out how to spot a disguised file and change your Windows settings so it's easier to spot them.

On the Kim Komando Show, the nation's largest weekend radio talk show, Kim takes calls and dispenses advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com. Email her at techcomments@usatoday.com.

Q&A: Why there's a chip on your credit card (2024)
Top Articles
Latest Posts
Article information

Author: Msgr. Benton Quitzon

Last Updated:

Views: 5869

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Msgr. Benton Quitzon

Birthday: 2001-08-13

Address: 96487 Kris Cliff, Teresiafurt, WI 95201

Phone: +9418513585781

Job: Senior Designer

Hobby: Calligraphy, Rowing, Vacation, Geocaching, Web surfing, Electronics, Electronics

Introduction: My name is Msgr. Benton Quitzon, I am a comfortable, charming, thankful, happy, adventurous, handsome, precious person who loves writing and wants to share my knowledge and understanding with you.