As usual, winter's been bleak. You're ready to go ... anywhere else. Somewhere warmer, brighter, more fun.\u00a0\nAnd someone else is there waiting and ready to steal your information \u2014 and your money \u2014 in the process.\u00a0\nTravel scams are ripe and ripening as the days grow longer, in some high and very low tech ways.\u00a0\n+ ALSO ON NETWORK WORLD IRS Scam: 5,000 victims cheated out of $26.5 million since 2013 +\n"The really staggering message that came through in 2015 was that it was the year attackers spent a lot less time and energy on really sophisticated technology intrusions and instead spent the year exploiting us," says Kevin Epstein, vice president of the Threat Operations Center at Proofpoint.\u00a0\nCriminals don't just want to grab your information when you're planning either. Your trip itself makes you a target, too.\u00a0\nPre-trip hacking\nTravel is a focus of scamming for two reasons.\u00a0\nThe first is money -- lots of it. "Booking the trip turns out to be a great way to give away a lot of money," says Epstein. "You voluntarily provide lots of personal information." Not only do most sites require you to put in your credit card information to book a trip, but many also have you create a login and password to use the site.\u00a0\n[Related: Craigslist fails to flag most scam rental ads, study finds]\u00a0\nIf a criminal can make you believe that you're putting that kind of information into the right place, they can take over your money and your digital life. Or, if they can send you something that looks legit, and you download what they ask, they get into your computer and everything that's stored therein.\u00a0\nThe second reason is that travel companies have lagged behind when it comes to the security of their sites. When other online sectors strengthened their walls, scammers went the path of least resistance, which lately has been travel.\u00a0\nBanks, says Charlie Abrahams, senior vice president at MarkMonitor, used to be the subject of such cloning, by have "taken steps to deal with it," adding that MarkMonitor has recently seen an uptick in travel companies requesting the same kinds of service they have been providing for banks.\u00a0\n"We deal with sites that illegally pretend to be a site for the purposes of capturing credential information," says Abrahams. Some of these sites can be found by searching for deals, and some by clicking on emails that purport to be from a legitimate travel entity.\u00a0\nFraudsters are also moving into the app space with travel as a target, though attacks there aren't big \u2014 yet. Abrahams says that MarkMonitor has been spending more time scanning online app stores "because there are a lot of apps there that are completely fake," he says. Sometimes these apps will glom onto famous name brands in the hopes of just getting people to download the apps; they may also be looking to get your information too. Sticking to big name brands and downloading only from well known app stores like iTunes or Google Play is the best way to keep those out of your life, and off your data.\u00a0\nThe same is true for where you go online to book your travel, says Epstein. "If you pick the wrong site, you've just handed over everything to someone."\u00a0\nSticking to known companies there too, whether that's with hotels or airlines or cruise companies themselves or well-known online travel agents, is your best bet. Deals that look too good to be true probably are. Read the find print too, and make sure that if your booking is cancelled \u2014 especially by the booker \u2014 that the entire amount isn't considered a non-refundable deposit.\u00a0\n[Related: Travel apps riddled with security flaws]\u00a0\nEpstein also suggests calling the hotel to make sure they have the booking in case something went awry.\u00a0\nWhile on the road\nThe scams don't stop there, of course. Traveling presents more ways that criminals can get into your life, especially if your guard's down because you're on the beach, drinking margaritas, or both.\u00a0\n"Free Wi-Fi is the most dangerous cyber vector" for travelers says Epstein. Even if your hotel offers it for free, don't use it. If you can't create your own Wi-FI network by tethering, Epstein says stick to your phone. If you must use your laptop, make sure you use full tunnel encrypted VPN. That way, what you're sending or receiving is protected.\u00a0\nSecuring your laptop and phone might sound basic, but Epstein says it's something that travelers can forget about \u2014 especially the laptop.\u00a0\n"If you don't know where something is, even if you get it back, it may not be what you thought it was," he says. That's because someone could put malware on it. "It's a path into your company. It's a front door."\u00a0\nIf you can, he says, leave the corporate laptop at home. If you must bring it with you, have it locked away in a place where only you know the password.\u00a0\nBesides, it's a vacation. Who wants to bring their laptop with them on that? Now you have a security reason not to work with you.