SCHEMES SCAMS FRAUDS



Similar documents
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

IDENTITY THEFT FRAUD

& INTERNET FRAUD

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Identity Theft Awareness: Don t Fall Victim to these Common Scams

Avoid completing forms in messages that ask for personal financial information.

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Protecting Yourself Against Fraud and Identity Theft

Protecting Yourself from Identity Theft

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Malware & Botnets. Botnets

Remote Deposit Quick Start Guide

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Online Security Tips

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Criminal Investigation

The elderly are often specifically targeted for identity theft. Identity

Financial Safety. Protection so you can focus on what matters most

Red Flags in International Payments and Trade. Presented by Paul Warfield and Despina Margiori

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Retail/Consumer Client. Internet Banking Awareness and Education Program

11/14/2014. Scams Against Seniors. Better Business Bureau. BBB Scam Stopper. Turn to BBB For

Learn to protect yourself from Identity Theft. First National Bank can help.

A mule s life is a fool s life

Identity Theft Problem and Solutions

Market Intelligence Cell. Fighting Financial Crime

Erie County has been notified of an active phishing e mail threat targeting government agencies and have received reports of a wellcrafted phishing

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Guide to credit card security

Protect Yourself From Scams

I know what is identity theft but how do I know if mine has been stolen?

How To Get Help From The Police Department

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

When Fraud Comes Knocking

Client Education. Learn About Identity Theft

Helping you to protect yourself against fraud and financial crime

Protecting Yourself From Identity Theft and Fraud. Detective Mike Kugler Bella Vista Police Department

Fraud and Identity Theft. Megan Stearns, Credit Counselor

IDENTITY SMART. Resources to Help Against Identity Theft and Fraud

OIG Fraud Alert Phishing

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Protecting your business from some of the current fraud threats

Contents Security Centre

Emerging risks for internet users

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

Deception scams drive increase in financial fraud

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Fraud Guide Fraud Protection

EL/Civics Lesson Plan

How To Protect Yourself From Identity Theft

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IDENTITY THEFT: MINIMIZING YOUR RISK

Vishing (and SMiShing ) Countermeasures

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

ELECTRONIC AUTHENTICATION. Understanding the New. Multi-factor authentication and layered security are

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Identity Theft: Informational Workshop

DVD Companion Learning Guide

OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

How to Protect Yourself From Identity Theft and Internet Scams

IDENTITY THEFT: Who s Got Your Number? Identity Theft: Who s Got Your Number?

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Deter, Detect, Defend

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

ID Theft & Impact on Florida

Fraud Protection module

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1

TARGET BREACH SCAM ALERT

ATM FRAUD AND COUNTER MEASURES

Protection from Fraud and Identity Theft

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Identity Theft Protection

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS

Visa CREDIT Card General Guidelines

PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston

How To Help Protect Yourself From Identity Theft

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

FFIEC CONSUMER GUIDANCE

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Identity Theft YOUR LEGAL RIGHTS. Professor Katherine Porter UC Irvine School of Law

what you need to know

Safeguarding Your information and accounts

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

location of optional horizontal pic Corporate and Investment Banking Business Online Information Security

04 EMERGING AREAS OF IDENTITY THEFT 06

Protecting your business against External Fraud

Credit Card Fraud Training

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Fraud Prevention Tips

Putting Telephone Scams... On Hold

Transcription:

FRAUD ALERT! FRAUD ALERT! GUARDING AGAINST INTERNET & MOBILE FRAUD SCHEMES SCAMS FRAUDS & THESE SCAMS CAN COST YOU MONEY: Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE!

KNOW THE FRAUDS! In the last decade cyber-frauds have arisen using increasingly sophisticated technologies all aimed at separating you from your money. Here is a review of today s most prevalent frauds, with some advice for keeping your private information secure. PHISHING is the criminal attempt to steal your personal information through fraudulent emails or smart-phone texts. They are often very believable, luring the victim to a site that asks them to provide (or verify ) personal financial details such as account numbers and social security numbers. A variation is called Spear Phishing, which are electronic messages that appear to come especially to victims from their employer, usually a large corporation. PROTECT YOURSELF: Your financial institution will not send emails asking for your personal information they already have it. SMART PHONE TEXTING FRAUDS Cyber-security experts often call the text and mobile phone version of phishing Smishing, playing off the SMS, or Short Message Service, terminology used in text messaging. Smart phone users are being increasingly targeted because these users almost always have their phone handy and tend to respond to texts and emails quickly. They may not realize the message is fake until too late. In addtion, fake Web sites can be harder to spot on a small screen.

PROTECT YOURSELF: Be careful responding to urgent text messages, especially one from your financial institution...call and ask before responding. In all cases with text scams, use the same precautions as you would for a potential phishing scam. SPYWARE is the term used for criminal software that a victim unknowingly loads on a personal computer. Once there, the spyware collects personal information and sends it to the criminal. PROTECT YOURSELF: Up-to-date security software is the best defense. DEBIT & CREDIT CARD SKIMMING attempts to hijack your personal information and your identity by tampering with ATM machines. Fraudsters set up a device that is capable of capturing the debit card magnetic stripe and keypad information from the ATM, then sell this information to criminals who use it to create new cards with your account numbers. PROTECT YOURSELF: First by reducing your risk at ATMs use machines from institutions you know and trust. Additionally, if you notice a change at an ATM you use routinely, such as a color difference in the card reader or a gap where something appears to be glued onto the slot where you insert your card, that's a warning sign to find another machine.

FREE CREDIT REPORTS THE BEST DEFENSE OF ALL When it comes to guarding against Identity Theft and Account Hijacking, perhaps the most important tool at your disposal is your credit report. It details all of your credit transaction accounts, and will be the first place that unusual charges or entirely new accounts will appear. The good news is that you can monitor your credit report for FREE! But you must exercise this option through specific channels. Since you are entitled to a free report from each of the three major credit reporting agencies, security experts advise you get a free report from each one every four months. That way, you can keep an eye on your personal account safety year round. To order your free credit report, go to the only authorized source: www.annualcreditreport.com 1-877-322-8228

FAKE CHECK SCAMS use technology to create realistic cashiers checks. These checks are used by scammers to pay for online purchases or most notoriously, some form of foreign lottery that you are told you won. The scam always involves your accepting the faked cashiers check, which is for more than the purchase price, then your sending the difference in a separate check to the scammer. You keep the worthless fake check and the scammer keeps your real check (with your real money). PROTECT YOURSELF: If you are selling something, insist the buyer pay by traditional means. Remember that if you didn t enter a lottery, you would not win it. And of course, never accept a check for more than the amount due. HELPFUL HINT: Cyber-criminals often prey on those who are most vulnerable, such as senior citizens or young adults, who may not be as aware of the technical aspects of the threats. Make sure you alert any friends or family members who might be in this category. They ll appreciate it! RESOURCES Internet Crime Complaint Center: www.ic3.gov Consumer Fraud (Department of Justice Homepage): www.usdoj.gov

Federal Trade Commission (FTC) Consumer Response Center: www.ftc.gov Consumer Guides and Protection: www.usa.gov Financial Fraud Enforcement Task Force: www.stopfraud.gov On Guard Online: www.onguardonline.gov FINANCIAL EDUCATION CORPORATION