FRAUD ALERT THESE SCAMS CAN COST YOU MONEY



Similar documents
SCHEMES SCAMS FRAUDS

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Avoid completing forms in messages that ask for personal financial information.

Protecting Yourself Against Fraud and Identity Theft

Malware & Botnets. Botnets

Identity Theft Awareness: Don t Fall Victim to these Common Scams

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Online Security Tips

Market Intelligence Cell. Fighting Financial Crime

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

Customer Awareness for Security and Fraud Prevention

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

BE SAFE ONLINE: Lesson Plan

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Protecting Yourself from Identity Theft

Fraud Prevention Tips

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

Learn to protect yourself from Identity Theft. First National Bank can help.

Retail/Consumer Client. Internet Banking Awareness and Education Program

Helping you to protect yourself against fraud and financial crime

Deter, Detect, Defend

IDENTITY THEFT FRAUD

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Erie County has been notified of an active phishing e mail threat targeting government agencies and have received reports of a wellcrafted phishing

Protect Yourself From Scams

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

& INTERNET FRAUD

Fraud and Identity Theft. Megan Stearns, Credit Counselor

How to Identify Phishing s

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Fraud Trends. HSBCnet Online Security Controls PUBLIC

How To Help Protect Yourself From Identity Theft

Financial Safety. Protection so you can focus on what matters most

Guide to credit card security

Identity Theft: Informational Workshop

TARGET BREACH SCAM ALERT

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Video Intelligence Platform

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

ATM FRAUD AND COUNTER MEASURES

Contents Security Centre

Protecting your business from some of the current fraud threats

Safeguarding Your information and accounts

Fraud Guide Fraud Protection

Protecting Yourself from Identity Theft

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Learning to Detect Spam and Phishing s Page 1 of 6

Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification

Fraud Protection module

FFIEC CONSUMER GUIDANCE

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Fraud Information and Security

ELECTRONIC AUTHENTICATION. Understanding the New. Multi-factor authentication and layered security are

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

SECURITY IS EVERYONE S RESPONSIBILITY. Group Security. ATM Card Skimming and PIN Capturing Customer Awareness Guide

When Fraud Comes Knocking

A mule s life is a fool s life

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

Protection from Fraud and Identity Theft

Security Tips You are here: Home» Security Tips

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Cyber Security. Maintaining Your Identity on the Net

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

IDENTITY THEFT: Who s Got Your Number? Identity Theft: Who s Got Your Number?

RC284. Protect Yourself Against Identity Theft

Information Security Field Guide to Identifying Phishing and Scams

EL/Civics Lesson Plan

8765 CA_ScamBroc 10/10/11 10:45 AM Page 1

Remote Deposit Quick Start Guide

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

IDENTITY SMART. Resources to Help Against Identity Theft and Fraud

Payment Fraud and Risk Management

what you need to know

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

IDENTITY ALERT: The Fight to Defend Your Identity and Personal Information

How to Spot and Combat a Phishing Attack Webinar

I know what is identity theft but how do I know if mine has been stolen?

Deception scams drive increase in financial fraud

Protecting Yourself From Identity Theft And Fake Check Scams. Faculty. Question. The Law. The Law. The Law

Visa CREDIT Card General Guidelines

OIG Fraud Alert Phishing

CyberCrime and ID Theft

Protect Yourself From Identity Theft

Phishing Scams Security Update Best Practices for General User

National Cyber Security Month 2015: Daily Security Awareness Tips

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Protect Yourself From Identity Theft

Safeguard your business against fraud.

PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Identity Theft Protection

Red Flags in International Payments and Trade. Presented by Paul Warfield and Despina Margiori

IBM Global Technology Services May The vishing guide. Gunter Ollmann

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Corona Police Department

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Transcription:

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS

Criminals want to earn their money the easy way In the last decade a virtual flood of frauds have arisen using increasingly sophisticated technologies all aimed at separating you from your money by stealing your personal financial information. It seems that as soon as one devious technique is uncovered, the fraudsters use their ingenuity to devise yet another each aimed at identity theft or account hijacking. Here is a review of today s most prevalent frauds, with some advice for keeping your private information secure. PHISHING is the criminal attempt to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email, directing users to enter personal financial details at a fake website whose look and feel are almost identical to a legitimate one, such as their credit union. Even when using server authentication, it may require tremendous skill to detect that the website is fake. PROTECT YOURSELF by remembering that your financial institution will never send an email asking for personal information or send you to a special site to update personal information. If you do not know the source, delete the email and contact the source yourself to verify and/or report the scam. SPEAR PHISHING is a variation of phishing. With phishing, criminals might send a single, mass e-mail to thousands of people. Spear phishing

attacks are customized and sent to a single person at a time. The spear phishing email usually contains personal information such as your name or some disarming fact about your employment. A spear phishing email usually includes a link leading to a fake web site that requests personal information. The phony email may contain a downloadable file. They often appear to come from an employer or another seemingly legitimate source. But the file contains malware, and once downloaded to your computer, collects your personal information and transmits it to the criminal. PROTECT YOURSELF by understanding that these attacks are usually limited to corporate targets. Nearly all of the spear phishing complaints that have been investigated have come from corporate employees. If you receive a suspicious email like this, go directly to HR or to your company s technical people to learn whether the email is legitimate. VISHING is the name for phishing attacks using the telephone. The term is a combination of voice and phishing, and is typically used to steal credit card numbers, credit union account numbers and passwords. You might receive a phone call advising you that your credit card has been used illegally, and to call a certain number to verify your account number. PROTECT YOURSELF by being suspicious of any phone call asking you to provide credit card or credit union numbers. Rather than provide the information, contact your credit union or credit card company directly to verify the validity of the message. SMISHING is yet another variation of phishing, the name a combination of SMS (Short Message Service, the technology used in text messaging) and phishing. In this scam, the fraudster uses cell phone text messages to lure you to a website or perhaps to use a phone number that connects to an automated voice response system. FREE CREDIT REPORTS THE BEST DEFENSE When it comes to guarding against Identity Theft and Account Hijacking, perhaps the most important tool at your disposal is your credit report. It details all of your credit transaction accounts, and will be the first place that unusual charges or entirely new accounts will appear. The good news is that you can monitor your credit report for FREE! But you must exercise this option through specific channels. Since you are entitled to a free report from each of the three major credit reporting agencies, security experts advise you get a free report from each one every four months. That way, you can keep an eye on your personal account safety year round. To order your free credit report, go to the only authorized source: www.annualcreditreport.com 1-877-322-8228

The smishing text message typically urges your immediate attention. For example, it might say it is confirming an order for a large computer purchase, and you need to follow the scammer s directions in order not to be charged for the item. Once you click on the URL or call the phone number, you are asked to provide card numbers, account numbers, PIN numbers, etc. PROTECT YOURSELF by assuming that no legitimate business would contact you by text message with a request of this nature. If the message seems credible, use your phone to call Directory Service for the correct phone number, then call customer service to ask about the message. DEBIT & CREDIT CARD SKIMMING attempts to hijack your personal information and your identity by tampering with ATM machines. Fraudsters set up a device that is capable of capturing the debit card magnetic stripe and keypad information from the ATM, then sell this information to criminals who use it to create new cards with your account numbers. PROTECT YOURSELF first by reducing your risk at ATMs use machines from institutions you know and trust. A thief has to be able to attach and retrieve a skimming device to use the data it s gathered, which is easier in settings where there s less traffic and no surveillance cameras. Additionally, if you notice a change at an ATM you use routinely, such as a color difference in the card reader or a gap where something appears to be glued onto the slot where you insert your card, that s a warning sign to find another machine.

FAKE CHECK SCAMS use technology to create realistic cashiers checks. These checks are used by scammers to pay for online purchases or most notoriously, some form of foreign lottery that you are told you won. The scam always involves your accepting the faked cashiers check, which is for more than the purchase price, then your sending the difference in a separate check to the scammer. You keep the worthless fake check and the scammer keeps your real check (with your real money). PROTECT YOURSELF using basic common sense. If you are selling something, insist the buyer pay by traditional means. Remember that if you didn t enter a lottery, you would not win it. And of course, never accept a check for more than the amount due. ADDITIONAL RESOURCES AT: www.ftc.gov/idtheft www.onguardonline.gov FINANCIAL EDUCATION CORPORATION