The common sense precautions can keep you safe!
Know the frauds! In the last decade cyber-frauds have arisen using increasingly
sophisticated technologies…all aimed at separating you from your money. Here is a
review of today’s most prevalent frauds, with some advice for keeping your private
information secure.
Phishing
The criminal attempt to steal your personal information through fraudulent emails or
smart-phone texts. They are often very believable, luring the victim to a site that asks
them to provide (or “verify”) personal financial details such as account numbers and
social security numbers. A variation is called Spear Phishing, which are electronic
messages that appear to come especially to victims from their employer, usually a large
corporation.
Protect yourself: Your financial institution will not send emails asking for your
personal information—they already have it.
Smart phone texting frauds
Cyber-security experts often call the text and mobile phone version of phishing
Smishing, playing off the SMS, or Short Message Service, terminology used in text
messaging. Smart phone users are being increasingly targeted because these users
almost always have their phone handy and tend to respond to texts and emails quickly.
They may not realize the message is fake until too late. In addtion, fake Web sites can
be harder to spot on a small screen.
Protect yourself: Be careful responding to “urgent” text messages, especially one
from your financial institution…call and ask before responding. In all cases with text
scams, use the same precautions as you would for a potential phishing scam.
Spyware
The term used for criminal software that a victim unknowingly loads on a personal
computer. Once there, the spyware collects personal information and sends it to the
criminal.
Protect yourself: Up-to-date security software is the best defense.
Debit & credit card skimming
The attempts to hijack your personal information and your identity by tampering with
ATM machines. Fraudsters set up a device that is capable of capturing the debit card
magnetic stripe and keypad information from the ATM, then sell this information to
criminals who use it to create new cards with your account numbers.
Protect yourself: First by reducing your risk at ATMs—use machines from institutions
you know and trust. Additionally, if you notice a change at an ATM you use routinely,
such as a color difference in the card reader or a gap where something appears to
be glued onto the slot where you insert your card, that’s a warning sign to find another
machine.
Fake check scams
The use of technology to create realistic cashiers checks. These checks are used by
scammers to pay for online purchases or most notoriously, some form of foreign lottery
that you are told you won. The scam always involves your accepting the faked cashiers
check, which is for more than the purchase price, then your sending the difference in a
separate check to the scammer. You keep the worthless fake check…and the scammer
keeps your real check (with your real money).
Protect yourself: If you are selling something, insist the buyer pay by traditional
means. Remember that if you didn’t enter a lottery, you would not win it. And of course,
never accept a check for more than the amount due.
HELPFUL HINT: Cyber-criminals often prey on those who are most vulnerable, such
as senior citizens or young adults, who may not be as aware of the technical aspects
of the threats. Make sure you alert any friends or family members who might be in this
category. They’ll appreciate it!