We want to keep you and your finances safe. The following resources are provided to educate and empower our members to protect their assets and identities.
Criminals Manipulate Search Engine Results and Impersonate Financial Institutions
The scheme is reliant on potential victims using keyword searches on a U.S. search engine to navigate to the online portals of financial institutions. Fraudulent advertisements in the search results deceive victims into providing their login credentials and multi-factor authentication token codes to a phishing website operated by criminal actors. The phishing website appears identical to the legitimate financial institution website. Criminal actors use the credentials to log in to the legitimate financial institution website, take over the victim’s account, and initiate unauthorized automated clearing house (ACH) and/or wire transfers.
Scammers Are Sending Fake IRS Emails About Economic Impact Payments
There’s a fake IRS email that keeps popping into people’s inboxes. It says that you can get a third Economic Impact Payment (EIP) if you click a link that lets you “access the form for your additional information” and “get help” with the application. But the link is a trick. If you click it, a scammer might steal your money and your personal information to commit identity theft. It’s yet another version of the classic government impersonator scam.
The psychological manipulation of people into performing actions or divulging confidential or personal identifiable information (PII) that may be used for fraudulent purposes – such as financial account information, card numbers, expiration dates, CVV2 codes, or one-time-passwords (OTP).
With more and more payment information being stored at merchants, saved on mobile phones, and entered via mobile devices, the security of mobile devices is becoming more and more important. Today, while there is no industry standard or criteria for security on mobile devices, there are many common practices to securing devices.
There are many different definitions of “privacy.” We are going to focus on personal privacy, protecting the information about you that others collect. In today's digital world, you would be astounded at all the different entities that not only collect information about you, but who then legally share or sell that information.
What to do if you’re billed for an SBA EIDL loan you don’t owe
Did you get a bill for a Small Business Administration (SBA) loan, but you didn’t apply for one? It’s likely that an identity thief applied for the loan using your personal or business information. The SBA has new guidance about reporting the fraud, and the FTC has tips to help you clear up any credit problems it may cause.
To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.
The challenges that COVID-19 has brought include a higher risk of identity theft. In 2020, the FTC got about 1.4 million reports of identity theft, double the number from 2019. Repeatedly, identity thieves targeted government funds earmarked to help people hard hit financially by the pandemic. Learn about protecting yourself from identity theft, and recovering if it happens to you.
Cybersecurity reports paint a dreadful end-of-the year picture for 2020: one filled with some typical holiday cybercrime traditions — phishing and digital scams — that threaten payment mechanisms. Except this year, holiday fraud has been magnified by a global pandemic.
Holidays and Pandemic Team Up to Enhance Fraud & Scams
As the holidays approach, e-commerce merchants are preparing for a continued
increase in online sales as a result of store closures and restrictions due to the
COVID-19 pandemic. Members should be aware of scams that target the convenience of online shopping such as fake or spoofed web sites and pop ups, e-skimming, porch pirates, or impersonations for your curb-side pick-ups.
Imposter scams often begin with a call, text message, or email. The scams may vary, but work the same way – a scammer pretends to be someone you trust to convince you to send them money or share personal information.
Kids' lives are online more than ever, from socializing with friends and interacting with family to online learning and education. As parents we want to make sure they do so in a safe and secure manner. However, this is hard as many of us never grew up in such an online environment like this. Here are some key steps on how you can help kids make the most of online technology safely and securely.
Looking for a new job can be a daunting project, and frequently involves the exchange of personal information with complete strangers--which is why job seekers are an enticing target for cyber criminals. As you look for a new job, be extra vigilant so your application materials and personal information don’t end up in the wrong hands.
FBI: Increased Use of Mobile Banking Apps Could Lead to Exploitation
As the public increases its use of mobile banking apps, partially due to increased time at home, the FBI anticipates cyber actors will exploit these platforms. Studies of US financial data indicate a 50 percent surge in mobile banking since the beginning of 2020. The FBI expects cyber actors to attempt to exploit new mobile banking customers using a variety of techniques, including app-based banking trojans and fake banking apps.
Ransomware is a type of malicious software (malware) that is designed to hold your files or computer hostage, demanding payment for you to regain access. Ransomware has become very common because it is so profitable for criminals.
Crooks use clever schemes to defraud millions of people every year. They often combine new technology with old tricks to get people to send money or give out personal information. Here are some practical tips to help you stay a step ahead.