ACCESSbank Privacy and Security
Top 10 Frauds
- Website Fraud – Often a fraudster will create a Web page or Web site that is similar to that of a legitimate company, or use a Web site address that is similar to that of a reputable business. Watch for signs for broken graphics, grammatical errors, a sense of urgency, requests for personal or confidential information, or a “@” symbol in the URL.
- Fraudulent Emails – Similar to fraudulent websites, these emails try to convince people to share personal information through links within the email. They usually use urgent language and urge consumers to update personal information for security reasons.
- Telephone, text-message, or voice phishing – This tactic is a phishing attempt made through a telephone call, fax, voice messaging, or text. The purpose is similar to fraudulent emails that try to convince recipients to share their sensitive information.
- Pop-up windows – These windows may be generated by programs hidden in free downloads. Avoid downloading programs from unknown sources on the Internet and always run anti-virus software on your computer.
- Lottery or sweepstakes scams – You receive notice you are the winner of a lottery that you did not enter, but must pay a small percentage for fake taxes or other fees before you can receive the rest of your prize.
- Internet scams – You receive a check for something you received over the internet, but the amount of the check is more than the selling price. You are instructed to deposit the check, but send back the difference in cash.
- Telephone scams – Unless you initiated the contact, do not give personal information over the phone.
- Nigerian scams – This occurs when a wealthy foreigner needs money transferred from his/her homeland and promises a percentage of the money as a reward for your assistance.
- International Wires – You receive a request to deposit a check and then wire the funds to another country. The check will be returned a fraudulent and the depositor will lose the money. Do not send wires unless you know the person/business and its legitimacy.
- Small Business and online banking – This fraud is built for attacking automated clearinghouse (ACH) and wire transfer transactions for check and payment processing. The hacker installs software that counts and recognizes the keystrokes of the person logging into online banking to initiate transfers to the hacker’s accounts.
Remember, if it sounds too good to be true, it probably is.