Stay alert, stay safe
Review some of the techniques used to steal personal information and gain access to your money. Then, follow our tips to help protect yourself.
Phishing, smishing, and vishing
Have you ever received an email, text message, or phone call that just didn’t seem right?
They may be:
- Phishing: Email fraud
- Smishing: Text message fraud
- Vishing: Phone fraud
These fraudulent communications include a link, attachment, or phone number that is fake. When you click or call, it enables the scammer to gain access to personal information and steal your money. Some examples include:
Fake login page
If you enter your credentials, fraudsters have your password and can connect to the real website, pretending to be you.
Account takeover
Telltale signs include unusual account activity or unauthorized changes, such as to your street address, email, or phone number. If you receive an account login code that you didn’t initiate, this is likely an attempted takeover.
Fradulent phone calls
Include fake charities asking for your information or someone pressuring you to make quick financial decisions. Other scenarios include attempts at tricking you into sending money using a recording of a loved one’s voice.
Online scams
A fake website can look remarkably like a legitimate one. Unfortunately, you may end up buying something that doesn’t exist or never receive the items you thought you purchased.
Check fraud
Not a new technique, but innovative technology has enabled it to become more effective and more widespread.