Fraud comes in many forms and a variety of channels. It's important to understand each type thoroughly and the implications of each in order to protect yourself to the highest level possible. You are the most important defense in fighting and recognizing fraud. Explore the most common fraud types below and as always, contact your branch location if you have any questions.
A DDoS Attack stands for distributed denial of service (DDoS). This is a type of online attack where scammers flood a website with millions of requests of information at once. This creates a “traffic jam” and limits the ability for customers to access their online banking. This type of attack is most common with financial service related websites.
No. During the attack, the website will seem slower than usual, or may even be disabled. This does not affect the security of our website or banking systems. All personal information will remain safe and private.
Identity theft is when someone has your personal information and is posing as you. Identity thieves can drain your bank account, make purchases with your credit card, open an account in your name, or receive medical treatment on your health insurance. Some might even attempt tax-related fraud such as filing a tax return in your name and claiming your tax refund.
They don't need much. One of the following is all one would need:
Malware is short for “malicious software.” Malware is when a scammer will install software on your computer, phone or mobile device without your consent. Scammers use this software to crash your computer or monitor and control your online activity by stealing personal information, sending spam, and committing fraud.
If you think your computer has malware, the Federal Trade Commission wants to know. File a complaint at www.ftc.gov/complaint.
During a phishing attempt, a scammer will distribute emails that appear to come from legitimate organizations or individuals. The scammer wants to entice the recipient to click on malicious links or attachments.
The typical goal of phishing attacks is to get the victim to give up sensitive information such as a Social Security number or financial information. Phishing is also used as a way for attackers to get inside an organization's network for cyber espionage or other malicious activity.
A spoofed email is a form of phishing where an email looks familiar to what you know, from someone you know. It is designed to steal personal information from you, including bank information.
If you think you might be on a spoofed site via a spoofed email, close your web browser and forward the email to firstname.lastname@example.org. If a hacker tries to mimic a Central Bancompany site, it will take full legal action against that person(s).
Skimmer devices are placed over the card reader slot on ATMs and gas pumps to collect magnetic stripe data. Cameras are placed above or beside the keypad to capture the PIN as it is entered.
Before you use ATMs and gas pumps, tug on the card reader slot and look for an attached camera. Cover your hand while keying your PIN and wiggle the keypad. If the keypad is loose, it may be a fake keypad.