Fraudulent emails are used by criminals to lure you to fake websites, which resemble original websites of financial institutions, and ask you to divulge personal information such as account number, credit card number, PIN number or Security Authentication Key.
The most common type of phishing e-mail purports to be a security message requesting you to validate your personal details or security questions. However, the details you confirm are then sent to the criminals. BBK would NEVER request such personal information from you in such an e-mail.
How to protect yourself?
Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information
through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof websites which appear legitimate, pharming ‘poisons’ a DNS server by infusing false information into the DNS server, resulting in a user’s request being redirected elsewhere. Your browser however will show that you are at the correct website, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.
How to protect yourself?
With the evolution of e-mail, users have been targeted by global email scams that are intended to collect critical personal and financial information from unsuspecting victims. Illegitimate offers are e-mails that entice users to purchase popular goods or services at reduced prices (or before they’re available to the general public), with no intent to deliver those purchases. Usually, these e-mails are designed primarily to obtain credit card or bank account information.
Other fraudulent emails are in the form of requests for help that usually offer a recipient large sum of money or attractive rewards in exchange for “short term” financial assistance. One common example is the “sender” who asks the recipient to supply a bank account number to “hold” large sums of money until the “sender” can retrieve it. In exchange, the recipient is promised a percentage of the deposit. The “sender” uses the bank account number for fraudulent activity, and the recipient never receives the promised funds.
How to protect yourself?
Key loggers are software programs that capture a computer user’s keystrokes. Such systems are used by hackers to obtain passwords or encryption keys and thus bypassing other security measures.
A Trojan is a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.
How to protect yourself?
ATMs have simplified personal cash management and allow withdrawal of cash outside of banking hours. However the frequency of ATM frauds has also increased.
Different types of fraud:
How to protect yourself?
SMiShing is a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his cellular phone or other mobile device. SMiShing is short for “SMS phishing.”
How to protect yourself?
Identity theft happens when a criminal obtains your personal information to steal money from your accounts, open new credit cards, apply for loans, rent apartments and commit other crimes — all using your identity. These acts can damage your credit, leave you with unwanted bills and cause you countless hours and frustration to clear your good name.
How to protect yourself
This website uses cookies to ensure you get the best experience and by clicking “I Accept” below, you consent to the use of cookies. Learn more