Phishing :
What is Phishing ?
Phishing refers to 'fishing' out sensitive information such as banking
details by pretending as a trustworthy entity. Usually the attacks will be in
the form of an e-mail that appears to be from the bank. These randomly generated
e-mails contain click able links that guides you to a scamsters log on page
which will be a page designed to capture your details. Different techniques will
be employed by the scamsters to make you click on the links and enter the user
id and passwords. Scamsters then use this information to siphon off funds or,
undertake transactions that are billed to the original customer.
How Phishers operate ?
Usually Phishing attempts will be in the form of a spam mail which
contains click able links that will direct you to the 'spoofed website’, which
scamsters have created. The fraudsters will procure a database of valid email
addresses over a period of time in advance through publicly available sources.
The website to which the email directs will have the same look and feel as the
bank's website. The URL or the website address of such fake pages will be
created by the scamsters on freely available web hosting servers. Our Bank
website's URL is www.almoraurbanbank.com,. The fraudsters create fake websites
with URL almost similar to the real one. Those who are unaware of this fact
enter their login details which will be captured in the background by the
fraudsters. The mis-users then log-in remotely into such victims’ accounts and
transfer funds into their account. We expect our customers to be alert of the
above facts.
Spoofing:
Website Spoofing is the term for falsified e-mail addresses that appear to come
from a sender when in fact, the message is really being sent by a spammer. They
can be difficult to spot and cause many problems, both for recipients and
spoofed e-mail address owners. Scamsters can not only fake the URL but also the
Pad lock icon at the bottom right corner.
Vishing:
"Vishing" or "Voice Phishing" is the act of leveraging a new technology called
Voice over Internet Protocol(VoIP) in using the telephone system to falsely
claim to be a legitimate enterprise in an attempt to scam users into disclose
personal information. The victim is contacted by a phishing e-mail directed to a
VoIP based telephone number. The user may receive a telephone call from another
individual with a spoofed caller ID or a recorded incoming call with a spoofed
caller ID directing them to a phishing site.
Fraudsters uses a spoofed (fraudulent) caller ID matching the identity of a
misrepresented organization and they invite you to punch your telephone
information through your telephone keypad. The content of the incoming message
is designed to trigger an impulsive reaction from you. It can use upsetting or
exciting information, demand an urgent response or use a false pretense . Any of
the personal information such as bank account number, credit card number, PIN
etc should not be typed in your telephone keypad in response to above mentioned
calls. As a customer you also have a role in stopping vishing scams. You are
encouraged to recognize it, report it and stop it. Do not react immediately
without thinking.
skimming:
What is skimming?
Skimming is a scam where scamsters use a skimming card reader or skimmer with
which they make a counterfeit copy of the ATM card or Credit card. While the
victim withdraws money from his/her account the card details will be read into
the skimmer or an attached PC. Once the skimmer gets the card data they can
duplicate the card and also use it for online shopping.
Usually Skimming card readers or Skimmers will be placed in ATMs or POS machines
. Skimmer is a small electronic device which is capable of capturing the data
present in magnetic strips of the cards. Skimming may take place during a
legitimate transaction at a business. Such fraudulent activities can happen
mostly in shopping outlets and restaurants. For example, in a restaurant your
card may be taken away when the bill is being settled and may use your card for
regular transaction, also for capturing the card details. This captured card
details will be misused by the scamsters. TIPS TO PROTECT
YOURSELF FROM SKIMMING Do not leave your card unattended.
Keep changing your ATM Card PIN number regularly
Use your hand or body to shield your PIN from onlookers when you are conducting
transactions at a bank machine or at the point-of-sale. Beware of a
skimming card reader. Regularly check your statements or passbook to
verify all transactions have been properly documented. Never let your card
out of your sight, for example at a restaurant.
|