- Search the Internet safely. Even though search engines are very useful when you’re looking for products, reviews, or price comparisons, you run the risk of unintentionally clicking on ‘poisoned’ search results that could lead you to malware instead of your intended destination. These poisoned search results are created by cybercriminals that use search engine optimization (SEO) tricks – sometimes referred to as Black SEO – to manipulate search engine results to include malicious links.
- Type the URL into the address bar. Instead of just clicking a link to take you to your chosen retailer’s website, it’s safer to type the retailer’s URL into the address bar on your web browser. It may take a little more effort, but this simple action can help to prevent you visiting a fake or malicious website.
- Credit Cards. Use the safest way to pay on the Internet. Pay for your order using a credit card. The safest way to purchase items via the Internet is by credit card because you can often dispute the charges if something is wrong.
- Get a temporary credit card. Some credit card companies will issue a temporary credit card number for their customers. These temporary numbers can be useful for one-time purchases. However, you should avoid using them for any purchases that require auto-renewal or regular payments.
- Don't give out your credit card number(s) online unless the site is a secure and reputable site. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but might provide you some assurance.
- Check on your credit card statements. Check your bank statements on a monthly basis. Don't let them sit and pile up, anyone who uses a credit card could potentially be hacked and could become a victim through no fault of their own.
- Dedicate a computer to online banking and shopping. For added security, you could use a dedicated machine for online banking and shopping. This should be a ‘clean’ computer that is totally free of computer viruses and any other infections. In order to help keep it clean, the machine should not be used for any casual web browsing, social networking, or email. Install Google Chrome, with forced HTTPS.
- Use a dedicated email address. It’s worth considering creating an email address that you only use for online shopping. This can help you to reduce the risk of opening potentially malicious email or spam messages that are disguised as sales promotions or other notifications. If such messages are sent to your primary email address, you’ll be aware that there’s a fair chance that they’re fake or malicious.
- Manage and protect your online passwords. Using a password manager can help you to deal with multiple accounts and passwords – and to encrypt passwords that would otherwise be in plain text. Some antivirus and Internet security software products include password management and password security features.
- Beware of using public Wi-Fi. When you’re in a shopping mall – about to make a purchase – it can be useful to make a last minute comparison with the best deals that Internet retailers are offering. However, there can be security risks if you access the Internet via a public Wi-Fi network . Cybercriminals can intercept your data and capture your passwords, login details, and financial information. If you need to access the Internet when you’re out shopping, it’s safer to do so via your cellular network.
- Consider using your tablet. If you have a Linux-based device – such as a Samsung tablet or another device that runs the Linux operating system – it may be safer to use that for online transactions. Apple iPads may also be less likely to be exploited while you’re shopping online – provided that your device has not been jailbroken. However, always remember to avoid using a public Wi-Fi network – or there’s a risk your passwords and other data could be stolen.
- Before using the site, check out the security/encryption software it uses.
- Make sure you are purchasing merchandise from a reputable source.
- Send them e-mail to see if they have an active e-mail address and be wary of sellers who use free e-mail services where a credit card wasn't required to open the account. Consider not purchasing from sellers who won't provide you with this type of information.
- Check with the Better Business Bureau from the seller's area.
- Check out other web sites regarding this person/company.
- Don't judge a person/company by their web site.
- Be cautious when responding to special offers (especially through unsolicited e-mail).
- Be cautious when dealing with individuals/companies from outside your own country.
- Make sure the transaction is secure when you electronically send your credit card numbers.
- Trust your instincts. If you don't feel comfortable buying or bidding on an item over the web, or if you feel pressured to place your order immediately, maybe you shouldn't.
- Be knowledgeable about web-based auctions. Take special care to familiarize yourself not only with the rules and policies of the auction site itself but with the legal terms (warranties, refund policy, etc.) of the seller's items that you wish to bid on.
- Double check pricing. Be suspicious of prices that are too good to be true. Also consider carefully whether you may be paying too much for an item, particularly if you're bidding through an auction site. You may want to comparison shop, online or offline, before you buy. Make sure there are not extra shipping or handling costs.
- Find and read the privacy policy. Read the privacy policy carefully to find out what information the seller is gathering from you, how the information will be used, and how you can stop the process. If a site does not have a privacy policy posted, you may not want to do business with it. If it does have a privacy policy, there will probably be a link to it from the seller's home page, or it could be included with the Legal Terms.
- Review the return, refund, and shipping and handling policies as well as the other legal terms. If you can't find them, ask the seller through an e-mail or telephone call to indicate where they are on the site or to provide them to you in writing.
- Make sure the Internet connection is secure. Don't trust a site just because it claims to be secure. Before you give your payment information, check for indicators that security software is in place.
- Print the terms. You should print out and date a copy of terms, conditions, warranties, item description, company information, even confirming e-mails, and save them with your records of your purchase.
- Insure the safe delivery of your item. If you're concerned you may not be home when your package is delivered and that someone may take it if it is left on the doorstep, ask whether you can specify that the shipper must receive a signature before leaving the package. Or, it may be safer to have the package delivered to your office.
- Inspect your purchase. Look at your purchase carefully as soon as you receive it. Contact the seller as soon as possible if you discover a problem with it. Tell the seller in writing about any problems you have, ask for a repair or refund, and keep a copy of your correspondence.
Security for your online purchases:
Before purchasing online, you should assess the security of both your computer and the seller's systems. You can limit the risk of identity theft by shopping only on websites that disclose an effective data security policy. A data security policy explains how an online seller aims to protect your personal information. When guarding yourself against Internet crimes, also consider your payment options, account security, and malware protection.
- How can I tell how an online seller secures my personal information?
Many online sellers describe their methods of protecting your personal information in the security, privacy, or FAQ section of their website. Typically, the description of a data security policy discusses technological security, physical security, and other relevant issues. - What happens if my personal information is stolen from an online seller that I have done business with?
Most online sellers will notify customers, affected businesses, and law enforcement agencies when a data breach occurs. The notification letter to customers usually describes how personal information was compromised and the seller's response to the data breach. While federal law generally does not mandate data breach notification to consumers, most states do require such notification. - What should I do if I am notified of a data breach?
Once you receive notification of a data breach, you should immediately place a fraud alert on your credit files. Instructions for placing a fraud alert can be found here. You should also monitor your accounts for evidence of unauthorized transactions. Some sellers offer free credit-monitoring services after a data breach to mitigate its effects. Check with the seller to find out if it offers these protections. - What if there are unauthorized charges on my credit card?
If you find charges on your credit card statement that you do not recognize, you should contact the issuer of the credit card. Federal law allows you to dispute and obtain records of the fraudulent actions resulting from the theft. The Fair Credit Reporting Act requires the seller (and other targeted businesses) to provide you and/or law enforcement agencies with transaction records related to the identity theft within 30 days of your written request. - How does the payment method I use affect the security of online shopping?
When selecting a payment method, you should give some thought to security. Most online sellers accept a variety of payment methods to make purchases, such as credit cards, debit cards, checks, prepaid cards, and gift cards. Some sellers accept payment through third-party payment processors such as PayPal, Google Wallet, and Amazon Payments.
Third-party payment processors pay the seller directly so you can avoid submitting payment information to the seller, which reduces the risk of dealing with a seller you are not familiar with.
Some credit card companies allow you to reduce the risk of fraud by offering single-use or virtual credit card numbers. Most major card issuers offer zero-liability policies, so that if your card is used fraudulently you will not have to pay anything. This goes beyond the requirements of federal law, which limits your liability to $50.
If you are uncomfortable submitting your payment information online, some sellers allow you to pay by phone or fax, or through the mail (a small additional fee may be assessed). Keep in mind that any payment information you submit offline likely is stored on the seller's servers. - Why does password security matter?
Your accounts with online sellers generally require a password for access. Anyone who obtains your password can access the account and make purchases without your knowledge, or acquire your personal information. So guard your accounts with strong passwords, and never disclose a password except when accessing the account yourself.
Keep Records: How should you keep records about your purchase:
- A printout of the web pages indicating the seller's name, postal address, and telephone number;
- A printout of the web pages describing the item(s) that you ordered;
- A printout of the web pages or pop-up screens that provide the seller's legal terms;
- Printouts of any e-mail messages (for example, confirmation messages) that you send to or receive from the seller. This includes:
- Those that might show that the seller indicated that the product would be suitable for the specific purpose for which you needed it,
- Those in which you notify the seller of problems with the merchandise that you have received; and
- Those that would show your good faith attempt to resolve with the merchant a charge that you do not feel should have been made to your credit card.
- Notes or e-mail confirmations of any telephone conversations that you have with the seller.
When buying or selling with strangers:
If meeting when buying or selling: Talk on the phone before meeting. You can determine about a person from a conversation.
Do not use your personal phone number: A Google Voice number is a great tool for when you’re buying and selling with strangers because it will help protect your privacy.
If you decide to meet:- Meet in a public place, preferably with security cameras
- Never meet in a secluded place
- Tell a friend or family member where you’re going or bring him or her along.
- Take your cellphone.
*
Important Note: ONLY deal locally, face-to-face. This is what Craigslist advises to avoid 99% of scam attempts.
1. Stay local. Craigslist and other online classifieds markets are designed to be local, which is why the site is divided into regional and city-specific listings. Never do business with anyone in another state or country, or anyone who makes a lot of excuses about why they can’t meet you in person. Scammers frequently lie about being missionaries, being in the military, taking care of a sick elderly relative or working for a multinational corporation to “explain” why they’re abroad. Don’t believe their stories. Craigslist states on their support page that if you only deal locally with people you can meet in person, you’ll avoid 99% of scams.
2. Avoid gift cards, wire transfers, cashiers's check, money orders as payment methods. Also avoid P2P payments such as Zelle, Venmo, and others unless you know the seller and can trust them. It’s a huge red flag if someone wants to send or receive payment through the mail or via mobile apps. Anyone who suggests a wire transfer (like Western Union or MoneyGram), a cashier’s check or a money order is most likely trying to scam you.
- Never conduct business with someone who wants to use P2P payments, gift cards, cashier’s checks, money orders or wire transfer services such as Western Union. This is a sign that they’re most likely trying to scam you. When you conduct a transaction using one of these methods, you’re not protected if things go south. If you’re buying an item that proves to be defective (or even nonexistent), you won’t be able to get your money back after it’s sent.
- Also, if you accept a cashier’s check or money order as payment for a sale and it doesn’t clear, you will be held liable to pay your bank the full amount — plus any bank fees. Even worse, you may even face legal problems.
- Cash is the only secure currency for online marketplace transactions transactions. If you’re dealing with a large amount of money and the buyer or seller isn’t comfortable handling so much cash in a public place, meet at a bank or credit union and make the transaction inside the building. The money can be withdrawn and then deposited right there in the bank.
3. Be cautious when using online escrow. Be cautious when the buyer or seller wants to use an online escrow service. Many scammers use fake escrow sites that may look like the real thing. Watch out for red flags such as poor spelling and domain spoofing. Never send financial information online unless the website displays a secure “https://” URL.
4. Don't commit without seeing goods in person. You might end up with an item that’s broken, not as described, or doesn’t exist at all. If you’re selling, be very cautious of a buyer who is eager to purchase your items sight-unseen. This is a big flag, especially if you’re selling something really valuable.
One common Craigslist scam involves a “buyer” who sends you a money order or cashier’s check, which is much higher than the agreed-upon price because they “made a mistake.” The scammer asks you to deposit it and send them the price difference via Western Union. After you’ve wired the money, the bank discovers it’s a counterfeit check and you’re responsible for paying it. By then, your own money is long gone.
5. Don't fall for job scams. If you’re looking for a job on Craigslist, you should be very careful about anyone who’s willing to hire you without an interview. Even if you’re applying for jobs that involve telecommuting, research the company just to be safe. Make sure they have a physical location near you and visit their offices before you provide any private information for a credit/background check.
Never accept a job on any online classifieds web site for secret shopping, international shipping management, foreign financial transfers, survey-taking, anything that requires you to pay money, or anything that simply involves “working from home” without going into greater detail. These types of “jobs” are almost always a scam.
6. Use a counterfeit pen detection pen. A counterfeit detection pen will allow you to find out if someone is trying to pay you in phony bills. These pens use a special iodine ink that changes color when applied to wood-based paper (real money is printed on fiber-based paper used exclusively by the government). You can find counterfeit detection pens at most office supply stores, or online, for around $5.
7. Most online marketplace do not certify listings. Sites like Craigslist have no verification or screening process for transactions. If anyone claims to be “certified” or “guaranteed” by Craigslist, they’re almost certainly trying to scam you. Scammers frequently lie to get you to trust them. There is no such thing as “Craigslist buyer protection,” “Craigslist seller certification” or “Craigslist payment services.” Avoid anyone who uses these phrases or similar language on any online site.
8. Research the buyer or seller. Search for their name, email address, business or any other personal information they’ve provided. If this person has ever scammed anyone (or attempted to scam anyone) using the same information, it’s probably been reported online. Just remember that scammers often use many different aliases.
9. Don't give out personal information. When you sell online, don’t include any personal information (name, address, phone number) in your public listing. No one needs to know anything about you unless they’re buying whatever you’re selling. Then, after you’ve agreed to the transaction, it’s unlikely that you’ll need to share more than your phone number.
- For extra protection, create a free disposable phone number using Google Voice: https://voice.google.com. When conducting business online, there are some circumstances where you may need to give out your phone number. Sign up for Gmail and get a free Google Voice number, which you can use to forward calls to your cell phone or land line. You’ll be able to give this secondary number to someone you meet online without revealing your primary contact info. Then, if something goes wrong, you’ll be able to block them or just drop the Google number. It’s an easy way to protect your privacy and your existing phone lines.
- Never invite the buyer to your home unless it’s absolutely necessary. If they need to come to your home to pick up a large piece of furniture, for example, move the furniture to your front lawn or open garage and don’t let them inside. Make sure you’re not home alone and tell your neighbors you’re expecting a buyer.
10. Trust your instincts. Always follow your instincts. If something seems like it's not right, or someone makes you uncomfortable for any reason, just walk away.
The beauty of online banking and other online accounts is that you can monitor them almost in real time. That means you can catch crooks long before a statement arrives in the mail.
Here’s how to shield your money and your existing accounts.
- Create strong passwords and user IDs, change them frequently, and don’t use the same ones for all your accounts. These steps make it harder for criminals to steal the virtual keys to your accounts and limit the damage they can do if they crack your code.
- Pay attention to security alerts that inform you about possible data breaches. It is a good idea to change your password if you have reason to believe that your information has been compromised.
- Keep your antivirus software up to date. The technology environment is constantly changing and antivirus software can quickly become obsolete.
- Use different passwords for each of your accounts, including email, website logins, social media, etc. If one website gets hacked, your credentials are still safe across all of your other accounts.
- Consider using a password manager, which generates and stores long, complicated passwords. The basic offerings among companies are the same, though there are differences in price,
- Monitor your credit reports and credit score. Thieves can use your information to set up new credit cards in your name with a fake address. This means you’ll never receive bills, so your first clue that something is amiss may be a credit score left in ruins by unpaid bills or delinquent charges on your credit report. You are entitled to receive a free copy of your credit report once every 12 months through AnnualCreditReport.com.
- Explore putting a lock or a freeze on your credit reports compiled by Equifax, Experian and TransUnion. Both a lock and a freeze block access to your credit reports, making it highly unlikely that anyone could open a credit card in your name.
- Don’t give out vital data like Social Security and bank account numbers to strangers calling over the phone. If you think the call may be legitimate, ask for the person’s full name and a number to reach out to him later.
- Consider buying identity-theft insurance through your financial institution.
- Don’t ignore your snail mail. Make sure you aren’t receiving unsolicited credit cards or collection notices for products and services you never purchased.
- Exercise caution when clicking on websites and emails. Thieves have become expert in forging the look of legitimate sites.
- If you typically do your banking in person at a nearby branch, consider creating an online account. You’ll be able to closely monitor account activity and spot breaches quickly. You could also prevent a thief from opening an account in your name.
- Get Account Alerts. Ask your financial institution or brokerage house representative if the institution provides account activity notifications and how to implement them. Alerts will notify you about activity on your account. Review alerts immediately can protect against fraudulent activity on your account.
- Don't use your account on an unknown computer. Unless you are sure a computer is secure, be wary of using a unknown computer. Computers can record pages viewed and keystrokes entered among other possible security violations. Granted, this will not be your experience on most computers, but be careful.
- Check Your Last Login Date. When you logon, your last logon date is displayed on the People's United Bank welcome page. Always check this date to ensure someone else is not using your account.
- Register Your Computer. Not only will this make logging on to your account quicker, it reduces the chance that the answers to your security questions will be compromised.
- Enroll into E-Statements. Receive your statements electronically. Paper statements can divulge your financial information if stolen from your mailbox.
- Review Account Activity. Review your online accounts for any transactions you did not initiate. Early detection may prevent large losses.
- Don't use your computer at work. Even if it's on your lunch hour and on your own time, employers can monitor computer usage and even typing (although most don't). While your company might not care how much money is in your accounts, those who are paid to monitor Internet and email use will also have access to this information. You can use your computer at work, just be aware of the risks.
- Shred or securely store your paper bank statements. One of the advantages of online banking is that your records are stored securely online. However, if your financial institution sends you monthly statements about your account or another account you have with them, be aware that these statements can include log-in information as well as account numbers that can be used to access your account. You should shred these documents when you are done with them or store them in a secure place.
- Understand security and online banking. You have taken a good first step by reviewing the information on this site and this list of security measures that you can take, but make sure you continue to be aware of the security measures your financial institution employs.
To help prevent fraudulent use of your card, here are steps you should take.
- Check your Credit Cards accounts often. Reviewing your recent account activity is fundamental to credit card safety—and it’s easy. You can do it online or by phone. If your credit card issuer offers email or text alerts about unusual activity, sign up to receive them.
What to do if you suspect credit card fraud. Call the bank or financial institution that issued your card immediately. Your issuer may want to cancel your current card and issue you a new one. Check with your issuer to verify that your mailing address has not been changed. If you still have your card but fraudulent purchases have been made, call your issuer to report the fraud and request a new card. Also, contact the credit bureaus to let them know that fraud has occurred. A "Fraud Alert" message will be placed on your file. You should also request a copy of your credit report and review it carefully.
- Sign new cards as soon as you receive them.
- Avoid giving out your credit card information. Only give your credit card number or other sensitive information on calls you initiate. Not only that, when you call your credit card issuer's customer service, use the number on the back of your credit card. Don't return calls to a phone number left on your answering machine or sent to you in an email or text message. It's hard to be sure a scammer hasn't left a fake number for you to call.
- Place your credit cards in a purse or wallet close to your body where it can't easily be snatched away.
- Don't give your credit card number to anyone who calls you requesting the number. Credit card thieves have been known to pose as credit card issuers and other businesses to trick you into giving out your credit card number.
- Keep your card account numbers and personal identification number (PIN#) in a confidential place.
- Check your cards periodically to make sure none are missing & report lost or stolen credit cards immediately. The sooner you report a missing credit card the sooner your credit card issuer can cancel your credit card and prevent fraudulent charges. Reporting your lost or stolen credit card as soon as possible lowers the likelihood that you'll have to pay for any fraudulent charges made on your credit card. Write down your credit card companies' customer service number now so you'll have them if your credit cards are ever missing.
- After you make a purchase put your credit card away immediately. Confirm you have your credit card back in your possession before you leave the store or restaurant. Thieves can take pictures of your credit card with a camera or cell phone, so don't leave your credit card exposed any longer than necessary.
- Don't sign blank credit card receipts. Always verify the amount on your credit card receipt before signing it. If you get a credit card receipt that has blank spaces in it, write $0 in those spaces or draw through them before putting your signature on the card. Otherwise, the cashier could write in an amount and send the purchase to your credit card issuer.
- Destroy and dispose of copies of receipts, airline tickets, travel itineraries, anything that displays your card numbers.
- Memorize your PIN.
- Check out unfamiliar companies by calling your local consumer protection agency.
- Don't provide information that you're uncomfortable giving.
- NEVER give anyone the password that you use to log on to your online account or Internet Service Provider.
- Don't provide financial account information unless you are paying for a purchase using that account.and be safe with your credit card online. Don't click on email links from anyone that looks like your bank, credit card company, or other business who uses your personal information, even if the email looks legitimate. Instead, go directly to that business's website to logon to your account. Make sure you're cautious when you're using your credit card online. Only enter your credit card number on secure websites that you can be 100% sure are legitimate. To be sure a website is secure, look for https:// in the address bar and lock in the lower right corner of your internet browser. Taking these extra steps will help you avoid credit card fraud.
- Check gas stations and ATMs for credit card skimmers. Credit card thieves sometimes place credit card skimming devices onto the credit card readers at gas pumps or ATMs.
- Make strong passwords and keep them safe. Your credit card number may be stored in a number of places online. For example, you may save your credit card on Amazon so you can make one-click purchases.
- Review your billing statements each month. Unauthorized charges on your credit card are the first sign of credit card fraud. If you notice a charge you didn't make, no matter how small, report the charge to your credit card issuer immediately. Your credit card issuer will tell you whether you should close your account and get a new account number to avoid credit card fraud.
WHY ARE CHIP CARDS MORE SECURE?
EMV, which stands for Europay, MasterCard and Visa, refers to a standard for cards equipped with computer chips. Rather than swiping the card, as you would for a card with a magnetic stripe, you insert the card into a terminal slot during a transaction and then remove it once the transaction is complete.
- The chip generates a unique, one-time code each time you dip your card at a chip-enabled terminal. Your purchase can only be approved with the chip-generated code.
- One of the biggest perks of EMV cards involves a higher level of security. Unlike the magnetic stripe on a card, which contains data that remains the same, EMV cards change with each transaction. EMV cards are a great solution to the problem with skimming because they produce unique, 1-time tokens that a hacker can't reproduce. They're basically impossible to predict, and they don't work for more than 1 transaction. So, if a hacker gets your card number and clone the card, he or she can't use it at a retailer that accepts EMV.
- The chip in your card is virtually impossible to duplicate. That means attempts by a fraudster to create and use counterfeit cards will be much harder.
- Consumers continue to have zero liability for fraudulent transactions.
- Keep in mind that EMV cards don't significantly improve security for online purchases, nor does the technology work when the ATM or point-of-sale terminal hasn't been upgraded, like at many gas stations, for example.
Types of Card Criminals:
- Malware writer: Malware authors write the software code that remotely hacks into major databanks to get stored credit card numbers. Some malware writers are part of organized crime rings, others are freelancers selling code with no idea of who uses it. Someone will create the malware, then they sell it for hackers to use to steal credit card data.
- Phishers and Spoofers: Some malware coders specialize in creating phishing emails or web site designed to get you to give up your personal information. They may have hacked into a database to get your email address. Besides targeting consumers, phishers also often target nontechnical employees of banks or retailers that handle a lot of consumer data.
- Shady clerks and wait staff: The same guy that's serving your food may be dishing out your credit card number to an organized crime ring. Gangsters sometimes score credit card information by putting employees of legitimate businesses on their payroll. These employees use small portable skimmers that fit in the palm of the hand and steal your credit card number as they process your payment for the legitimate business.
- Skimmer installers: Another brand of criminals mounts hidden skimming equipment anywhere credit cards are swiped. Good targets are unmonitored payment locations, such as gas pumps, vending machines and train ticket kiosks. These skimmer installers vary widely in skill and sophistication. They may leave a skimmer in one location for a few days, gather a few hundred credit card numbers and then stop collecting data before they get caught. Tech savvy fraudsters can also buy skimmers with built-in SIM cards enabling remote configuration, remote data uploading and even tamper alerts that, if triggered, will cache the data and send it out immediately. Sometimes these skimmers also are paired with cameras or keystroke loggers to capture additional information including your PIN, ZIP code and the card validation code (also called CVV2 or CVC2) that is written but not embossed on your credit card.
- Fake technicians: This con artist looks and acts like a company technician. The scenario plays out with someone walking into a store with an authentic-looking work order to replace the old credit card terminal. But this tech guy has no connection to the real processing provider. The new terminal installation comes with an extra feature: a computer chip that copies credit card numbers and sends it out to another online server. These setups allow fraudsters to get all the magnetic stripe information and PIN numbers from swiped cards.
- Counterfeit credit card manufacturers: These modern day counterfeiters don't make $20 bills. Instead, they buy stolen credit card numbers and make fake credit cards. All that's needed are imprint machines, a magnetic card writer and, sometimes, credit card stock -- all of which are for sale legally. Sometimes, criminals don't even need new card stock. Instead, they can take the magnetic stripe data from the stolen cards and overwrite it onto existing credit cards or even onto hotel key cards. That's one reason merchants may ask to see your credit card for a transaction. They want to compare the last four numbers embossed or printed on the front of the card with the last four digits of the account number that the magnetic stripe sends to their system to make sure it matches.
- Data sales websites: The credit card numbers that don't end up on fake cards often end up on websites offering credit card numbers for sale. Operators of these sites offer thousands of credit card numbers and associated information for sale. Also for sale are card expiration dates, card validation codes, ZIP codes and PINs.
- Shoppers, mules: At the end of the chain are crooks who buy the fake credit cards or fraudulently obtained card numbers and shop with them, typically for items that then can be resold. They buy big-ticket items at electronics stores such as Apple or major retailers such as Home Depot. Grocery stores -- because they sell gifts cards that can easily be resold -- are another big target.
Avoid this scam: Card Cracking
In card-cracking scams, young adults (primarily students, newly-enlisted military, or single parents) are recruited to facilitate fraud against the bank. The perpetrators typically target consumers via social media and convince them to share their checking account information in exchange for some type of a kickback – usually in the form of a counterfeit check remotely deposited into their account of which, the consumer is allowed to keep a portion of the funds. However, the fraudster often removes all of the funds before the bank determines that the check is counterfeit. Fraudsters may also convince the student to provide them with their debit card, along with their PIN. The consumer is instructed to report the card as lost or stolen, thereby receiving protection via Reg E, while the fraudster withdraws the funds.
Recognizing fraud
- Lost or stolen card. Your card is lost or stolen and the card is subsequently used without your permission.
-
Non-receipt. You did not receive a new or replacement card that was sent to you by your Issuing bank. You may have no idea that the card was missing until you receive a statement listing transactions not made by you.
-
Fraudulent application. Your personal information is used to apply for a credit card. This type of fraud is often difficult to detect until the issuer receives a complaint from the consumer or the account goes into collections shortly after having been issued. If you're not a customer of the bank that issued the card, you may not know a card has been issued in your name until you apply for credit elsewhere and are denied because of a poor credit rating.
-
Counterfeit. Even though the card is issued to you by your bank, transactions appear on your account statement not made by you. This could be an indication that a counterfeit card bearing your account number is in circulation and being used at the same time you're making legitimate purchases.
-
Account takeover. While you're in possession of your card, somebody else posing as the cardholder "takes over" the account by requesting a replacement card on the same account, usually to be mailed to a different address. You would not know this has been done until you receive an account statement showing transactions not made by you or you fail to receive your monthly account statement.
-
No card present. While you're in possession of your card, somebody makes transactions using the card number only, as in the case of mail orders, phone orders, or Internet transactions. You may not know this has been done until you receive an account statement showing mail/phone order or online transactions not made by you.
-
Other scenarios. There are other scenarios that are classified as fraud, but don't fall into the described categories. An example would be the theft and subsequent use of balance transfer checks, which you may or may not have ordered from your bank.
-
What to do if you suspect fraud. Call the bank or financial institution that issued your card immediately. Your issuer may want to cancel your current card and issue you a new one. Check with your issuer to verify that your mailing address has not been changed.
If you still have your card but fraudulent purchases have been made, call your issuer to report the fraud and request a new card. Also, contact the credit bureaus to let them know that fraud has occurred. A "Fraud Alert" message will be placed on your file. You should also request a copy of your credit report and review it carefully.
There are several traps that target people selling gift cards.
- In one scam, fraudsters pay you for a card (or the code on the card), but then dispute or cancel the charge after they have already used the gift card.
- In another, they ask you to buy a bunch of gift cards in exchange for an item on an auction site—and then never actually send you the purchase.
To avoid becoming a victim, take several precautions when you use gift card websites.
- Check reviews of any website you use.
- Always review gift card balances before and after purchasing the card.
- If you are selling a gift card, don’t ever give out the card’s PIN until your payment transaction is complete.
- Be wary of auction sites selling gift cards at a discount or in bulk.
- If you are buying a gift card in a store, examine the protective scratch-off area on the back of the card for evidence of tampering.
- Beware of social media postings offering vouchers or gift cards: Fraudulent messages can sometimes appear to have been shared by a friend when they really come from a scam artist.
Gift Card Phone Scam
A fraudster claims to be with a federal or state agency and is calling about a fake debt. The callers tries to pressure you for payment through a prepaid gift card and may threaten you with punishment if you do not comply. Keep in mind that NO government agency or reputable business will EVER ask for payment with gift cards.
Protect yourself against gift card phone scams:
- If you field a call from someone insisting he or she is a government official, but the individual demands payment through a gift card, hang up.
- Do not read or text the PIN number on the back of a gift card to anyone as scammers can use the number like they can use cash.
- Reputable businesses don’t rely on gift cards for payment.
Other kinds of scammers, some of them also imposters, who might demand payment by gift card include:- callers pretending to be from a utility company, telling you to pay your bill by gift card or they’ll cut off your power or water.
- sellers on online auction sites who ask for gift cards to “buy” big items like cars, motorcycles, boats, RVs, tractors and electronics.
- someone posing as a military service member to get your sympathy, saying he has to sell something quickly before deployment and needs you to pay by gift card.
- callers who say you’ve won a so-called prize, for a sweepstakes you probably never entered – but first, you have to use a gift card to pay fees or other charges.
- someone buying something from you, probably online, who sends a check for more than the purchase price – and asks you to give them the difference on a gift card.
Protect yourself from gift card fraud:
- Don't buy gift cards displayed prominently within the store. Ask
sales clerks to sell you cards from the back room or behind the customer
service desk.
- Examine cards and packaging for signs of tampering. Don't buy a
card where the coating covering the PIN number has been scratched away or
the activation sticker isn't firmly affixed.
- Spend the gift card as soon as possible. Don't put the card in a
drawer for months. The longer consumers take to spend their gift cards, the
more time thieves have to do it for them.
- Beware of online exchanges and auction sites. Online buy cards
from reputable online exchanges or auction sites because of the possibility
of buying stolen cards.
- If you purchase gift cards to give as gifts, ensure they come from a reputable and trusted source.
- Consider gift cards the same as cash and secure them like you would your wallet.
Prepaid Cards
Types of crimes:
- Fraudsters can purchase prepaid cards with stolen credit card information. Most prepaid card providers have established law enforcement escalation numbers, that can be reached by calling the phone number listed on the back of the prepaid card and requesting the law enforcement or fraud/risk hotline.
- Another type of fraud occurs if you receive a credit, debit or prepaid card in the mail (other than a renewal of an existing card) which you did not request or apply for the specific card. This can indicate that you may be a victim of identity theft fraud.
PayPal, Zelle, Snapcash, Square Cash, Venmo, Popmoney — the world is flush with peer-to-peer (P2P) payment services. Go above and beyond to keep your money safe by doing the following when using P2P services:
- Add a PIN or two. Each platform should have a way to add and require a personal identification number to complete transactions. For added protection, set one up on your mobile device, too, so in case you ever lose your phone it’s not exactly like you lost your wallet as well.
- Opt in for notifications on every transaction. Some platforms do this automatically, but if yours doesn’t, dig into your settings so that you get emails or texts any time there’s a transaction on your account.
- Confirm that you can find help if things go wrong. Some P2P apps make users resolve their own disputes. Others offer significant help to resolve issues. Before using any P2P service, search the app for customer service contacts and procedures so that you know where to go and what kind of help to expect.
- Know who you are paying. Pay and receive money only with people you know. Don’t pay strangers with P2P. Many peer-to-peer transactions are instantaneous and irreversible. Scammers try to get you to pay them in many different ways—including by sending money online—so make sure you know who you’re sending money to. If you use the service to receive money from someone you don’t know personally—maybe as payment for tickets to a concert or a game, or for an item you’re selling—transfer the money to your bank account and make sure the money is there before you send any goods. Read the terms of service if you’re not sure if these kinds of transactions are permitted on the service you use.
- Use a protected payment source. Link a credit or debit card when using peer-to-peer payment services so if your money is misdirected, you can have the error resolved by federal law. If you use funds kept in the P2P account, you are subject to state laws and the provider’s own policies, which can vary.
- Don't make errors. If you mistype a recipient’s email address, phone number or name, the money could go to the wrong person. Double-check the accuracy of your recipient’s information before you send off a payment.
- Security and user experience: The service should be easy to use and understand, and be secure. Most well-known platforms have good security in place, but you should still err on the side of caution. Avoid apps that have bad customer ratings and bad histories with data breaches. Peer-to-peer payment systems require access to your financial information, so check your account settings to see if you can enable additional security measures that aren’t on by default. Consider turning on multi-factor authentication, requiring a PIN, or using fingerprint recognition like Touch ID.
- Don’t use P2P services for business purposes. Most apps’ terms of service prohibit commercial use, such as using the P2P service to get paid for selling goods or services. Look instead for a payment app specifically meant for business users, such as Square Cash for Business, or PayPal. Read the terms of service if you’re not sure if these kinds of transactions are permitted on the service you use.
- Social Sharing. Some systems or apps might share information about your transactions on social media. Check social media permissions or settings—some may be set to share your information with everyone by default. Adjust your settings based on what you’re comfortable sharing.
- Keep your app up to date. Hackers exploit security vulnerabilities sometimes faster than the security pros can plug them. If you have old software, you’re missing the latest protections. Make sure you have auto-updates turned on for your device across the board.
Here are some examples of P2P scams:
- A fraudster may place a false online ad for merchandise, and after you pay for the merchandise through a P2P payment service, the fraudster keeps the money and never actually sends you what you purchased.
- You receive a text message regarding a recent charge on your debit card, and it asks you to verify the transaction. You reply that you don’t recognize the charge in question. You then receive a phone call from what appears to be your financial institution's 800 number, and someone claiming to be an employee requests you verify your account information, including your online credentials and a texted verification code. If you provide the information, the fraudster will then use it to log in to your account and use the linked P2P payment service feature to transfer funds.
- You are hired for a job and receive a fraudulent check from the 'employer'. You are told by the “employer” to deposit the funds using mobile check deposit, and to transfer the funds out using a P2P payment service. By the time the check bounces, the funds are already gone.
Don't let scammers steal your money or your personal
information if you make the decision to be generous and charitable. Here are
some tips to protect yourself and ensure that your money gets to the causes you
wish to support.
Be smart about responding to email solicitations
- If you donated to an organization online, signed an online
petition, or responded to a survey -- perhaps through social media -- you also
provided your email information. Doing so is implied, if not specific,
permission for that organization to contact you via email again until or unless
you tell them not to by opting out.
- Email is a normal channel now for nonprofits to ask you for
continued support. They can reach you with very timely messages and connect you
with relevant information on their website.
If you have any doubt it’s always best to go directly to their website -
rather than clicking the links in the email.
- Be a skeptic of email solicitations from charities you have
not heard of before or haven’t in some way supported or contacted. Despite how
official an email may seem it could be a scam.
Do not follow any links within the message. If you are interested in the
organization and want to learn more about them, the best starting point is to
check to see if they are rated and then to contact the organization directly to
learn more.
Beware of requests to send money overseas
- As a rule, any organization requesting that you send funds
to a foreign bank is a scam.
Delete unsolicited emails with attachments
- It’s not typical for legitimate emails from organizations to
include attachments. If there is something they want you to see, they are going
to direct you to information or photos on their website. Do not open any
attachments to these emails even if they claim to contain pictures of a recent
tragedy. These attachments are probably viruses.
Be inspired by social media, but still do your homework
- Social media delivers heart-wrenching images and information
about charitable causes. Many of them include pleas to donate. You should take
the time to investigate the groups behind such pleas for help to ensure that it
comes from a legitimate nonprofit and then go to that charity's website to make
your donation.
Think Before You Text
- So long as you do your homework – meaning that you’ve vetted
the charity and made sure that you are using the proper texting instructions -
then texting can be a great way to give. Remember there may be additional costs
to you to make such a gift. And it can take as much as 90 days for the charity
to receive the funds.
Be skeptical of people that contact you online claiming to be
a victim
- Anyone alleging to be in this position is most likely part
of a scam. People affected by a disaster or afflicted by a disease are in no
position to contact you directly for assistance.
Avoid Telemarketers
- Be wary of fundraisers who pressure you to make a contribution
over the phone. Never divulge your credit card information to someone
soliciting you via the phone. Instead, ask the fundraiser to send you written
information about the charity they represent and do some research on your own.
Once you feel comfortable with the charity, send the organization a check
directly in the mail, or give through their website, thus ensuring 100% of your
gift goes to the charity and not the for-profit fundraiser.
Seek out the charity’s authorized website
- The results of a general web search may include a fraudulent
site designed to look like a legitimate charity’s website. Criminals are likely to set up bogus sites to
steal the identity and money of generous and unsuspecting individuals. So, how can you determine if a site is valid? Start by examining the web address. Most
non-profit web addresses end with .org and not .com. Avoid web addresses that
end in a series of numbers. Also, bogus sites often ask for detailed personal
information such as your social security, date of birth, or your bank account
and pin information. Be extremely skeptical of these sites as providing this
information makes it easy for them to steal your identity.
Your best option is to start your web search on a charity
rating web site to find the charity organization’s authorized website. Also, read the news by checking the charity's recent media coverage through Google news or another similar service. You should also check if the charity is trustworthy by contacting the Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar.
- Check for evidence of the charity's commitment to
accountability and transparency. The best charities are transparent and accountable
to the public. You should be able to see evidence of this in the information
they provide on their web site. Can you readily find information about the
charity's staff and Board of Directors? Did the charity publish its financial
information such as its most recently filed Form 990 or audit?
Find out if a charity has a donor privacy
policy.
- If you can’t find the privacy
policy on the organization’s website, ask to see it in writing. You should have the option to request that
your name and address not be shared with other organizations, if you wish. Some
charities require that you “opt-out” of having your personal information
shared. If that’s the case with the charity you are planning to support, then
be sure to take the time to let them know that you want them to keep your
contact information confidential.
Give to an established charity
- Don't let an unscrupulous charity take advantage of your
goodwill. Find a charity with a proven track record of success with dealing
with the type of disaster and in the region in which the disaster occurred.
Avoid fly-by-night charities created specifically to deal with the new crisis.
Even well-meaning new organizations will not have the infrastructure and
knowledge of the region to efficiently maximize your gift. If you do feel
compelled to give to a new charity, be sure to get proof that the group is in
fact a registered public charity with 501 (c) (3) status.
Be aware of fundraisers calling on behalf of police and firefighters - Simply having the words “police” or “firefighter” in an organization’s name doesn’t mean police or firefighters are members of the group.
- Just because an organization claims it has local ties or works with local police or firefighters doesn’t mean contributions will be used locally or for public safety. The organization should be able to provide you with written information describing the programs your donation will support, and their fund-raising costs before you donate.
- Most solicitations for police and fire service organizations are made by paid professional fund-raisers.
- Donations to some police or firefighter groups may not be tax deductible. Many kinds of organizations are tax exempt, including fraternal organizations, labor unions, and trade associations, but donations to them may not be tax deductible.
- Ask fund-raisers for identification. Many states require paid fund-raisers to identify themselves as such and to name the organization for which they’re soliciting.
- Ask how your contribution will be used. Ask what percentage of your contribution will go to the fire or police organization, department, or program. Also ask if your contribution will be used locally. Get written information.
- Call the organization or your local police or fire department to verify a fund-raiser’s claim to be collecting on behalf of the organization or department. If the claim cannot be verified, report the solicitation to your local law enforcement officials.
- Be wary if a fund-raiser suggests you’ll receive special treatment for donating. For example, no legitimate fund-raiser would guarantee that you won’t be stopped for speeding if you have a police organization’s decal in your car window. Don’t feel intimidated about declining to give. A caller who uses intimidation tactics is likely to be a scam artist. Report the call to your local law enforcement officials.
7 Signs of a Charity Scam
Avoid any charity or fundraiser that:
- Refuses to provide detailed information about its identity,
mission, costs, and how the donation will be used.
- Won't provide proof that a contribution is tax deductible.
- Uses a name that closely resembles that of a better-known,
reputable organization.
- Thanks you for a pledge you don’t remember making.
- Uses high-pressure tactics like trying to get you to donate
immediately, without giving you time to think about it and do your research.
- Asks for donations in cash or asks you to wire money.
- Offers to send a courier or overnight delivery service to
collect the donation immediately.
- Guarantees sweepstakes winnings in exchange for a
contribution. By law, you never have to give a donation to be eligible to win a
sweepstakes.
15 Charity Checklist Precautions
Take the following precautions to make sure your donation
benefits the people and organizations you want to help.
- Ask for detailed information about the charity, including
name, address, and telephone number.
- Get the exact name of the organization and do some research.
Searching the name of the organization online — especially with the word
“complaint(s)” or “scam”— is one way to learn about its reputation.
- Call the charity. Find out if the organization is aware of
the solicitation and has authorized the use of its name. The organization’s
development staff should be able to help you.
- Find out if the charity or fundraiser must be registered in
your state by contacting the National Association of State Charity Officials.
- Check if the charity is trustworthy by contacting the Better
Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch,
or GuideStar.
- Ask if the caller is a paid fundraiser. If so, ask:
The name of the charity they represent
The percentage of your donation that will go to the charity
How much will go to the actual cause to which you’re donating
How much will go to the fundraiser
- Keep a record of your donations.
- Make an annual donation plan. That way, you can decide which
causes to support and which reputable charities should receive your donations.
- Visit this Internal Revenue Service (IRS) webpage to find
out which organizations are eligible to receive tax deductible contributions.
- Know the difference between “tax exempt” and “tax
deductible.” Tax exempt means the organization doesn’t have to pay taxes. Tax
deductible means you can deduct your contribution on your federal income tax
return.
- Never send cash donations. For security and tax purposes,
it’s best to pay by check — made payable to the charity — or by credit card.
- Never wire money to someone claiming to be a charity.
Scammers often request donations to be wired because wiring money is like
sending cash: once you send it, you can’t get it back.
- Do not provide your credit or check card number, bank
account number or any personal information until you’ve thoroughly researched
the charity.
- Be wary of charities that spring up too suddenly in response
to current events and natural disasters. Even if they are legitimate, they
probably don’t have the infrastructure to get the donations to the affected
area or people.
- If a donation request comes from a group claiming to help
your local community (for example, local police or firefighters), ask the local
agency if they have heard of the group and are getting financial support.