Keep your finances safe and secure
Northrop Grumman Federal Credit Union is always mindful of keeping you informed about threats to your financial privacy. Here’s how you can protect yourself from and remedy costly intrusions.
Member security is a top priority. Our security team has detected external smishing attempts and we want to ensure your utmost protection. These attempts have not been successful, but we’d like to help you be vigilant.
Scam artists have been sending fraudulent text messages, commonly known as "smishing" messages. These messages are designed to deceive recipients into revealing sensitive information or performing actions that compromise their security.
We want to emphasize that individual NGFCU employees will never initiate personal contact with our members through phone text messages. We prioritize the security and privacy of our members, and we strictly adhere to established communication channels for important matters.
To ensure your safety, we suggest that you take the following precautions:
- Do not respond to or engage with suspicious text messages that request personal or financial information. Delete such messages immediately.
- Avoid clicking on links or downloading attachments from unknown or untrusted sources.
- Be cautious of messages that claim to be urgent or require immediate action, particularly if they come from unrecognized numbers or sources.
- If you receive a suspicious message claiming to be from an NGFCU employee, please report it to our dedicated Member Services team at email@example.com or call 800.633.2848.
Remember, it is crucial to remain vigilant and exercise caution when interacting with any form of communication. We take your security seriously, and we are continuously enhancing our security measures to protect you from external threats.
If you have any concerns or questions regarding this matter, please do not hesitate to reach out to our Member Services team at firstname.lastname@example.org or call 800.633.2848.
Voice impersonation scams are on the rise and can be quite frightening. Artificial intelligence (AI) technology is making it easier and cheaper for scammers to mimic voices convincing people that their loved ones are in distress. According to the Federal Trade Commission (FTC), impostor scams were the second most popular type of scam in 2022, accounting for more the 36,000 reports.
Most of the imposter scams work the same way. The scammer impersonates someone trustworthy like a child, lover or good friend. The scammer then convinces the victim to send money because they are in distress. Regardless of the story (I'm in jail, I was robbed, etc), the scammer will ask for money... immediately.
Below is an example of a voice scam that actually happened in Regina, Saskatchewan.
The man calling Ruth Card sounded just like her grandson Brandon. So when he said he was in jail, with no wallet or cellphone, and needed cash for bail, Card scrambled to do whatever she could to help.
It was definitely this feeling of … fear,” she said. “That we’ve got to help him right now.”
Card, 73, and her husband, Greg Grace, 75, dashed to their bank in Regina, Saskatchewan, and withdrew 3,000 Canadian dollars ($2,207 in U.S. currency), the daily maximum. They hurried to a second branch for more money. But a bank manager pulled them into his office: Another patron had gotten a similar call and learned the eerily accurate voice had been faked, Card recalled the banker saying. The man on the phone probably wasn’t their grandson.
That’s when they realized they’d been duped.
We were sucked in,” Card said in an interview with The Washington Post. “We were convinced that we were talking to Brandon.”
If you receive a call like this, here are four tips to avoid becoming the victim of the scam:
- Ask the caller a question that both you and the caller would know to validate the caller’s identity. Something like "what month is my birthday" or "what school do you go to"? If there is no response or the wrong response, the caller is an impersonator and simply hang up.
- If you receive a call, put the call on hold (if you have that feature) and try calling the person directly. Remember that the caller ID can also be spoofed, so don't assume it is a legitimate if the caller ID matches the person's voice.
- Tell friends and family about this scam, especially older family members that may become victims.
- Have a secret code word or number that you share with family. If someone is really in distress, ask for the code word or number to verify the legitimacy of the caller.
How to spot, avoid, and report weather-related scams
Source: Colleen Tressler FTC. consumer.ftc.gov
From the relentless series of powerful storms that have battered California to the dozens of tornadoes that swept across six states, including Alabama, Georgia, and Kentucky, 2023 is off to a devastating start.
Whether you’re getting back on your feet or looking for ways to help people in hard-hit areas, learn how scammers operate — and how to avoid them.
Here are a few ways to spot the scammers who might try to take your money or personal information after a weather emergency:
- Spot imposter scams. Scammers might pretend to be safety inspectors, government officials trying to help you, or utility workers who say immediate work is required. Don’t give them money, and ask for identification to verify who you are dealing with — before sharing personal information like your Social Security or account numbers.
- Spot FEMA impersonators charging application fees. If someone wants money to help you qualify for FEMA funds, it’s a scam. Download the FEMA Mobile App to get alerts and information. Visit FEMA.gov for more information.
- Spot home improvement and debris removal scams. Unlicensed contractors and scammers may appear in recovery zones with promises of quick repairs or clean-up services. Walk away if they demand cash payments up front, or refuse to give you copies of their license, insurance, and a contract in writing.
- Spot rental listing scams. Scammers know people need a place to live while they rebuild. They’ll advertise rentals that don’t exist to get your money and run. The scammers are the ones who tell you to wire money, or who ask for security deposits or rent before you’ve met or signed a lease.
- Spot charity scams. Scammers will often try to profit from the misfortune of others, sometimes using familiar-sounding names or logos. Check Donating Wisely and Avoiding Charity Scams before opening up your wallet.
Learn more at ftc.gov/WeatherEmergencies and report weather-related scams to the FTC at ReportFraud.ftc.gov.
Tax season is here and it's time to be aware of tax related scams
IRS Imposter Scams
This is one of the most common scams. You might receive a phone call, e-mail, or text message from a person claiming to be from the IRS. This is an attempt to get your personal information or gain access to your return. According to the IRS, they will never:
- Call to demand immediate payment using a specific payment method such as a prepaid debit card, gift card, or wire transfer. Generally, the IRS will first mail a bill to any taxpayer who owes taxes.
- Threaten to immediately bring in local police or other law enforcement groups to have the taxpayer arrested for not paying.
- Demand that taxes be paid without giving taxpayers the opportunity to question or appeal the amount owed.
- Call unexpectedly about a tax refund.
Tax Preparation Scams
These scams can include fake tax preparation services, websites, and software. The IRS reported that 92% of tax returns were filed online last year so staying vigilant about cybersecurity is more important than ever. While most of the largest tax return software companies have sophisticated security protocols, be sure to protect yourself by following these steps:
- Use secure passwords – The best practice is to create a unique password for each website, especially your financial service websites. Remember to password protect your wireless network at home too.
- Keep software updated – many software updates include security enhancements. Be sure to update your software, including your main operating system.
- Use reputable tax preparation services – don’t be afraid to ask your tax preparer about their security protocols. If they cannot easily provide them, find another service.
- Don’t take the bait – never respond to an unsolicited e-mail, phone call, or text requesting information about your taxes.
Cryptocurrency, or crypto as it is referred to, has been in headlines lately for all the wrong reasons. If you are curious about cryptocurrency, here are a few things to know:
- Crypto is a form of digital currency that only exists electronically
- Crypto is purchased through an exchange, an app, or website
- People use or buy crypto for many reasons including: using it as an investment hoping the value goes up, quick payments, avoiding traditional bank transaction fees, or because the transaction can offer some anonymity
- The value of crypto changes constantly
Crypto Scams to Watch For
Many of these scams are not new. Crypto is just the latest currency by which scammers are trying to get your money. Here are a few as noted by the Consumer Trade Commission:
- Unsolicited Investment Scam - watch for any offer that promises "zero risk" or "huge return" that you did not ask for
- Impersonation Scams - these include requests for crypto payment to fix supposed fraud on your account; these requests appear to come from reputable companies that are being impersonated such as Amazon, Microsoft, or large national banks
- Job Scams - these include job offers to work in the crypto industry; these "jobs" will only start when you have paid a fee in crypto; of course these "jobs" never materialize
- Blackmail Scams - these can be delivered as a letter sent via the US mail or an e-mail. The scammer will claim to have embarrassing information (photos or videos) about you and threaten to make it public if you don't pay their "fee" in crypto
If you believe you have been the victim of any scam, reach out to the appropriate authorities and notify NGFCU immediately if your accounts are possibly affected.
Source: Federal Trade Commission, consumer.ftc.gov
You may get a call, a text message, or a flyer in the mail. Or maybe you'll see an online ad promising free or low-cost vacations. Scammers and dishonest companies are often behind these offers. You may end up paying hidden fees — or worse: after you pay, you might find out it’s all a scam.
Common Travel Scams
You’ve probably seen ads online for “free” vacations. Or you may have gotten emails, calls, or text messages saying you’ve won a vacation, even though you never entered a contest. If you respond to these offers, you’ll quickly learn that you have to pay some fees and taxes first — so your “free” vacation isn’t really free. A legitimate company won’t ask you to pay for a free prize.
Robocalls about vacation deals
You might get robocalls offering you vacation deals at a discounted price. Robocalls from companies trying to sell you something are illegal unless the companies got written permission, directly from you, to call you that way. If someone is already breaking the law by robocalling you without permission, there’s a good chance it’s a scam. At the very least, it’s a company you don’t want to do business with.
International travel document scams
You might see sites that claim to be able to help you get an international travel visa, passport, or other documents. These sites are just copycats of the U.S. Department of State website. But these sites charge you high fees, including fees for services that are free on the U.S. Department of State's website.
International driving permit scams
An international driving permit (IDP) translates your government-issued driver’s license into 10 languages. Scammers create websites to sell fake IDPs, or try to sell them to you in person or some other way. If you buy a fake IDP, you’ll be paying for a worthless document. But, even worse, you also could face legal problems or travel delays if you’re detained for using it to drive in a foreign country. Only the U.S. Department of State, the American Automobile Association (AAA), and the American Automobile Touring Alliance (AATA) are authorized to issue IDPs.
Vacation home scams
These days, it’s easy to connect directly with property owners who advertise their vacation homes online. But scammers are also trying to get your rental booking. For example, they hijack real rental listings and advertise them as their own, so when you show up for your vacation, you find out that other people are also booked for the same property. You have no place to stay, and your money is gone. Other scammers don’t bother with real rentals — they make up listings for places that aren’t really for rent or don’t exist.
Charter flight scams
You may get a flyer in the mail, see an ad, or hear from someone in your community about an offer to travel by private plane to some place you’d like to go. The offer may even include lodging and sightseeing tours. You think you’re signing up for a charter flight and vacation package, but after you pay, you find out it’s all a scam. The U.S. Department of Transportation’s (DOT) Special Authorities Division maintains a list of approved public charter flights. If the charter filing is not approved by DOT before the package is sold, you’re probably dealing with a dishonest charter operator.
Signs of a Scam
- Scammers say it's a “free” vacation that you have to pay for. They often try to get your attention by saying you won something, but then making you pay to get it. If you have to pay, it’s not really free — and all those fees and taxes can add up to hundreds of dollars.
- Scammers don't give specific details about the travel offer. The offer says you’ll stay at a “five-star” resort or go on a “luxury” cruise ship. But if the organizer can’t or won’t give you more specific details, like the address of the hotel or the cruise company's name, walk away.
- Scammers say the only way to pay for your vacation rental is by wire transfer, gift card, or cryptocurrency. This is how they ask you to pay because once they’ve collected the money, it’s almost impossible to get it back. That’s a scam, every time.
- Scammers pressure you to make a quick decision about a vacation package or rental. If someone says you have to decide whether to buy a travel package or rent a vacation property right away, don’t do it. Scammers want to rush you. So move on and find another option.
- Scammers advertise premium vacation properties for super cheap prices. Is the rent a lot less than comparable rentals? Below-market rent can be a sign of a scam.
3 Ways to Avoid Travel Scams
- Don’t sign or pay until you know the terms of the deal. Get a copy of the cancellation and refund policies before you pay. If you can’t get those details, walk away. Say “no thanks” to anyone who tries to rush you without giving you time to consider the offer.
- Do some research. Look up travel companies, hotels, rentals, and agents with the words “scam,” “review,” or “complaint.” See what others say about them before you commit. Also, check that the address of the property really exists. If the property is located in a resort, call the front desk and confirm their location and other details on the contract.
- Don’t pay with wire transfers, gift cards, or cryptocurrency. Dishonest travel package promoters might tell you to pay in one of these ways, but that’s a sure sign of a scam. If you pay with wire transfers, gifts cards, or cryptocurrency and there’s a problem with what you paid for, you’ll lose your money, and there’s likely no way to track it or get it back.
How to Shop for Travel
- Get recommendations from trusted sources. Talk to family and friends or other trusted sources about good travel agencies, vacation rentals, hotels, and travel packages.
- Check out comparison websites and apps. Travel apps can help you search for airfares and hotel rates, and some even give you fare alerts and real-time deals. But make sure you know whether you’re buying from the app company or the actual airline or resort. It can affect things like whether you can get a refund or travel points, and the price for services like changing or canceling a flight. Also, make sure you know whether you’re buying a ticket or just making a reservation.
- Ask about mandatory hotel “resort fees” and taxes. You can’t compare rates for different hotels unless you know about all the fees. If you’re not sure whether a hotel’s website is showing you the total price, call the hotel and ask about a “resort fee” or any other mandatory charge. Also ask about taxes, which may be significant in many places.
- If you’re buying travel insurance, be sure the agency is licensed. Find out whether an agency is licensed at the website of the US Travel Insurance Association. Make a copy of your insurance card to take with you when you go on the trip.
- Check that charter flights are listed on the approved public charter flights of the U.S. Department of Transportation before you pay. Also, check out the charter’s operator with local travel agents to see if they know if the operator is legitimate, or contact the American Society of Travel Advisors. The U.S. Department of Transportation’s website has more tips on what to know about charter flights.
Report Travel Scams
If you think you may have been targeted by a travel scam, report it to
- The FTC at ReportFraud.ftc.gov
- Your state attorney general
Source: Attorney General, Josh Stein ncdoj.gov
Don’t Get Taken During the Season of Giving
For most of us, the holidays are full of giving, getting and goodwill. But some bad actors use the holidays to take advantage of people’s generous spirits. They frequently target members of our communities who are older and more vulnerable to scammers and con artists.
To help ensure consumers and older adults don’t get taken during the season of giving, organizations across North Carolina are joining together to raise awareness of the common scams and frauds that can occur during the holidays, and share information to help protect North Carolinians from getting scammed. Together, we can help each other enjoy the holidays without getting taken by scams and frauds.
To access holiday scams resources for Spanish-speaking communities, please click here.
Holiday Mail Scams
As we buy and mail presents over the holidays, the high volume of mail and packages provides many avenues for scammers. Our deliveries can be easy targets for thieves and con artists.
- When you’re expecting a lot of packages over the holidays, shippers will often provide us with updates on the status of our orders. Knowing this, scammers will send phishing emails pretending to be from companies like FedEx and UPS to lure us to phony webpages and get us to share personal information. Look closely at delivery notifications and email updates before you click on links or input information. And remember, UPS and FedEx won’t ask for personal information via email.
- All of those packages stacking up outside your door can be tempting for thieves. Porch poachers might steal packages from your doorstep. Consider tracking your package so you’ll know when they’ve arrived. You can also set up a different delivery address with a neighbor who is home during the day or your workplace to ensure packages are delivered safely.
- If you’re traveling for the holidays, consider having your mail held for you at the post office, so you don’t have to worry about theft and can collect all deliveries and letters at once when you return.
Holiday Shopping Scams
It’s no secret that shopping ramps up during the holidays, but scams do too. Be careful about how and where you share information, and beware of fraudulent retailers and organizations.
- Protect your personal info. It’s easy to hit the “Buy” button from anywhere when you’re on your phone or on your laptop. But be sure you’re not sharing personal or credit card information over public Wi-Fi. Wait until you’re on a secure network to make a purchase.
- Gift cards are a convenient gift for the holidays, but they also open the door to several scams. To ensure your gift card is protected, avoid the rack and ask for one directly from the counter.
- There may appear to be deals galore over the holidays, and many of them are on social media – but not all of them are legitimate. Carefully read reviews, look for security credentials on websites, and research unfamiliar retailers before you take advantage of a discount.
- Always pay by credit card and keep receipts so you can try to get refunds if there’s an issue.
- Keep an eye out for common scams in your area with the BBB Scam Tracker.
- For more frauds targeting senior citizens, visit the AARP Fraud Watch Network.
- Seniors or older adults may also be scammed by being told they can get medical equipment with very little paperwork, and that Medicare will cover the cost.
Charity and Investment Scams
As you make charitable giving and investment decisions over the holidays, there are a host of resources to help you avoid the many scammers and less-than-reputable charities and organizations asking for your money.
- Before you give, review the annual reports compiled by the NC Department of the Secretary of State Charitable Solicitation Licensing Division. Verify the organizations using sources like the NC Department of the Secretary of State, Better Business Bureau’s (BBB) Wise Giving Alliance, Charity Navigator, Charity Watch, or GuideStar.
- Consider giving to charities you are familiar with personally, and whose work and benefits you can see in your local communities.
- Often, phony charities will pick names that sound like familiar, reputable charities. Make sure you know the exact name of the charity you’re donating to, and look them up beforehand.
- Go through the Smart Donor Checklist to ask questions that will help you determine whether or not to give to a specific charity.
- When donating to veterans’ organizations, search the VA organization or representative first to make sure they’re legitimate.
- Before making year-end investment decisions, make sure to do your research. Check multiple databases about investment opportunities, and call the Secretary of State’s Investor Hotline at 919-814-5400 or 800-688-4507. You can also browse their educational materials as you look to make investment decisions.
- Regardless of whether you’re a teacher, a senior or a member of the military, there are probably specialty investment scams directed toward you. Learn what to look for, and what to avoid, here.
- Review this list of investment frauds directed at seniors with the seniors in your family. Be sure they know to be on the lookout for scammers with these false claims.
- Additional Investment Resources:
Scammers take advantage of trust between family members and loved ones, and the threat of law enforcement. When anyone is demanding money from you, be sure to ask questions to determine whether the situation is real or a scam.
- Be on the lookout for scams that target military personnel and their loved ones. The military grandparents scam specifically targets elderly relatives with military members.
- Grandparent scammers pretend to be family members or loved ones, desperate for money after an accident or serious situation. These con artists will prey on your emotions – be sure to check the story out first, and reach out to other loved ones to help confirm the claim. Don’t be taken by their demands for money or assistance.
- Kidnapping scams are also on the rise – scammers will contact you and claim they have kidnapped your loved ones or a member of your family, demanding a ransom to release them.
- Jury duty scammers work year-round, claiming to be from the sheriff’s office or local law enforcement, insisting you’ve missed jury duty or a court date and demanding you pay a fine. Remember that real law enforcement officials will never call you to threaten you with arrest or demand money. Hang up immediately and report the calls to your local police department.
If you think you or someone you know might have been scammed or contacted by a scammer, report it to the Attorney General’s Consumer Protection Division by calling 1-877-5-NO-SCAM or filing a complaint online at www.ncdoj.gov.
If you’re getting fake texts from scammers posing as Amazon, you’re not alone—here’s what you can do
Source: CNBC, written by Tom Huddleston Jr.
If it feels like more scammers and spammers are flooding your various inboxes, that’s because they probably are.
Fake text messages and e-mails carrying phishing attempts by virtual scammers have been on the rise since the start of the Covid-19 pandemic. And, one of the more prevalent methods scammers have been using recently is fake messages purporting to be from an Amazon representative, who might claim to be checking in about suspicious activity on your account or even a delayed package.
Typically, these phishing or “smishing” — aka SMS phishing — attacks are aimed at tricking you into believing you are communicating with a legitimate representative of the e-commerce giant. If you’re not careful, you might offer valuable personal information from your credit card information to login credentials for your online accounts, or click on malware-ridden links that infect your devices with viruses.
The Federal Trade Commission reports that U.S. consumers collectively lost roughly $5.8 billion from fraud in 2021, up 70% over the previous year. About a third of that came from imposter scams.
So, what can you do to make sure you’re not taken in by one of these increasingly prevalent spammer scams?
How to screen for scams
Don’t click any links, or share any personal information, unless you’re absolutely sure you’re actually speaking with an actual representative from Amazon, or any other legitimate company or organization.
The FTC notes that there are several tell-tale signs often associated with scammers, who can “use a variety of ever-changing stories to try to rope you in.” These include:
- Promising you’ve won a free prize
- Offering some form of low-interest credit
- Alerting you to allegedly suspicious account activity
- Saying there’s a problem with your payment information
- Sending you a fake invoice
Amazon itself offers an online guide to help its customers identify suspicious messages posing as official Amazon communications. The company says that red flags include order confirmations for items you didn’t order and messages with grammatical errors or prompts to install software.
The company says that if you’re suspicious about a message requesting updated payment information, you should go to your online Amazon account’s “Your Orders” page. “If you aren’t prompted to update your payment method on that screen, the message isn’t from Amazon,” the company says.
Many scammers rely on “spoofing,” a practice that tricks your phone’s Caller ID into thinking you’re getting a text or call from someone you trust. In some cases, they even mimic your own number, making it seem like you’re calling or texting yourself.
So to be extra cautious, the Federal Communications Commission (FCC) recommends that you “never share your personal or financial information via email, text messages, or over the phone.”
How to block and report spammers
If you have any doubt over a particular text or e-mail’s legitimacy, the FTC advises you to contact the company or institution’s “verifiable customer service line.” Visit the company’s website to find a valid contact number or e-mail address, rather than responding to the message you’ve received.
The simplest way to stop receiving suspicious messages is to block the phone numbers or email addresses that are messaging you. You can also manage your phone’s filters to weed out calls or texts from unknown numbers.
Unfortunately, some scammers use different numbers or addresses for each message they send, leaving you playing a game of virtual Whack-a-Mole, constantly blocking suspicious numbers and e-mails as the scammers cycle through new ones.
At that point, consider reporting the spam and phishing attempts to your wireless carrier or e-mail service, along with government agencies — including the FTC’s online fraud complaint form and the Federal Bureau of Investigation’s Internet Crime Complaint Center.
If the suspected scammer is claiming to be representing a specific company like Amazon or a government entity, you can also try reporting the attempt to the actual organization. Amazon suggests visiting the company’s “Report Something Suspicious” page on its customer service section, where you can report any texts, e-mails or phone calls you’ve received that you suspect didn’t actually come from Amazon.
New UPS Delivery Scam Fools Victim Through Suspicious Email--Here's How to Identify and Avoid it
This article is owned by Tech Times - Written by Joseph Henry
A new UPS delivery scam involves informing the receiver that a parcel will now be delivered to his/her address. Through an email, the hackers notified the victim about their online order. The latest attack is reportedly created to be a trap since some cybersecurity experts can still be easily deceived by the malicious message.
The scam will tell the user that he/she has a package to receive, but the company is dealing with some problems during the delivery. Upon receiving the message, the hacker will now send a message to the person telling them that he/she needs to schedule an appointment for the date and time of delivery. The sender will also request the recipient to include the tracking number of the goods.
Although this type of attack is not new anymore, the scammers have intensified their plans to make it much harder for a person to decipher that it is a scam. Later, the victim will easily suspect that the request is real.
Do Not Click the Email With the Official UPS Web Address
Daniel Gallagher, a security expert, has tweeted that he saw an old phishing scam that already appeared before. The scam includes a malicious email that seems to be legit because of the UPS web address. Many people fall into this trap since some of them do not check the link.
Before accessing an unknown link, it's important to know if it uses a real domain for the web address. However, the recent scam was reportedly so tricky that even the experts could not identify the real from the fake one.
After clicking the link, the user will be directed to a web page that represents a real download page of UPS. Of course, the victim will think that this is a legit website and this is where the attack begins.
Furthermore, there will be a notification that will request the user to download a document. The file is a requirement for the easy delivery of the package.
Unfortunately, the content appears to be sketchy. It is a document disguised as malware made to trick the users. When it is now installed in the computer, it will now destroy the system of the device.
Besides Gallagher, some experts said that they have a hard time solving the puzzle behind the UPS delivery scam.
How to Protect Yourself From Package Delivery Scams
Since the pandemic, the cases of scams continue to increase. The hackers are taking the opportunity to deceive people relying on digital devices.
To protect yourself from package delivery scams, the Federal Communications Commission (FCC) said that you should not click any message from an anonymous source. The best thing that you can do is to call the legitimate number of the delivery company.
In addition, the US Postal Service also issued a reminder for the users about unsolicited text messages involving an upcoming USPS delivery. There are also additional warnings that will tell about the consequences of clicking the link.
It's also important to know that the delivery firms do not ask the user about their sensitive information through suspicious emails and messages.
Retailers aren’t the only ones hoping to capitalize on the upcoming long weekend shopping sprees, scammers are waiting to take advantage of consumers enjoying Labor Day discounts. While some shoppers will hit the mall, most will access the internet in search of sales or to coordinate a quick in-store item pickup. According to the Federal Trade Commission, in 2020 consumers reported losing over $3 billion to fraud, with almost $250 million lost to online shopping scams.
Whether you’re finishing back to school shopping or celebrating the unofficial end of summer, it’s important to avoid getting swept up in the excitement of Labor Day deals. If something sounds too good to be true, it probably is. Some promotions may give you an inflated number as the original price with a large Labor Day discount, ultimately adding up to the original price. To keep from over-spending, set a budget and stick to it when making decisions about what to buy.
Here are a few tips from the Office of Consumer Affairs and Business Regulation to help protect your identity, and your wallet as you click through this weekend’s bargains:
- Use a credit card, or other reputable payment option. Paying for purchases with a credit card allows you to dispute charges if a problem occurs. The best practice is to use a third-party payment application such as Apple Pay or PayPal. Be cautious, avoid storing personal information online with vendors, and whenever possible check out as a guest.
- Check out the merchant’s history and read customer reviews. Customer ratings can tell you about both the product and business. Reviews often prompt users to rate shipping, item description accuracy, quality, and price—all very important aspects of online shopping. But beware of fraudulent reviews left by scammers, businesses, or disgruntled ex-employees. Websites like Fakespot and ReviewMeta can help you filter reliable reviews.
- Confirm the website that you are shopping with is secure. The quickest way to check for a secure site is to look for “s” at the end of “https” in the URL. This means there is encryption on the page to better protect your data. For example, when visiting online retailers, such as Amazon, the URL at the top of the page reads “https://www.amazon.com.”
Source: Forbes Advisor, written by Chauncey Crail
Card skimming theft can affect anyone who uses their credit or debit cards at ATMs, gas stations, restaurants or retail stores. A skimmer is a device installed on card readers that collects card numbers. Thieves will later recover and use this information to make fraudulent purchases. Skimmers can usually be spotted by doing quick visual or physical inspections before swiping or inserting a card.
Skimmers are most often found at ATMs and gas stations, but it’s possible for retail stores or restaurants to be involved in a skimming scam as well. Sometimes a tiny camera is planted to record cardholders entering a PIN number into an ATM. PIN numbers can also be stolen via fake keypads placed over a real ATM keypad. Skimmers and related technology can be hard to spot because thieves will attempt to make their devices blend in or match the style of the card readers.
How to Check for a Skimmer
Although skimmers can be hard to spot, it’s possible to identify a skimming device by doing a visual and physical inspection.
Before using an ATM or gas pump, check for alignment issues between the card reader and the panel underneath it. Skimmers are often placed on top of the actual card reader making it stick out at an odd angle or cover arrows in a panel. Compare the card reader to others at a neighboring ATM or gas pump and look out for any differences.
Gas pumps should have a security tape or sticker over the cabinet panel. If the tape looks ripped or broken, avoid using the card reader because a thief may have tampered with it. Try looking inside the card reader to see if anything is already inserted—if there is, it may be a thin plastic circuit board that can steal card information.
A physical inspection of a card reader and keypad can often reveal fraudulent devices. Feel around the reader and try to wiggle it to see if it can easily come out of place. The FTC has a photo example of a card skimming device on their website.
Authentic card readers are robustly manufactured, meaning if any part of the card reader can easily move around, then it’s probably been installed illegally by a thief. If the buttons on an ATM’s keypad are too hard to push, don’t use that ATM and try another one.
It’s much more difficult for a thief to install a card skimmer on a point-of-sale (POS) system at a retail store, but it can happen. Make sure the card reader looks as it should. If a restaurant is involved in a scam, there may be no way to know because cards are often handed to the server who can then swipe the card through a skimmer before giving it back to the customer.
How to Avoid Card Skimmers
Stay vigilant when using a credit card to pay for gas or when withdrawing cash at an ATM. If any part of a gas pump’s card reader looks suspicious, pay for gas inside with the cashier and let them know there may be a skimmer installed at the pump. Try to only use official bank ATMs instead of nonbank ATMs that are often found inside convenience stores or bars. Cover fingers with the other hand while entering a pin to block potential cameras. Don’t ever give a card to a credit card cleaner who claims he or she can clean the magnetic stripe or chip on a card to make it easier to read. These are often scams designed to steal credit card information.
What Happens If a Credit Card Is Skimmed?
Thieves will use stolen card information in a few different ways: a thief can make their own fake credit cards, make fraudulent purchases online or sell the stolen information on the internet. Luckily fraudulent charges on a credit card are easier to dispute than charges made using debit card information. Many credit cards have a zero liability policy, which means in case of fraud, the cardholder has no responsibility to pay back those funds to the issuer. A credit in the fraudulent amount will often be deposited back into the cardholder’s account and reflected on monthly statements.
When making purchases at a gas station, opt to use a credit card instead of a debit card to take advantage of this extra protection. Another option is to pay for gas inside with the cashier, where the POS system is less likely to have been tampered with.
Regularly monitor credit card activity by actively checking bank statements or (even better) by accessing the account online. Report suspicious activity as soon as possible by calling the number on the back of the card. Some credit cards have proactive alerts that will notify the cardholder if a potentially fraudulent charge is made. Often the next step is to receive a new credit card with a new card number by mail.
Card skimming is a theft risk to remain wary of while shopping, using ATMs or fueling up. It is possible to spot a card skimmer by conducting a quick visual and physical inspection of a card reader before inserting a credit card. Look for odd card reader attributes or broken security tapes. If credit card information is stolen and used to make fraudulent charges, credit cards’ zero fraud liability policy will protect the cardholder from having to take the financial hit. Report suspicious activity as soon as it’s discovered. Usually, a refunded credit will be applied to a cardholder’s account and he or she will receive a brand new credit card by mail soon after.
Offers of free money from government grants are scams. Someone might offer you a grant to pay for education, home repairs, home business expenses, or unpaid bills. But they’re all scams. Here’s how to avoid a government grant scam, and how to report it.
How Government Grant Scammers Try to Trick You
Scammers reach you in lots of ways. You might see ads online for (fake) government grants. Scammers might call you, but use a fake caller ID so it looks like they’re calling from a federal or state government agency. Some send texts or emails, saying you may qualify for free money from the government.
Scammers make big promises. They might say you can use this so-called free money or grant to pay for education, home repairs, home business expenses, household bills, or other personal needs.
Scammers try to look official. Besides faking their phone number, they’ll pretend they’re with a real government agency like the Social Security Administration. Or, they’ll make up an official-sounding name of a government agency, like the Federal Grants Administration, which doesn’t exist.
Scammers ask you for information or money. Government grant scammers might start by asking for personal information, like your Social Security number, to see if you “qualify” for the grant (you will). Then they’ll ask for your bank account information — maybe to deposit “grant money” into your account or to pay for up-front fees. But sometimes, scammers will ask you to pay those fees with a gift card, cash reload card, money transfer, or with cryptocurrency. And that’s always a scam.
Scammers try to be convincing. They might even promise a refund if you aren’t satisfied. But that’s a lie. Once you give your bank account information, or pay fees, your money will disappear. And, you’ll never see the grant they promise.
What to Know About Government Grants
The government won’t get in touch out of the blue about grants. It won’t call, text, reach out through social media, or email you. It won’t offer you free government grants of any kind, much less grants to pay for home repairs, medical costs, or other personal needs. Real government grants require an application, and they’re always for a very specific purpose. Learn more (for free) at grants.gov.
Never share your financial or personal information with anyone who contacts you. Government agencies will never call, text, message you on social media, or email to ask for your Social Security, bank account, or credit card number. In fact, no matter who they say they are, don’t give out that information. Once a scammer has your information, they can steal money from your account, or your identity.
Don’t pay for a list of government grants — and don’t pay any up-front fees. The only place you can find a list of all available federal grants is at grants.gov. And that list is free. No government agency will ever contact you to demand that you pay to get a grant. And no government agency will ever ask you to pay with a gift card, cash reload card, by money transfer, or with cryptocurrency. Not for a grant, and not ever.
If you paid a scammer, act quickly. If you think you’ve sent money to a government impersonator like one of these grant scammers, contact the company you used to send the money. Tell the gift card, money transfer, or cryptocurrency company that it was a fraudulent transaction. Then ask them to reverse it.
What To Do If You Paid A Scammer
Scammers often ask you to pay in ways that make it tough to get your money back. No matter how you paid a scammer, the sooner you act, the better. Learn more about how to get your money back.
Report Government Grant Scams
When you report a scam, the FTC can use the information to build cases against scammers, spot trends, educate the public, and share data about what is happening in your community. If you spotted a scam, report it to the FTC at ReportFraud.ftc.gov.
Warning over mysterious hackers that have been targeting aerospace and defense industries for years
Written by Danny Palmer, Senior Reporter on February 15, 2022 | Topic: Security | zdnet.com
An unknown criminal hacking group is targeting organizations in the aviation, aerospace, defense, transportation and manufacturing industries with trojan malware, in attacks that researchers say have been going on for years. Dubbed TA2541 and detailed by cybersecurity researchers at Proofpoint, the persistent cyber-criminal operation has been active since 2017 and has compromised hundreds of organizations across North America, Europe, and the Middle East.
Despite running for years, the attacks have barely evolved, broadly following the same targeting and themes in which attackers remotely control compromised machines, conduct reconnaissance on networks and steal sensitive data.
"What's noteworthy about TA2541 is how little they've changed their approach to cybercrime over the past five years, repeatedly using the same themes, often related to aviation, aerospace, and transportation, to distribute remote access trojans," said Sherrod DeGrippo, vice president of threat research and Detection at Proofpoint.
"This group is a persistent threat to targets throughout the transportation, logistics, and travel industries."
Attacks begin with phishing emails designed to be relevant to individuals and businesses in the sectors being targeted. For example, one lure sent to targets in aviation and aerospace resembles requests for aircraft parts, while another is designed to look like an urgent request for air ambulance flight details. At one point, the attackers introduced COVID-19-themed lures, although these were soon dropped.
While the lures aren't highly customized and follow regular templates, the sheer number of messages sent over the years – hundreds of thousands in total – and their implied urgency will be enough to fool victims into downloading malware. The messages are nearly always in English.
TA2541 initially sent emails containing macro-laden Microsoft Word attachments that downloaded the Remote Access Trojan(RAT) payload, but the group has recently shifted to using Google Drive and Microsoft OneDrive URLs, which lead to an obfuscated Visual Basic Script (VBS) file.
Interacting with these files – the names of which follow similar themes to the initial lures – will leverage PowerShell functions to download malware onto compromised Windows machines.
The cyber criminals have distributed over a dozen different trojan malware payloads since the campaigns began, all of which are available to buy on dark web forums or can be downloaded from open-source repositories.
Currently, the most commonly delivered malware in TA2541 campaigns is AsyncRAT, but other popular payloads include NetWire, WSH RAT and Parallax.
No matter which malware is delivered, it's used to gain remote control of infected machines and steal data, although researchers note that they still don't know what the ultimate goal of the group is, or where they are operating from.
The campaign is still active, and it's been warned that the attackers will continue to distribute phishing emails and deliver malware to victims around the world.
QR codes are useful shortcuts to online resources via a phone's camera, but scammers are now tampering with them to direct victims to phishing pages, cryptocurrency scams and more. According to a report from the FBI, QR codes can also load malware to steal financial information and then withdraw funds from victim accounts.
According to the FBI, the overall advice to avoid falling victim to a QR code scam is to exercise caution when entering information from a website accessed via a QR code. This is especially true for a QR code that directs you to a site that you have no previous experience with.
Here are a few of the FBI's specific tips to avoid QR scams for smartphone users:
- Do not scan a randomly found QR code.
- Be extra cautious about QR codes found in public places. Look for signs of tampering such as labels placed on a poster or a QR code that doesn’t fit the original sign layout.
- Check the URL after scanning a QR code to be sure it is the site you expected.
- If a site looks different than what you expected, leave the site immediately.
- Be careful when entering credentials or financial information on a site visited via a QR code.
- Avoid downloading an app from a QR code and instead use an official app store to download.
- Call the organization if it sent a bill in email, allowing payment through a QR code to verify its authenticity.
- Don't download a QR code scanner because most smartphones have one built into the camera.
- Avoid making payments through a site navigated to from a QR code unless you are familiar with the site. Instead, manually enter a known and trusted URL to complete the payment.
As always, if you feel your financial information has been compromised, call NGFCU immediately at 800.633.2848. NGFCU has 24/7/365 personal service to assist with you with any concerns.
Source: https://www.consumer.ftc.gov/articles/gift-card-scams (May 2021)
Someone might ask you to pay for something by putting money on a gift card, like a Google Play or iTunes card, and then giving them the numbers on the back of the card. If they ask you to do this, they’re trying to scam you. No real business or government agency will ever insist you pay them with a gift card. Anyone who demands to be paid with a gift card is a scammer. Read on to learn more about gift card scams.
What Gift Card Scams Looks Like
Gift cards are for gifts, not for payments. But they’re popular with scammers because they’re easy for people to find and buy, and they have fewer protections for buyers compared to some other payment options. They’re more like cash: once you use the card, the money on it is gone. Scammers like this.
If someone calls you and demands that you pay them with gift cards, you can bet that a scammer is behind that call. Once they have the gift card number and the PIN, they have your money. Scammers may tell you many stories to get you to pay them with gift cards, but this is what usually happens:
- The caller says it’s urgent. The scammer says you have to pay right away or something terrible will happen. But you don’t, and it won’t.
- The caller usually tells you which gift card to buy. They might say to put money on an eBay, Google Play, Target, or iTunes gift card. They might send you to a specific store — often Walmart, Target, CVS, or Walgreens. Sometimes they say to buy cards at several stores, so cashiers won’t get suspicious. And, the caller might stay on the phone with you while you go to the store and load money onto the card. These are all signs of a scam.
- The caller asks you for the gift card number and PIN. The card number and PIN on the back of the card let the scammer get the money you loaded onto the card. And the scammer gets it right away.
How Scammers Convince You to Pay with Gift Cards
Scammers pretend to be someone they’re not to convince you to pay with gift cards. They want to scare or pressure you into acting quickly, so you don’t have time to think or talk to someone you trust. Here’s a list of common gift card scams and schemes:
- The caller says they’re from the government — maybe the IRS or the Social Security Administration. They say you have to pay taxes or a fine, but it’s a scam.
- Someone calls from tech support, maybe saying they’re from Apple or Microsoft, saying there’s something wrong with your computer. But it’s a lie.
- You meet someone special on a dating website, but then he needs money and asks you to help him. This romance scammer makes up any story to trick you into sending him gift cards.
- The scammer pretends to be a friend or family member in an emergency and asks you to send money right away — but not tell anyone. This is a scam. If you’re worried, hang up and call your friend or relative to check that everything is all right.
- Someone says you’ve won a prize but first, you have to pay fees or other charges with a gift card. Remember: no honest business or agency will ever make you pay with a gift card. But also — did you even enter that sweepstakes?
- The caller says she’s from your power company, or another utility company. She threatens to cut off your service if you don’t pay immediately. But utility companies don’t work that way. It’s a scam.
- You get a check from someone for way more than you expected. They tell you to deposit the check, then give them the difference on a gift card. But that check will be fake and you’ll be out all that money.
What to Do If You Paid a Scammer with Gift Cards
If you paid a scammer with a gift card, tell the company that issued the card right away.
Contact information for popular gift card companies
- Call 1 (888) 280-4331.
- Keep the Amazon card itself and your receipt for the Amazon card.
- Learn about Amazon gift card scams and how to report them. Click on “Contact us.”
- Chat with eBay customer support, or have a representative call you back.
- Keep the eBay gift card itself and your receipt for the eBay gift card.
- Learn more about scams using eBay gift cards and how to report them.
- Report the gift card scam to Google.
- Keep the Google Play card itself and your receipt for the Google Play card.
- Learn about Google Play gift card scams and how to report them.
- Call Apple Support right away at 1 (800) 275-2273. Say “gift card” to connect with a live representative.
- Ask if the money is still on the iTunes card. If so, Apple can put a freeze on it. You might be able to get your money back from them.
- Keep the iTunes card itself and your receipt for the iTunes card.
- Learn about iTunes gift card scams and how to report them.
- If you have a Steam account, report gift card scams online. Click the “Purchases” option, then click, “I have charges from Steam that I didn’t make.” Then click, “Contact Steam Support.”
- Keep the Steam card itself and your receipt for the Steam card.
- Learn about Steam gift card scams.
- Call Target GiftCard Services at 1 (800) 544-2943.
- Report gift card scams to MoneyPak.
- Keep the MoneyPak card itself and your receipt for the MoneyPak card.
- Learn about MoneyPak gift card scams.
Don’t see your card on this list? Look for the company’s contact information on the card itself, or do some research online to find out how to reach the card issuer. If you can’t find the contact information or the card issuer doesn’t want to talk to you, report it to the FTC.
Safely Buying and Using Gift Cards
Remember that gift cards are for gifts, not for payments. So if you buy gift cards to give away or donate:
- Stick to stores you know and trust. Avoid buying from online auction sites because the cards may be fake or stolen.
- Check it before you buy it. Make sure the protective stickers are on the card and that they do not appear to have been tampered with. Also check that the PIN number on the back isn’t showing. Get a different card if you spot a problem.
- Keep your receipt. This, or the card’s ID number, will help you file a report if you lose the gift card.
If someone asks you to pay them with gift cards:
- Report it to the Federal Trade Commission at ReportFraud.ftc.gov. Report it even if you didn’t pay. Your report helps law enforcement stop scams.
- You can also report it to your state attorney general.
- If you lost money, also report it to local law enforcement. A police report may help when you deal with the card issuer.
With the popularity of online dating apps and social networking sites, scammers have found another way to steal money from people. Here are a few tips to avoid losing money to an online romance scammer:
- Never send money to someone you have not met in person
- If the person asks for money for any reason, stop communicating with the person immediately
- Do an online search for the type of job the person has. Many romance scams have similar job stories such as “oil rigger scam” or “US Army scammer”.
While these tips are very sensible, be aware of these scams for your own family members, especially younger adult members of your family that are using online networks to meet new people. If something a family member tells you about their new online romance sounds suspicious, speak up!
Family Emergency Scams
These scams can happen online, via text or on the phone. A scammer contacts you and tells you they are a close friend of a family member or a family member that you have little contact with. They will tell you that someone in your family needs your help. Stories like “your brother is in jail and needs bail money” or “your cousin’s car broke down and they need money to stay in a hotel”. The stories are endless.
The scams always include an urgent request for money and the scammer will play to your emotions to help a family member. The scammer will also ask you to keep the emergency a secret. If you receive a call or text with this type of request, here are a few tips:
- Do not send any money immediately.
- Hang up immediately and then contact the family member that is “in trouble” using the contact information you have. Do not use the contact information possibly provided by the scammer.
- Reach out to another family member that can verify the emergency.
As with romance scams, most of these tips make perfect sense and many are unlikely to ever fall victim to these scammers. However, it is good to talk to your family members about these scams. Grandparents can be particularly vulnerable if the scammer pretends to be a grandson or granddaughter. The request of “please don’t tell Mom or Dad” will keep the scam a secret and some grandparents may be reluctant to admit they have been scammed.
While the thought of these scams is unpleasant, share these tips with your family.
And always, report the scam to the FTC at www.ReportFraud.ftc.gov. This reporting can help others before they fall victim to one of these scams. If you believe a scammer has gained access to your NGFCU accounts, notify us immediately at 800.633.2848.
The holiday shopping season isn't just a big season for consumer spending. It's also a peak time of year for fraud. And while fraud unfortunately happens year-round, it is particularly common around the holidays. With the significant increase in online shopping, consumers need to be extra vigilant about cybersecurity at this time of the year.
Here are some tips to avoid fraud during the holidays (and all year):
- Use unique passwords. If you do not want to create unique passwords for every website you use, at least create unique ones for your online banking profile, PayPal account, credit card account, and other accounts linked to your financial information. And in all cases, do not use the same password for multiple financial accounts.
- Use a secure network when shopping online. Do not make online purchases when using a public or unsecured WiFi.
- Only shop from sites or stores you trust. Verify that you are on a store's actual website and trust your gut if something seems suspicious. Do not go to a site by clicking on an ad you received via e-mail or social media. Look at the name of company and go directly to their site.
- Use a debit or credit card with anti-fraud features or fraud alerts like Mastercard® or Visa®. These features can help you catch and stop unauthorized transactions before they’re approved by your financial institution.
- Monitor your credit card and banking accounts frequently. With online account access, daily monitoring is easy to do. Report any fraudulent or questionable charges as soon as you notice them. Set up email or text alerts on your credit and debit cards so you receive notice of any purchase or transaction immediately. If you don’t recognize the transaction, contact your issuer immediately.
- Keep your devices up to date with software, browser and app updates. Fraud prevention technology is constantly improving, which means most software updates include security fixes that address new vulnerabilities.
- Never give your financial or personal information over the phone to someone that initiated the call. Only give information on a call which you placed and are sure you are speaking to the desired company.
- Be careful who you trust your login information to, even if it is a close friend or relative.
NGFCU is available 24/7/365 if you suspect any fraud on your account. Call 800.633.2848 to report any suspicious activity or if you believe your financial information has been compromised.
With the disruption caused by the pandemic, many people are accessing their employer networks and computers from a remote location. Having the ability to do this is called remote access, and it has become an invaluable tool enabling employees to work from home. However, it is very important to make sure your remote access is secure.
There are several ways to keep your computer and data protected when using remote access. Here are a few tips to help you do just that:
Use Strong Passwords
- Your passwords should be a combination of upper and lower case letters, numbers, and symbols. Each password should be at least 12 characters long. Using a password generator is a simple way to create random passwords. Change your passwords frequently and create a unique password for each account or login. And of course, don’t share your passwords.
- Many software updates contain security enhancements or patches. Install updates when they become available to protect your device from new malware or viruses.
Use Antivirus Software
- Install reliable antivirus software and enable auto-updating so it is always up to date.
Enable Your Firewall
- Firewalls monitor and filter incoming and outgoing network traffic based on established security protocols. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources. Be sure your firewall is ON.
Use a Secure VPN
- Setting up a secure Virtual Private Network (VPN) means your remote desktop won’t be connected directly to the internet. Instead, your remote desktop will only be exposed to your local network. This limits the vulnerability to outside hackers.
- Called 2FA or MFA, this adds another layer of protection to your device and requires more than one kind of credential to sign into or log into an account. Beyond the typical username and password, multifactor authentication requires a unique code that will be sent to you via SMS for verification.
Reports of ransomware scams have been headline news recently. Large companies are being targeted and have become victims of this security threat. Here is valuable information about this type of cyber-crime and how to avoid it.
Malware includes viruses, spyware, ransomware and other unwanted software that gets secretly installed onto your device. Once malware is on your device, criminals can use it to steal your sensitive information, demand payment to unscramble data encrypted by ransomware, and make your device vulnerable to even more malware.
How Malware Gets on Your Device
- Malware can get onto your device when you open or download attachments, or visit a fake website. Here are some common ways that your device might get infected with malware:
- Downloading free stuff like illegal downloads of popular movies, TV shows, or games
- Clicking links in fake security pop-ups sent to your computer
- Clicking on ads placed by scammers on websites you visit
- Phishing emails that trick you into clicking on a link or opening an attachment
How To Know if You Have Malware
- Look for unusual behavior from your phone, tablet, or computer. Your device might have been infected with malware if it:
- Suddenly slows down, crashes, or displays repeated error messages
- Won’t shut down or restart
- Won’t let you remove software
- Serves up lots of pop-ups, inappropriate ads, or ads that interfere with page content
- Shows ads in places you typically wouldn’t see them, like government websites
- Shows new and unexpected toolbars or icons in your browser or on your desktop
- Uses a new default search engine, or displays new tabs or websites you didn’t open
- Keeps changing your computer’s internet home page
- Sends emails you didn’t write
- Runs out of battery life more quickly than it should
How To Avoid Malware
Scammers try to trick people into clicking on links that will download viruses, spyware, and other unwanted software — often by bundling it with free downloads. Here are ways to avoid malware:
- Install and update security software and use a firewall if available. Set your security software to update automatically.
- Read each screen when you install new software. If you don’t recognize a program, or are prompted to install bundled software, decline the additional program or exit the installation process.
- Get well-known software directly from the source. Sites offering popular software for free are more likely to include malware.
- Pay attention to your browser’s security warnings. Many browsers come with built-in security scanners that warn you before you visit an infected webpage or download a malicious file. Don’t modify your browser’s security warnings. It could weaken the security.
- Instead of clicking on a link in an email or text message, type the URL of a trusted site directly into your browser. Criminals send phishing emails that trick you into clicking on a link or opening an attachment that could download malware.
- Don’t click on pop-ups or ads about your computer’s performance. Scammers insert unwanted software into pop-up messages or ads that warn that your computer’s security or performance needs attention. You might see a warning that says “suspicious activity detected on your computer. Contact a technician now at 888-888-8888.” These are tech support scams. Avoid clicking on these ads if you don’t know the source.
If you believe you may have malware on any of your devices that may have compromised your NGFCU accounts, call us at 800.633.2848 or email email@example.com.
Protecting your smartphone and tablet requires a distinct approach. Follow these steps to help keep your mobile devices secure:
- Use a PIN/keylock code. Lock your phone when it is not in use by using the passcodes, touch ID or face ID.
- Keep the software updated – many of the upgrades are for increased security enhancements.
- Back up your devices regularly.
- Utilize the apps that can help locate your phone should you misplace or lose it. Be sure these apps are installed on another device such as a tablet or computer.
- Protect sensitive data. Always log out of your financial accounts after you have accessed mobile or online banking.
- Be wary of Wi-Fi. To stay safe, avoid connecting your device to public or unsecured (not requiring a password) Wi-Fi. Never conduct financial transactions or access sensitive data while you're on public Wi-Fi.
If you upgrade or trade in your phone, do these things first:
- Back it up.
- Remove the SIM and/or SD cards.
- Erase your personal information –if you have the option to restore your phone to the original factory settings, do that.
- Delete any apps that contain personal information especially those used to access your financial accounts or online shopping.
- For more helpful information about this topic, take advantage of the free resources provided by the Federal Trade Commission at consumer.ftc.gov.
- Use strong passwords that include a mixture of letters, numbers and symbols.
- Change your passwords frequently.
- Do not use the same password for your online accounts.
- Use multi-factor authentication when available.
- Consider using a password manager program to eliminate the need to manually enter user names and passwords.
- Install real-time, always-on anti-virus software on your computer.
- Keep all software programs and your operating system up-to-date. Many updates are for security patches and enhancements. Enable "automatic updates" to make this easy.
- Activate the internet firewall.
- Require a password to log onto your computer.
- Quit out of, or log off all online accounts after you have completed your transaction.
- Block pop-up windows.
- Password protect your Wi-Fi.
Mobile Device Security:
- Enable screen lock that requires a password, PIN, touch ID or touch ID to open your device.
- Log off all online accounts after you have completed your transaction, then close the app.
- Keep your apps and mobile operating systems up-to-date. Enable "automatic updates" to make this simple.
- Activate the "find my phone/tablet" feature when available.
- Avoid public Wi-Fi.
- If you are concerned that your NGFCU account information has been compromised, let us know immediately at 800-633-2848.
After you have transferred your apps and data to your new device, you'll need to decide what to do with your old device. Regardless of whether you intend to recycle it or trade it in for cash, make sure the hard drive is wiped clean. This will ensure that all your personal information, including user names, passwords, login credentials, files, etc. are not accessible to anyone.
Here is a short list of recommendations to protect your information:
Secure delete all files
Simply deleting files is not enough. Even if you can't see the file name, the data is still on your hard drive and accessible. Most operating systems have a utility for secure deletion of files. Check your device's specifications and follow the instructions.
Deauthorize your applications
Many software packages such as Microsoft Office or Adobe allow installation on a limited number of devices. Be sure to deauthorize these programs so they will be available to use on your new device. Each program will have instructions on the specific procedure.
Clear your browsing history
Most browsers save information about your browsing history and have settings that allow you to store user names and passwords. Just think of how many websites you visit that have your user name and password "remembered.” Locate the procedure to erase your browsing history for all your browsers, not just the one you use most often.
Uninstall all applications
If you have software that you purchased and installed on your hard drive, uninstall the programs so they are available to use again on your new device.
Remove the hard drive
If you intend to just dispose of your device, you can remove the hard drive entirely. While not easily done with many devices, it certainly ensures that your information is not shared. Then you can choose your preferred method of destroying the hard drive.
After you've done the above steps, you are ready to dispose of your old device. Since these devices do contain toxins, the best choice is to recycle if you intend to simply trash your device. Watch for events in your community that sponsor e-waste recycling. However, you may want to consider donating it or trading it in for cash value as well.
Keylogger is malware that records keystrokes on your keyboard. If you inadvertently allow this malware to be installed, it can track anything you type including passwords, user names, credit card numbers, etc.
Here is helpful information and tips on how to avoid becoming a victim of Keyloggers malware.
How Keyloggers Access your Information
Keylogger software can be installed onto your computer or device in several ways. Here are the most common:
- As an attachment to an e-mail
- As an embedded link in an e-mail
- As webpage script on a malicious website
How to Protect Yourself
- Phishing email: Never click on links or open an attachment from an unknown email address. Even if you recognize the sender, do not open an attachment or click a link if you weren't expecting it. Reach out to the sender first.
- If your browser warns you that you have landed on a webpage that is unsafe or possibly infected, take the warnings seriously and get off the site.
- Download apps and software from reliable sources only. Don't download anything that you have not requested and don't accept any 'free' software from an unrecognized source.
- Implement two factor authentication whenever possible: this is an extra layer of security designed to ensure that you're the only person who can access your account, even if someone knows your password.
- When offered, click the "Remember this computer" option on sites that you trust so your username and other information are auto-populated and do not require keystrokes.
- Install good Antivirus security software and keep the software updated.
If you are concerned that your financial information has been compromised, notify firstname.lastname@example.org immediately. If you think you have been a victim of identity theft, visit IdentifyTheft.gov to see the specific steps to take to protect yourself.
If you assume no one cares about your personal email, consider this: your personal email can provide a wealth of information to cyber criminals. Think of all the information that is included in your saved emails – receipts, password resets, links to bank statements and so much more. Not to mention, access to your address book.
Many people also use their email address as the login for financial accounts, online retailers and payment processors. If someone has your email and attempts to log into one of your accounts, they only need to click the "forgot password" and the password reset will go to your email, which has been taken over by the cybercriminal. Once the person updates your password, you are locked out and they are logged in.
You might have been hacked if:
- Your email contacts are getting emails or messages you didn't send.
- Your sent messages folder has messages you didn't send, or it has been emptied.
- Your social media accounts have posts you didn't make.
- You can't log into websites you frequently visit such as your online banking or your social media account.
Cyberattackers can also "spoof," or fake your email, but don't actually have access to your account. But you'll want to take action, just in case.
If you have been hacked:
- Update your desktop and mobile operating systems, delete any malware and make sure your security software is up-to-date.
- Change your passwords on all of your online accounts.
- Check the advice your email provider or social networking site has about restoring your account if you have lost access.
- Tell your email contacts about the hack so they don't become victims too.
- Consider closing your email account and setting up a new one.
Steps to prevent hacking:
- Use unique passwords for important sites, like your bank and email. This can be an overwhelming task, but you can use a Password Manager that provides a centralized and encrypted location that will keep a record of all these passwords safe. Password managers store login details for all the websites that you use and logs you in automatically each time you return to a site. When using a password manager you create a master password. The master password will control access to your entire password database. This password is the only one you will have to remember so it's important to make this as strong and secure as possible.
- Use two-factor authentication whenever it is available. This provides a second layer of authentication such as a text or call to verify your identity.
- NEVER click on links or open attachments in emails unless you know who sent them and what they are.
- Download free software only from sites you know and trust.
- Don't use public computers or Wi-Fi to access your most sensitive online accounts, especially accounts that have your financial information.
- If you think a cybercriminal has gained access to your information – like your Social Security, credit card, or bank account number – go to IdentityTheft.gov to see the specific steps to take.
Our cell phones contain contact information, text messages, e-mail access, auto-filled login credentials and much more. Imagine that your cell phone suddenly stops working: no data, no text messages, no phone calls. Then imagine calling your cellular provider only to discover that your SIM card has been activated on a new device. At this point, you are possibly the victim of a SIM card swap scam.
How the SIM card swap scam works:
- With your cell phone number and personal information like name and address, a scammer can call your cell phone service provider and say your phone was lost or damaged. Then they ask the provider to activate a new SIM card connected to your phone number on a new phone – a phone they own. If your provider believes the story without additional verification procedures and activates the new SIM card, the scammer – not you – will get all your text messages, calls, and data on the new phone.
- Imagine the damage a scammer – who now has control of your number – can do with all your information. Even if you have multifactor authentication (MFA) enabled on your financial accounts, which requires two or more credentials to log in, you are not protected. The scammer will receive the text message with the verification code they need to log in.
- Armed with your login credentials, the scammer could log in to your bank account and steal your money, or take over your email or social media accounts. And they could change the passwords and lock you out of your accounts. To say the least, this situation is a nightmare.
How to protect yourself from a SIM card swap scam:
- Don't reply to unsolicited calls, emails, or text messages that request personal information. These could be phishing attempts by scammers to get your personal information. If you get a request for your account or personal information, contact the company using a phone number or website you know is real. Companies you do business with, especially financial institutions, will never ask you to verify your information unless you have reached out to them first.
- Limit the personal information you share online. Avoid posting your full name, address, or phone number on public and social media sites. An identity thief can use it to answer the security questions required to verify your identity and log in to your accounts. This includes those supposedly harmless Facebook posts from friends asking you to name your favorite color, movie, etc.
- Set up a PIN or password on your cellular account. This is a very simple way to add security to your cellular account and can help protect your account from unauthorized changes. Check your provider's website for information on how to do this.
If you're the victim of a SIM card swap scam:
- If you discover that your phone has lost your data, text, etc., contact your cellular service provider immediately to determine if you have been the victim of a SIM Swap. Your cellular company should be able to reverse the SIM card swap so you can take back control of your phone number. After you re-gain access to your phone number, change your account passwords.
- Check your credit card, bank, and other financial accounts for unauthorized charges or changes regularly. If your phone stops working, use another device like a desktop computer or tablet as soon as possible. If you see anything suspicious, report them to the company or institution immediately.
- If you think a scammer has your information – like your Social Security Number, credit card, or bank account numbers – go to IdentityTheft.gov to see the specific steps to take.
- For more helpful information about this topic, take advantage of the free resources provided by the Federal Trade Commission at consumer.ftc.gov.
Scammers, hackers and identity thieves are looking to steal your personal information and possibly your money. But there are steps you can take to protect yourself. Here are a few tips to remember:
Update Your Software. Keep your software – including your operating system, your web browsers, and your apps – up-to-date to protect against the latest threats. Many software updates include improved security. If you have outdated software that you no longer use, delete it from your devices.
Protect Your Personal Information. Every time you are asked for your personal information – whether in a web form, an email, a text, or a phone message – think about why someone needs it and whether the request is legitimate. If someone is requesting your information without any initiation from you, always contact the company directly by going to their website or calling them yourself.
Protect Your Passwords. Here are a few ideas for creating strong passwords and keeping them safe:
Use at least 10 characters; 12 is ideal for most home users.
Try to be unpredictable – don't use names, dates, or common words. Mix numbers, symbols, and capital letters into the middle of your password, not at the beginning or end.
Don't use the same password for many accounts. If it's stolen from you – or from one of the companies where you do business – thieves have access to all of your accounts with the same password.
Don't share passwords on the phone, in texts or by email.
If you write down a password, keep it secure, out of plain sight.
Consider Turning On Two-Factor Authentication. Two-factor authentication requires both your password and an additional piece of information to log into your account. The second piece could be a code sent to your phone, or a random number generated by an app or a token. This protects your account even if your password is compromised. If you have the option to activate two-factor authentication, use it.
Give Personal Information Over Encrypted Websites Only. If you're shopping or banking online, stick to sites that use encryption to protect your information as it travels from your computer to their server. To determine if a website is encrypted, look for https at the beginning of the web address. That means the site is encrypted and your data is secure.
Back Up Your Files. No system is completely secure. Copy your files to an external hard drive or cloud storage. If your computer is attacked by malware, you'll still have access to your files.
For more helpful information about this topic, take advantage of the free resources provided by the Federal Trade Commission at consumer.ftc.gov.
The Federal Reserve Bank of New York reports that scammers are telling people they can pay their bills using so-called "secret accounts or "social security trust accounts" and routing numbers at Federal Reserve Banks. In exchange for personal information, like social security numbers, people get what they think is a bank account number at a Federal Reserve Bank. But this really is just a way to get your personal information, which scammers can then sell or use to commit fraud, like identity theft.
It's good to keep in mind that people do not have accounts at Federal Reserve Banks. Only banks can bank at the Federal Reserve. But what happens if you try to use this "secret" account? Well, the Federal Reserve Bank will deny the payment, since you don't really have an account there. Once the payment is rejected, you'll be notified that you still owe the money – which is about when you might figure out that this was a scam. At that point, you may owe a late fee or penalty to the company you thought you were paying. You also may owe fees to your bank for returned or rejected payments.
If you see a video, text, email, phone call, flyer, or website that describes how you can pay bills using a Federal Reserve Bank routing number or account, report it to the FTC. It’s a scam. And remember: never give your credit card, bank account, or social security number to anyone who calls or emails and asks for it – no matter who they say they are.
For more helpful information about this topic, take advantage of the free resources provided by the Federal Trade Commission at consumer.ftc.gov.
Wi-Fi hotspots in public places are convenient, but often they're not secure. If you connect to a public Wi-Fi network and send information through websites or mobile apps, it could be accessed by someone else.
Here's how you can protect your information when using public Wi-Fi:
- Log in or send personal information only to websites you know are fully encrypted. You can tell if a site is encrypted by looking at the URL. It should start with https, not just http. As you navigate through a site, watch the URL for each page also. Not all pages on a site are encrypted.
- Don't stay permanently signed into accounts. When you've finished using an account, log out.
- Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
- Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to alerts many web browsers display when you attempt to visit fraudulent websites or download malicious programs, and keep your browser and security software up to date.
- Consider changing the settings on your mobile device so it doesn’t automatically connect to nearby Wi-Fi. That way, you have more control over when and how your device uses public Wi-Fi.
- Use a virtual private network (VPN) if you regularly access online accounts through Wi-Fi hotspots. VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can get a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees. What's more, VPN options are available for mobile devices too. They can encrypt information you send through mobile apps.
- Learn how to identify and access Wi-Fi networks that use encryption: WEP and WPA are common, but they might not protect you against all hacking programs. WPA2 is the strongest.
- Install browser add-ons or plug-ins. They can help. For example, Force-TLS and TTPSEverywhere are free Firefox add-ons that force the browser to use encryption on popular websites that usually aren't encrypted. They don't protect you on all websites so watch for https in the URL address as mentioned above.
- Take steps to secure your home wireless network.
For more helpful information about this topic, take advantage of the free resources provided by the Federal Trade Commission at consumer.ftc.gov.