- FTC – Putting a Lid on International Scams: 10 Tips for a Canny Consumer - Click Here
- IRS Releases the “Dirty Dozen” Tax Scams for 2014 – Click Here
- BBB – Alerts - Click Here
- Internet Crime Complaint Center (IC3) – Press Room – Scam Alerts - Click Here
- LooksTooGoodToBeTrue.com – Alerts - Click Here
- US Postal Inspection Service – Alerts - Click Here
- AnnualCreditReport.com - Click Here
- Better Business Bureau - Click Here
- Federal Bureau of Investigation - Click Here
- FDIC – Consumer Protection - Click Here
- Federal Trade Commission – Consumer Protection - Click Here
- Internet Crime Complaint Center (IC3) - Click Here
- LooksTooGoodToBeTrue.com – Fraud - Click Here
- National Cyber Security Alliance – Click Here
- OnGuardOnline.gov – Click Here
- United States – Computer Emergency Readiness Team - Click Here
- United States – Postal Inspection Service - Click Here
Common Fraud Scams
FirstBank will never ask you to verify, update, or provide sensitive information over email such as an account number, debit/credit card numbers, Social Security numbers, or online banking User IDs or Passwords.
- Phishing is a scam to deceive users into providing sensitive information such as credit/debit card numbers, PINs, account number, User IDs and Passwords for online banking, and Social Security number. These are usually presented to the user via email with a sense of urgency in order to get the recipient to respond quickly. The recipient is asked to respond with the requested information or by accessing a link provided in the email.
- Spear Phishing is a more specific form of Phishing where the sender may already have some details such as an account number in order to make the email look more authentic. Or it may target employees of a particular organization to make it appear someone else with the organization sent the email. These emails may appear to be more personalized.
- Whaling is an even more personalized form of Phishing where individuals collect extensive information on executives or other key members of a company using various social engineering techniques. Most of these emails attempt to deceive the recipient into clicking a link or attachment within the email which would then install malicious software.
- FDIC – Phishing - Click Here
- FTC – How Not to Get Hooked by a Phishing Scam - Click Here
- Social Engineering – is the act of manipulating people into performing actions or divulging confidential information usually through telephone or online communication. The term applies to trickery or deception for the purpose of information gathering, fraud, or computer access; in most cases the attacker never comes face-to-face with the victim.
- Pretext Calling – is a form of social engineering. It is a scheme associated with identity theft in which a fraudster, pretending to represent a legitimate person or entity, calls an unsuspecting party seeking personal identification data, such as social security numbers, passwords, account information, account activity, last deposit/withdrawal amount, etc.
- Vishing - Voice Phishing termed “vishing” attempts to deceive users into divulging sensitive information over the phone, typically through automated customer service lines and Voice over IP services. Recipients may receive an email or text message that instructs them to call a number regarding a problem with their account. Once the targeted person (potential victim) calls that number, the automated service or perpetrators will ask the person to provide sensitive data such as their account number, social security number, date and dollar amount of their last deposit/withdrawal, etc.
- FTC – Straight Talk about Telemarketing - Click Here