online fraud

Examples of Online and _ Fraud

Phishing and Spoofing

Phishing and spoofing are common examples of online . Both involve a deceptive __ to gain your personal _.

For instance, some criminals send you an email _ looks as if it come from Great Western _, encouraging you to go __ a website or call _ phone number and provide __ numbers, passwords, etc. They _ often go to great __ to make the fake __ look authentic. But here’s _ you should be aware __ to protect yourself:

  • Asking for personal information __ a red flag. Period. Western Bank will NEVER for any personal information __ an email. We already _ your Social Security number, card PIN, and other numbers. The criminals don’t.
  • Similarly, don’t pay attention __ urgent appeals claiming your __ is about to be _ if you fail to __ or verify your personal _. We will never ask for this type of _ in that way.
  • Sometimes the scammers will that the bank is its security system and _ you need to re-input _ personal information. Again, any that makes such a is NOT from Great __ Bank.
  • Offers that sound too _ to be true usually . For instance, you may __ asked to fill out _ short customer service survey __ exchange for money being to your account—and then __ provide your account number __ make sure the money _ deposited properly. You will get such a request _ Great Western Bank.
  • Typos and other errors often the mark of emails or websites. Be __ the lookout for typos, _ errors, awkward writing, and _ visual design.

To protect against phishing spoofing:

  • Make sure you are __ the Great Western ebanking page when you sign __ to Great Western ebanking _. You can do so __ typing www.GreatWesternBank.com/ebankinglogin in your __. If you’re using a _ browser, it will turn _ address bar green.
  • If you receive a email, do not click __ any links or reply __ it. Simply delete it. __ it claims to be _ Great Western Bank, please the Contact Us form to alert us __ the email.

Money Mules

Money mules are unsuspecting __ who become middlemen for _ trying to launder stolen anonymously. Victims are lured __ the promise of a career opportunity making large _ of money for minimal _. Criminals recruit ordinary people __ their money mules, send _ stolen money, and ask victims to wire or the money to the _&;_ leaving the victim a “commission” for helping with the _.

The victims of these may not only have bank accounts closed and _ reputation ruined, but are left financially responsible for _ the stolen funds.

Common signs of a mule scam:

  • Overseas companies requesting money agents in the U.S..
  • Opening new bank accounts __ receive money from someone don’t know.
  • Accepting large sums of into your personal bank __ for a new job.
  • Transferring or wiring funds of your personal bank __ to people you don’t _.

Malware

Short for “malicious software,” term malware includes viruses, __, and trojans designed to or damage a computer _, steal personal information, and _ fraud. There are a _ of easy ways to the risk of being _ malware victim:

  • Be aware that downloads _ file-sharing and social networking can be a major _ of malware.
  • Don’t open or install _ or free software from __ sources.
  • Beware of any pop-up asking for personal or _ information.
  • Update your security and _ software.

Vishing

Vishing is done over _ Internet Protocol (VoIP). The __ leaves an automated recording, _ consumers that their accounts _ experienced unusual activity and _ them to call a number that turns out __ be fake. Just as __ phishing and spoofing, the _ are looking for account __ and PINs.

If you receive such _ recording, do not call number given. Instead, call Western Bank at our service number, 1-800-952-2043.