In this type of scheme, the fraudster sends an email that appears to be from a legitimate source, such as a business or financial institution, asking the recipient to update or verify their personal information by replying to the email or visiting a fake website that the scammer has designed to look real.
Phishing
A type of fraud that is likely to occur after wildfires, tornados, hurricanes, and other emergencies.
Disaster
What you should do if you suspect an email is a phishing email.
Report it
A type of fraud in which the scammer sends fake letters asking for money now in exchange for something of value later. Some examples include notices of prizes, sweepstakes winnings, vacations, etc.
Mail Fraud
This type of fraud happens more frequently during the holiday season and after high-profile catastrophes. Scammers pretend to be legitimate organizations, or even create fake ones, to seek donations. They do little or no work and instead keep the money for themselves.
Charity
Software used to steal sensitive information.
Malware
A type of confidence scam where criminals pose as a relative – usually a child or grandchild – claiming to be in immediate financial need.
Grandparent
These scams work because fraudsters create convincing fake versions of these that can be difficult to distinguish from the real thing, even for financial institution employees. Fraudsters might also order real ones using information belonging to someone whose identity has been stolen.
Check Fraud
A form of digital payment that generally exists only
electronically and is increasingly favored by scammers and fraudsters.
CryptoCurrency
In this type of scam, the scammer creates a fake online identity to gain a victim's affection and trust. The scammer uses the illusion of a close relationship to manipulate and/or steal from the victim.
Romance
Fraudulent activity on a card issued by the bank. You are able to dispute these charges.
Debit and credit card fraud
Term used to describe the act of disguising an email address, sender name, phone number, or website URL to convince potential victims that they are interacting with a trusted source.
Spoofing
Term used to describe the act of capturing data and/or recording cardholders' PINs using a device illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps.
Skimming
A fraudster electronically transfers money to themselves by masking their identity as the customer and receiving the funds without the bank knowing.
Wire Transfer Fraud
By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files
Ransomware Attack
These types of scams promise a guaranteed return at low or no risk. The scammer may claim to have a "proven" system to ensure success. They may even provide testimonials from "real" people (paid actors) who have used the system and gotten rich.
Investment
Any kind of deceitful action designed to gain a financial advantage during the process of obtaining a sum of money to be paid back at another time.
Loan Fraud