Card fraud that occurs at the point of sale. For instance, if someone buys items in a store with a stolen credit card, that constitutes point-of-sale fraud. What type of fraud has occurred?
What is a Point of Sale Fraud
Technology or social engineering is used to entice victims to supply personal information such as account numbers, login IDs, passwords, and other verifiable information that can then be exploited for fraudulent purposes, including identity theft. This can be performed through mass emails and spoofed websites.
What is Phishing?
Some scammers, posing as collection agencies, call consumers demanding payment of bogus outstanding debts. What game is the customer playing or what type of fraud is this?
What is Debt Collection Fraud
The ability to detect where a member's card may have been compromised when the institution is experiencing a high volume of fraudulent transactions or compromised alerts across multiple members.
What is identifying the Point of Sale?
I am at the ATM machine and I noticed someone breathing down my back, perhaps looking at the keypad and screen. What just happened to me?
What is Shoulder Surfing ?
This is a type of online scam where criminals impersonate legitimate organizations via email, in order to steal sensitive information?
What is email phising ?
It's a type of identity theft that involves fraud on existing financial accounts where the fraudster obtains an individual's personal information and changes the official mailing address. Once accomplished, the fraudster conducts transactions with the victim's knowledge.
What is Account Takeover?
An ATM/ABM is compromised with a card reader which can be disguised to look like a part of the machine. The card reader saves the users' card number and pin code, which is then replicated into a counterfeit copy for theft. What is this device?
What is a skimming device?
Used by cybercriminals to masquerade as a senior player at an organization and directly target senior or other important individuals at an organization, with the aim of stealing money or sensitive information or gaining access to their computer systems for criminal purposes. What type of attack am I?
What is a Whaling Attack?
The act of sending emails to specific and well-researched targets while purporting to be a trusted sender. The aim is to either infect devices with malware or convince victims to hand over information or money. . What type of scam is this?
What Spear phishing?
This type of card fraud does not involve the card being present. The thief may have stolen either the card or the number, but in either case, they use the number for online transactions. ?
What is Card-not-present fraud?
I usually do this activity before the garbage truck arrives. I often find lots of personal information. What am I doing?
What is Dumpster Diving?
I received an email from Wells Fargo. The message has the banks logo, picture of the wagon and it is from a branch manager I recently opened an account with. I probably should respond to ensure all of my accounts are opened properly. Before I respond I decide to call the bank directly. I am informed the bank did not send me an email. What type of fraud is this ?
What is Email Spoofing?
This a tool used to prevent money laundering. We must stay in compliance with this government tool?
What is Bank Secrecy Act (BSA)?
An identity thief steals a homeowner's Social Security number or comes across their mortgage account number. With this information, it might be possible to take out a home equity line of credit or second mortgage, then make off with the money. What type of fraud am is being performed?
What is Mortage Fraud?
When cardholders dispute a transaction with the bank instead of contacting the merchant for a refund. Sometimes called friendly fraud, it involves actual consumers abusing the chargeback process to secure a refund What type of fraud am I ?
What is Charge Back Fraud?
refers to a cyberattack where a hacker obtains sensitive information transmitted between two other parties online. ... This type of fraud is easily accomplished using unsecured public WiFi networks
What is Man in the Middle Attack?
This is a type of "confidence trick" used for the purpose of targeted information gathering, fraud or to gain sensitive computer system access. This attack can happen in any workplace. What am I?
What is Social Engineering?
I am a website that provides directions on how to help you recover your identity and repair any damage you have experienced from identity theft.
What is IdentityTheft.gov?
When a thief uses a stolen card to make fraudulent transactions online, they may be prompted to enter the billing address. If they use the cardholder’s correct billing address, that type of Fraud am I?
What is a Billing Fraud?