|What is Phishing?|
|Phishing refers to 'fishing' out sensitive information such as banking details by pretending as a trustworthy entity. Usually the attacks will be in the form of an e-mail that appears to be from the bank. These randomly generated e-mails contain click able links that guides you to a scamsters log on page which will be a page designed to capture your details. Different techniques will be employed by the scamsters to make you click on the links and enter the user id and passwords. Scamsters then use this information to siphon off funds or, undertake transactions that are billed to the original customer.|
|How Phishers operate ?|
|Usually Phishing attempts will be in the form of a spam mail which contains click able links that will direct you to the 'spoofed website’, which scamsters have created. The fraudsters will procure a database of valid email addresses over a period of time in advance through publicly available sources. The website to which the email directs will have the same look and feel as the bank's website. The URL or the website address of such fake pages will be created by the scamsters on freely available web hosting servers. Our Bank website's URL is www.saraswatbank.com,. The fraudsters create fake websites with URL almost similar to the real one .For example www.saraswatbank.org or www.saraswatbank.net .Those who are unaware of this fact enter their login details which will be captured in the background by the fraudsters.The mis-users then log-in remotely into such victims’ accounts and transfer funds into thier account. The bank has employed the best possible security software and firewalls to protect our customers sensitive information. On the other hand we expect our customers to be alert of the above facts.|
|Website Spoofing is the term for falsified e-mail addresses that appear to come from a sender when in fact, the message is really being sent by a spammer. They can be difficult to spot and cause many problems, both for recipients and spoofed e-mail address owners. Scamsters can not only fake the URL but also the Pad lock icon at the bottom right corner.|
|"Vishing" or "Voice Phishing" is the act of leveraging a new technology called Voice over Internet Protocol(VoIP) in using the telephone system to falsely claim to be a legitimate enterprise in an attempt to scam users into disclose personal information. The victim is contacted by a phishing e-mail directed to a VoIP based telephone number. The user may receive a telephone call from another individual with a spoofed caller ID or a recorded incoming call with a spoofed caller ID directing them to a phishing site.
Fraudsters uses a spoofed (fraudulent) caller ID matching the identity of a misrepresented organization and they invite you to punch your telephone information through your telephone keypad. The content of the incoming message is designed to trigger an impulsive reaction from you. It can use upsetting or exciting information, demand an urgent response or use a false pretense . Any of the personal information such as bank account number, credit card number, PIN etc should not be typed in your telephone keypad in response to above mentioned calls. As a customer you also have a role in stopping vishing scams. You are encouraged to recognize it, report it and stop it. Do not react immediately without thinking.
|What is skimming?|
|Skimming is a scam where scamsters use a skimming card reader or skimmer with which they make a counterfeit copy of the ATM card or Credit card. While the victim withdraws money from his/her account the card details will be read into the skimmer or an attached PC. Once the skimmer gets the card data they can duplicate the card and also use it for online shopping.
Usually Skimming card readers or Skimmers will be placed in ATMs or POS machines . Skimmer is a small electronic device which is capable of capturing the data present in magnetic strips of the cards. Skimming may take place during a legitimate transaction at a business. Such fraudulent activities can happen mostly in shopping outlets and restaurants. For example, in a restaurant your card may be taken away when the bill is being settled and may use your card for regular transaction, also for capturing the card details. This captured card details will be misused by the scamsters.
|TIPS TO PROTECT YOURSELF FROM SKIMMING|
|Do not leave your card unattended.
Keep changing your ATM Card PIN number regularly
Use your hand or body to shield your PIN from onlookers when you are conducting transactions at a bank machine or at the point-of-sale.
Beware of a skimming card reader.
Regularly check your statements or passbook to verify all transactions have been properly documented.
Never let your card out of your sight, for example at a restaurant.