Recently, the Bank of Communications Qingdao Branch launched a public interest promotion campaign for consumers' rights, summed up the “six major routines” for bank card theft, helping consumers to polish their eyes and prevent problems before they happen.

Routine 1: Modified POS machine has "catty"

The modus operandi: criminals should apply for supermarkets or hotel cashiers as “undercover”, use specially modified pos machines, secretly copy customer bank card information, and peek at record passwords or directly copy input bank card passwords, eventually achieving copying and stealing banks The purpose of the card.

Bank reminder: First, in small supermarkets or small hotels, you should use cash to pay as much as possible. If you choose to swipe your card, you should choose the password keyboard and the card-port split POS machine. Second, it should be noted that the small ticket issued by the POS machine and the name of the business owner are consistent. Third, please try to keep the stub of the merchant's bill to check with the bank card statement. In the event of an abnormal situation, such as the occurrence of repeated card deductions, you can contact the bank in time with the transaction documents and statements. Fourth, if it is a large bank card that is frequently used for credit card consumption, the bank card password must be changed in time after each consumption to avoid unnecessary losses. The fifth is to replace the magnetic stripe card with an IC chip card.

Routine 2: Public WIFI Pirate Information

The modus operandi: By providing free WIFI in public places, once you are greedy and free, your smart phone or tablet will be easily implanted.

Into the Trojan virus, thereby stealing the bank card information in the smart terminal. In addition, the criminals may also “kidnapped” the website of the official website to an illegal phishing website. When using WIFI for online payment, the input bank card information will be leaked.

Bank reminder: First, cautiously connect to the free WIFI in public places, you need to confirm with the merchant and then connect. Second, when using public WIFI, you should avoid entering sensitive information, including bank cards, online banking payments, and email account information. The third is to install security software to protect smart terminals from Trojan attacks. Fourth, if there is a loss caused by financial fraud, you should immediately call 110.

Routine 3: Self-service banking with fake access control

The modus operandi: stealing the cardholder's bank card magnetic stripe information and password information by installing a piracy device, a stealing device, a pinhole camera, etc. on the self-service bank access control, and making a fake card to steal the bank card after stealing the information. Internal funds.

Bank reminder: First, before swiping the card in the self-service bank access control system, you should pay attention to observe whether there is a fake access control with a password keyboard. It is important to remember that the self-service bank access control system does not need to input a password. At the same time, when swiping the card on the access control system, it is best to use your fingers to block the card number and other information on the card surface to prevent peeks by the criminal's pinhole camera. Second, when inquiring and withdrawing money on the ATM machine, pay attention to whether there are any extra devices or cameras on the machine. If the password keyboard has modified traces or is attached with a film, pay attention to the quick operation and block the gesture with the body when entering the password to prevent crime. Molecular peeping. The third is rapid alarm: if the cardholder finds suspicious access control, or the modification of the relevant parts of the ATM machine, immediately call the customer service hotline of the self-service bank and dial 110.

Routine 4: Scan QR code gift traps

The modus operandi: the lawless elements use the scan code to send gifts, to attract everyone to scan the QR code. Scan the QR code on your mobile phone to steal bank card information. The QR code provided by the criminals is actually the Trojan virus download address. After the virus is downloaded, it can be installed by itself and will not display any icons on the desktop. Instead, it will be lurking in the background of the mobile terminal, once the user enters the bank card and other online payment. After the information, the password will be stolen silently for bank card theft.

Bank reminder: First, do not covet small and cheap, free to scan the QR code to install unknown programs. Second, do not believe in the non-official channel QR code, do not see the "code" to sweep. The third is to install security software to protect smart terminals from Trojan attacks.

Routine 5: Hands and feet on the ATM machine

The modus operandi: First, there are obstacles in the card slot. When the cardholder inserts the bank card, the phenomenon of “swallowing card” will appear. The criminals who pretend to withdraw money will “respectfully” remind the cardholder to re-enter the password. Try to steal the card funds after "sneak peek" at the card password. The second is to set up obstacles in the cash outlet, so that the cash drawn by the cashier stays on the channel. When the cashier mistakenly thinks that the machine has failed and asks for help, the criminals on the side wait for the opportunity to steal the money. The third is to falsify the emergency notice, claiming that the ATM machine is faulty. If the cardholder needs to withdraw money, he can call the so-called “bank duty phone” and trick the cashier into the bank to withdraw money or say the bank card number and password, and then try to steal. Take the funds inside the card. The fourth is to steal the bank card. When the cardholder withdraws money from the ATM machine, the criminals distract the cardholder's attention by deliberately speaking or blocking the line of sight. The criminals on the side are waiting for the card to be exchanged for the fake card. card.

Bank reminder: First, do not easily leave the scene when encountering the "swallow card" phenomenon, such as the normal "swallow card", the machine will spit out the "swallow card" receipt, the screen will also display the "swallow card", you can call the relevant bank consumer hotline. Second, don't leave the scene when you encounter the ATM machine's cash withdrawal port. You can use the mobile phone or ask someone to help you call the 5-digit bank customer service phone. The third is to keep in mind the bank's 5-digit customer service phone. It should be convinced that the bank staff will never ask the cardholder to transfer money or say the bank card number and password on the phone. Fourth, pay attention to the surrounding environment before operating on the ATM machine. For those who are too close to the machine, politely ask him to stand outside the 1 meter line, and never be distracted by the people around.

Routine Six: The most popular phishing site

The modus operandi: First, set up a counterfeit bank website on the Internet to deny the cardholder to log in to the fake bank website that is very similar to the real bank website page by sending a false email to the cardholder, and ask for the personal information, bank card number and password. Etc. to scam information. The second is to create an excuse to deceive the cardholder to open an online bank account and deposit, wait for the card holder to obtain the bank card information and password, and then steal the funds from the cardholder's bank card through online bank transfer. The third is to use the hacker software, network virus to steal the cardholder's bank card number and password, and then steal the cardholder's card funds.

Bank reminder: First, to obtain the exact domain name of the bank's website, to ensure access to the real bank website. The second is to open online banking through formal channels, and under no circumstances will the bank card password be disclosed. Third, if there is a lack of better software to prevent network viruses, online banking transactions should be minimized.

Roll Top Fence

Roll Top Fence,Roll Top Fence Panels,Roll Top Mesh Fencing,Roll Top Fencing Panels

Anping County Hua Guang Wire Mesh Production Co.,Ltd , https://www.hgwirefence.com