February 14, 2017
FBI Releases Article on Romance Scams.
The Federal Bureau of Investigation (FBI) has released an article addressing the rise of Internet romance scams. In this common type of fraud, cyber criminals target victims, gain their confidence, and trick them into sending money.
To stay safer online, review the FBI article on Romance Scams and US-CERT publication ST06-003 on staying safe on social networking sites. Please file a complaint with the FBI's Internet Crime Complaint Center if you believe you have been the victim of a romance scam.
January 31, 2017
Tax Identity Theft Awareness Week.
This is Tax Identity Theft Awareness Week[consumer.ftc.gov], and many federal agencies are offering consumers information and resources on the topic. Tax identity theft happens when a scammer files a fraudulent tax return using your Social Security number (SSN) and claims your refund. It also happens when someone uses your SSN to earn wages, and sticks you with the tax bill.
US-CERT encourages taxpayers, business owners, and tax preparers to educate themselves on tax identity theft by reading Internal Revenue Service (IRS) publication Taxes.Security.Together.[irs.gov] and the US-CERT Tip on Identity Theft[us-cert.gov].
You can also check out these events on avoiding tax identity theft[consumer.ftc.gov] hosted by the Federal Trade Commission (FTC), IRS, Department of Veterans Affairs, and other agencies.
December 9, 2016
New Device? Check Your Cybersecurity.
In this month’s issue, we’ll focus on another aspect of the holiday season: that new device you get or give during the holidays... Click here to read more.
November 29, 2016
Security Tips to Protect Your Identity During the Holidays.
It’s a wonderful time of year for some. Black Friday, Small Business Saturday, and Cyber Monday are here. Even for those who don’t participate in the madness that is the holiday shopping season can find some great deals this time of year... Click here to read more.
November 4, 2016
Internet Outage Shows How Sophisticated Attacks Can Target Your Home
The cyber attack last week that slowed many popular websites to a crawl used a new type of malware that takes control of tens of millions of personal devices connected to the internet — including home routers, baby monitors and cameras — without their owners' knowledge.
To protect your privacy and security, experts recommend:
•Learning how your connected devices work and determine whether they're internet-enabled.
•Follow security instructions to change default passwords on all devices (including those that may not have obvious passwords).
•Update hardware with the latest software and consider using an internet hub at home for any smart-home hardware
To read the NBC News article, click here.
October 13, 2016
IRS Scam Alert
Please be aware of a deceptive new scam making the rounds. Taxpayers are sent a phony IRS Form CP 2000, which is typically used by the IRS to identify discrepancies between the income reported on your tax return and the income reported by your employer. The scammers also claim that the correspondence is related to the Affordable Care Act in order to pique your curiosity and interest.
Carefully review email messages that contain attached IRS documents before clicking on any attachments. Also watch for text messages and phone calls promoting the same type of scam.
Please know that the IRS does not initiate taxpayer communications via email or text. Most often, a paper communication is sent through the U.S. Postal Service.
If you receive emails, text messages, or phone calls relating to this topic, do not respond. Contact your tax provider for guidance or call the IRS (1-800-366-4484[IRS%20(1-800-366-4484]) for confirmation. The IRS has also set up a website to report suspicious correspondence – Go to www.tigta.gov[tigta.gov].
May 16, 2016
FBI Releases Article on Ransomware
The Federal Bureau of Investigation (FBI) has released an article addressing the proliferation of ransomware campaigns. Ransomware is a type of malicious software that infects a computer and restricts users' access to it until a ransom is paid to unlock it. Individuals and organizations are discouraged from paying the ransom, as this does not guarantee access will be restored. To read more click here.
March 9, 2016
FDIC Consumer News
A Bank Customer's Guide to Cybersecurity... To read more click here.
December 21, 2015
Securing Your Home Network
US CERT and Homeland Security issue security bulletin... To read more click here.
December 18, 2015
Before You Connect a New Computer to the Internet
US CERT and Homeland Security issue security bulletin... To read more click here.
November 5, 2015
How to Shop Online Securely
"Tis the season to be cautious. The holiday season is close upon us and soon millions of people around the world will looking to buy the perfect gifts..." To read more click here.
October 29, 2015
New Credit Card Chip Technology
Maybe you've gotten a new credit or debit card in the mail or heard something about the U.S. moving to the "Chip and Signature" or "Chip and PIN" standard. To read more click here.
September 3, 2015
What is Ransomware?
The FBI alerts the public about the rise of Ransomware scams to extort money from victims. To read more click here.
August 31, 2015
FBI Public Service Announcement.
E-mail Account Compromise (EAC) is a sophisticated scam that targets the general public and professionals. Examples of EAC are listed and identifies what to do if you are a victim. To read more click here.
August 10, 2015
FBI Public Service Announcement.
The Internet Crime Complaint Center (IC3) recently received an increasing number of complaints from businesses reporting extortion campaigns via e-mail. To read more click here.
July 13, 2015
Securing Merchant Card Payment Systems from the Risks of Remote Access.
This advisory was prepared in collaboration with the Financial Services Information Sharing and Analysis Center (FS---ISAC), the Retail Cyber Intelligence Sharing Center (R---CISC), the United States Secret Service (USSS), and with the support of Visa Inc., and is directed to retailers or companies which are processing financial transactions and managing customer personally identifiable information. To read more click here.
June 18, 2015
Social Engineering Through the Internet
Social engineering refers to the methods attackers use to manipulate people into sharing sensitive information, or taking an action, such as downloading a file. Sometimes a social engineer is able to rely solely on information posted online or will sometimes interact with the victim to persuade the victim to share details or perform an action. Click here to read more.
May 27, 2015
Don't Take the Bait on Phishing Scams
More than 200 billion emails are sent and received worldwide each day. That represents a lot of opportunity for phishing scams, in which scammers distribute emails that appear to come from legitimate organizations or individuals and try to entice the recipient into clicking on malicious links or attachments. Click here to read more.
May 13, 2015
Fraudsters Drain Starbucks Accounts, Attackers Target Loyalty Card, Mobile App Users
When it comes to getting a coffee fix, beware automatic refills.
That's one takeaway from warnings that fraudsters have been successfully exploiting some U.S. and Canadian consumers who use a Starbucks card or the Starbucks mobile payments app to successfully drain hundreds of dollars from their Starbucks accounts... Click here to read more.
May 11, 2015
Business Email Compromise (BEC)
The FBI's Internet Crime Complaint Center (IC3) has issued an alert that reveals a growing threat to commerce by compromised business email accounts. The IC3 notes that the fraudsters perpetrating these scams do their homework before targeting a business and its employees, monitoring and studying their selected victims prior to initiating the fraud. Individuals actually responsible for company wire transfers are usually targeted, the requests are well-worded, requesting typical payment amounts, are industry specific and often don't trigger suspicion. The fraud occurs when the controller, treasurer, or accounting officer at the business receives an e-mail that appears to be from a company executive. The e-mail is a request that a wire transfer be sent.
We have been notified of several local businesses being targets of this scheme.
Go to the FBI’s website for more information and alert your employees about this scam.
Click here for more information.
March 16, 2015
Things You Should Do When Your Email Is Hacked
When this happens the question becomes, "What should I do now?" Click here to read more.
March 4, 2015
Avoiding Online Tax Scams
"It’s tax season, which means it’s also time for tax scams, with numerous online scams that attempt to steal people’s tax refunds, bank accounts, or identities."
October 20, 2014
Ebola Phishing Scams and Malware Campaigns
As coverage for the Ebola virus continues to be highlighted in international, national, and local news and social media, an increased risk for phishing scams and malware campaigns exists for Gladiator customers. Please be aware that cyber actors may leverage the fear and concerns generated by this event to lure users into opening attachments containing malicious code or to click on links directed to websites to collect personal information. Customers should practice safe internet browsing both on personal and corporate computer systems.
Protective measures against phishing scams and malware campaigns include:
- Maintain up to date antivirus software
- Do not follow unsolicited web links in email, text, or chat messages
- Use ad-blocking software to avoid 'malvertising' and potential downloading of malicious content
- Enable "click to play" in your internet browser to avoid automatically playing embedded content on a web page (i.e. news sites, Facebook, etc...)
- Do not open unexpected attachments
- Save and virus scan attachments before opening them
- Do not provide personal or corporate information over the phone, through a website, or via email to unknown persons or to an unsecure web site.
- Verify the identity of the person with whom you are communicating
July 28, 2014
Cyber Security and your Summer Vacation
The summer vacation season is underway and for many of us that means lounging on sunny beaches, reading a book under a shade tree or hitting the road for a new adventure. It can also mean identity theft and other crimes if we aren’t careful about our online activities and protecting our information. Click here to learn more.
July 9, 2014
Tech Support Scams
The bank has received reports of a scam that has successfully targeted Century Bank customers.
Scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need.
Please read the Federal Trade Commission’s Consumer Information Alert on “How Tech Support Scams Work”.
February 6, 2014
US-CERT (United States Computer Emergency Readiness Team) Alert
Sochi 2014 Winter Olympic Games
The Sochi 2014 Winter Olympic Games provide hacktivists with opportunities to create malicious sites and/or social engineer users into downloading malicious software or steal users bank account information.
This Tip provides information for users to be mindful of when visiting websites covering the Olympic Games or those who are traveling to Sochi.
Read the alert at https://www.us-cert.gov/ncas/tips/ST14-001