Just How Safe Is Online Banking?

More and more people are choosing the convenience of banking online. But is it safe? What can you do to make sure your bank account isn't emptied by fraudsters?

Fraud is a constantly evolving problem but, broadly speaking, these are the main ways scammers can actually get their hands on your money:

1.    Remote purchase or ‘card not present’ fraud

By far the most common type of fraud, with losses of £398.2m in 2015, remote purchase is when card details are stolen, for example, through a computer virus or an unsolicited email/phone call. See 6. Phishing and Vishing, and used to buy things online, by phone or mail order.

2.    Counterfeit (cloned/skimmed) fraud

When a fake card is set up using stolen details from the magnetic stripe on a card. Crooks can use the cloned card in countries where chip and Pin isn’t available, such as the US.

3.    Fraud on lost or stolen cards

These can be used online, over the phone or in shops that don’t have chip and Pin. Criminals also ‘shoulder surf’ to watch people enter their Pin and then use it more widely. Read about your rights if your card has been lost or stolen. 

4.    Card identity theft

This takes two forms: account takeover, where a fraudster infiltrates an existing account to order a new card and Pin, and application fraud, setting up a new account using stolen details. 

5.    Card non-receipt

When fraudsters steal post to intercept a new/replacement card, then use it to commit card fraud and ID theft. Anyone with a communal letterbox is at greater risk of this type of fraud. Take our test to see if you're at risk of identity theft. 

6.    Phishing/Vishing

Phishing emails are sent by criminals posing as genuine companies such as a bank or HMRC. Clicking on a link takes you to a fake website where fraudsters steal financial or personal details. You type in your security details, thinking they’re secure, and unwittingly pass them on to thieves.

Or, the link might install malicious software, malware, on your computer as another means to capture details. Thieves can steal your password by tricking you into installing a program on your computer that records what you type, so when you next log on to your online account, the program secretly records your password details. It then sends them to a thief over the Internet. 

Telephone fraud, or vishing, is particularly sneaky. Fraudsters call up pretending to be the police or your bank’s fraud department and warn you that your account has been compromised to trick you into moving your money somewhere ‘safe’. Some tell you to call the genuine number for your bank to ‘verify’ the call, then play a dialing tone while they stay on the line, before posing as your bank and conning you into giving them sensitive information. 

Protecting your online bank account

The two key ways thieves can access online bank accounts are through phishing and password theft, but it’s easy to protect yourself from these and other scams.  

Common sense is the best protection against phishing scams. Don’t click on any links in emails that say they’re from your bank. Instead, type your bank’s full website address into your browser. If you want to double-check if a message is genuine, ring your bank.

Good security software will protect your computer against malicious software, as will not opening any email attachments you're not expecting and avoiding downloading files from websites you don’t trust.

Know your rights: Think you may have given a fraudster your bank details? Find out what to do.

If you're a victim of online bank fraud

You should regularly check your account online to pick up on any irregularities and contact your bank as soon as possible if you think you've been a victim of fraud. Your bank is responsible for passing details of the fraud to the police.

Your bank must refund the amount of the transaction and restore your account to the state it would have been in had the transaction not be made, unless it can prove that you've acted fraudulently or been grossly negligent. Importantly, you don't have to prove that you didn't authorise the transaction.  

Which:            Hackers Target All The Major UK Banks:               Big Hack At Tesco Bank – Money Vanished:
 

« Yes, Russia Weaponised Social Media In The US Elections
Banks Plan To Hoard Bitcoins »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Nihon Cyber Defense

Nihon Cyber Defense

Nihon Cyber Defence’s mission is to provide robust solutions, services and support to governments, corporates and organisations in order to protect them from all forms of cyber warfare.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Cyabra

Cyabra

Cyabra is leading the fight against disinformation. Our AI shields companies and the public sector by uncovering malicious actors, bot networks, and GenAI content.