How to protect yourself from scammers. How to protect yourself from scammers and not lose money? How to protect yourself from scammers

In today's world, people share a lot of personal information online, including credit card and social security numbers. You should learn how to protect yourself from online scammers and hackers. Information is exactly what modern scammers are aiming for and they can completely ruin your life if they get the information they need, so be very careful with your data.

If you are a victim of a scam, please report it.

If you are the victim of an online scam, you need to report it to the police. You can fill out the form on the Online Crime Complaint Center website, as well as other similar websites. The more people report such crimes, the more scammers get arrested. So, you need to protect yourself online, but also be aware of other forms of scams, such as phone scams.

Protect your personal data

Never respond to requests for your personal or bank account information online or over the phone. If you are asked for your insurance number, ask if other information can be provided. Pay attention to compelling messages from banks, charities, and government agencies. Use trusted sources of contact information to confirm requests for information, such as the bank's official website or the phone number on your card.

Don't Share Too Much

Do not post information such as your birthday, mother's maiden name, pet's name, and so on on social networks. Here's how you can protect yourself right now: go to your social media profile and delete any personal information you find there.

Update

Install anti-virus software on your computer and update the databases. Use only the latest version of your browser. Install all patches and updates as soon as they are released.

Increase the difficulty

What else is an easy way to protect yourself online? Your password. Use unique and difficult passwords. Do not enter passwords when using a public wireless network.

Be aware of fake online lotteries and contests

All offers that require payment or personal information from you before you receive your reward are scams. Therefore, you always need to check the legitimacy of each proposal. Ask the sender for contact details and all the necessary information about the company that holds the competition. Once you start asking a lot of questions and demonstrate that you can't be forced to make an instant decision, most scammers will leave you behind.

Get rid of papers

Use e-applications and direct deposit, and pay your bills online.

Don't follow the wave of work-from-home excitement

Thoroughly check the company that offers you work from home by making as many phone calls and Internet inquiries as possible. When in doubt, visit your local law enforcement agency and seek expert advice. All offers to earn money by sending goods sent to your address are fraudulent. Unfortunately, many of these schemes not only make you a victim of a scam, but also make you look like a scam.

Find out what your bank is doing to protect you

You should study the anti-fraud provisions that your bank offers to its customers. All major banks offer credit and debit card protection, and some even officially guarantee the security of online transactions.

Keep track of your finances

Monitor your bank account and the status of your cards every week. Subscribe to alerts that will be sent to you by mail or directly to your phone by your bank. Monitor your private and public information online for unauthorized activity. You can order reports from your bank on the status of your account and your credit or debit card. Additional paid services will allow you to track your credit and personal identification information, social security numbers and online transactions in more detail and more carefully.

Some of the tips may seem elementary to you, but this is where security begins.

Card fraud methods

The imagination of criminals is boundless. Literally every year there are new, more sophisticated methods. Let's consider the main ones.

Fraud with bank cards is called carding.

Let's start with the "classics". You have come to withdraw money from an ATM. Hurry up, literally on the run, enter the PIN-code, while chatting on the phone. You didn't even look at the inconspicuous kid in a baseball cap and dark glasses peering over your shoulder. But he watched you very carefully. He spied and remembered the numbers that you entered. Further elementary GOP stop- and farewell, money.

Also, in the confusion, you can not see that in front of you is not a real ATM, but a fake. After all, the device is exactly like a real one. Stickers, instructions - everything is as it should be. You insert the card, enter the PIN code, and the screen displays: “The device is faulty”, “A system error has occurred”, “Insufficient funds” or something like that. Well, it happens. You go looking for another ATM. But before you find it, the scammers will empty your account. After all, with the help phantom ATM they have already read all the necessary data about your card.

Often imitate ATM malfunction. For example, late in the evening you return home and decide to cash out your salary on the way. We inserted the card, entered the PIN code, the amount - everything is going fine. The card capture reader gave out the card, but the tray where the money should appear does not open. Broken? Maybe! It's dark around, you need to call the bank and find out what happened. You walked literally ten meters away, and smart thieves had already peeled off the adhesive tape and took your money. Yes, yes, simple adhesive tape did not issue bills.

Another approach is called "Lebanese loop". This is when a lasso from photographic film is inserted into the card reader. If you hit him, the card can no longer be pulled out. As a rule, there is an “assistant” right there: “Yesterday, the ATM ate my card in exactly the same way, I entered this combination and PIN code, and it all worked.” You try, fail, and go to the bank for help. At this time, the Good Samaritan takes the card and goes to empty it. He knows the PIN. You yourself have just entered it openly. Remember?

However, an ATM can be real and even serviceable. This is not a problem if attackers have skimmer. This is a device for reading information encoded on the magnetic stripe of the card. Physically, the skimmer is an overhead block attached to the card reader, while it looks like part of the ATM structure.

On the left - an ATM without a skimmer, on the right - with a skimmer

With the help of a transmitter, fraudsters receive information from the skimmer and make fake cards. They will use the skimmed card, but the money will be debited from the original account. Hence the name of the method - skimming, from the English "skim cream".

How do they know the PIN? In addition to the skimmer, they have other devices. For example, overlay keyboard. It completely imitates the real one, but at the same time remembers the key combinations you type.


Keyboard overlay

As an option - a miniature camera aimed at the keyboard and disguised as a box with advertising booklets.


Hidden camera

Type of skimming shimming. Instead of bulky overlays, a thin elegant board is used, which is inserted through the card reader directly into the ATM. Further, the scheme is the same as with skimming. But the degree of danger is higher: it is almost impossible to see that there is a “bug” in the ATM. It is consoling, however, that it is rather difficult to make a shim - its thickness should not exceed 0.1 mm. Almost nanotechnology. :)

Phishing- a common method of Internet fraud. Most of you don't need to explain what it is. Perhaps someone even received a “letter from the bank” with a request to follow the link and clarify the details. Moreover, the phishing page looked like a real one, the same colors, fonts, logos, except for an annoying “typo” in the address bar.

Recently, a subspecies of phishing has been spreading more and more - vishing. Simply put, divorce over the phone. Fraudsters simulate an autoinformer call. A frightening robotic voice informs you that your card has been blocked or hacked, or you urgently need to pay off your loan debt. Call this number for details. You call, and the polite "operator" asks you to "verify" the card number, its expiration date, verification code ... Once you have dictated the last digit, you can say goodbye to your money. By the time you come to your senses, they will already be spent in some online store.

By the way, due to the fact that it is not necessary to have a physical card to use it, fraudsters are increasingly using methods social engineering. So I almost got scammed.

I sold furniture. Placed an ad with photos on a well-known site. I specified a number through which no authentication passes for me. Soon a man called. He introduced himself as Vasily, an employee of a company that rents apartments for rent. He said that they liked my sofa - they take it without looking! The money will be transferred to my card right now. No problem. I often buy on the Internet, for this purpose I have a special card. There was nothing to write off from her then, but replenish - please. But one number was not enough for the caller - the interlocutor asked for another expiration date and CVV2. I did not name, but Vasily was offended. He told me who I was and where I needed to go, and hung up.

Most cards are now tied to a phone number in order to confirm transactions using SMS messages or, for example, logging into the Internet bank. What attackers don’t do to get hold of the right SIM card: they steal phones, intercept SMS, make duplicate SIMs, and so on.

Safety rules when using cards

Having issued a debit or credit card at the bank, we receive a banking service agreement and an envelope with a PIN code. It is a pity that, in addition to this set, they do not include a memo with elementary security rules for cardholders. It should include the following recommendations.

  • If possible, make yourself a hybrid card - with a chip and a magnetic stripe (unfortunately, cards with a chip only are almost never used in Russia). Such a card is better protected from hacking and forgery by skimming.
  • Learn the PIN code by heart. If there is no hope for memory, write it down on a piece of paper, but keep it separately from the card.
  • Never, under any circumstances, disclose to third parties the PIN code and CVV2 code of the card, as well as its validity period and to whom it is registered. No bank will ask you for these details. And to credit funds to your account, only the 16-digit number indicated on the front of the card is enough.
  • Do not use so-called salary cards for payments in stores and online purchases. It is better to transfer money from a card account to a personal account or set daily limits for all types of transactions performed.
  • Choose ATMs located inside bank offices or at secure points equipped with video surveillance systems.
  • Do not use suspicious ATM models. And before inserting the card into the terminal, carefully inspect it. Is there anything suspicious on the keyboard or in the card reader? Is there a strange advertising tray hanging nearby?
  • Feel free to cover the keyboard with your hand and ask especially curious comrades in line to step aside. If problems arise, do not use the advice of "random assistants" - without leaving anywhere, immediately call the bank and block the card.
  • If you have lost your card, and also if you have reason to believe that third parties have learned its details, immediately contact the bank and block it.

It's easiest to call. If you have the card in your hands, you can see the support number on the back of the card. As a rule, contact centers work around the clock. If the card is left in the ATM and you do not know the phone number of your bank, call the ATM maintenance company. The number must be indicated on the terminal.

In addition, find out about the possibilities and conditions of card insurance at your bank. Some credit institutions have special programs to protect customers from fraudsters and reimburse them for damages.

Banking safety rules

You can take advantage of a large package of services without leaving your home. For example, pay for something or transfer money to your own or someone else's account.

Banking - remote banking service.

Allocate Internet and SMS banking. The first allows you to carry out transactions through the client's personal account on the bank's website or through the application, and the second involves informing about transactions via SMS messages.

In order to use banking without the risk of losing money, the following basic precautions must be observed.

  • Do not log into the Internet Bank from other people's computers or from public unsecured networks. If this still happened, at the end of the session, click "Exit" and clear the cache.
  • Install an antivirus on your personal computer and update it in a timely manner. Use modern versions of your browser and email programs.
  • Do not download files received from unverified sources, do not follow untrusted links. Do not open suspicious emails and block the sender immediately.
  • Unless necessary, do not enter any of your personal data, in addition to your login and password.
  • Check your address bar. A secure HTTPS connection must be used. And the slightest mismatch with the bank's domain almost certainly means that you are on a phishing site.
  • Come up with a complex password to enter your personal account, and also use one-time passwords requested by banks to confirm actions in your personal account.

Remember! Banks do not send messages about blocking cards, and in a telephone conversation they do not ask for confidential information and codes associated with customer cards.

To protect the SIM card to which the card is linked, promptly notify the bank when you receive suspicious messages and in no case call the numbers indicated in them. Inform the bank if you have changed your number or lost your SIM card. Set a password on your phone and do not remove the block from the screen if someone else is watching your actions. And if the SIM card is issued to you personally, then prohibit its replacement by proxy.

What to do if scammers deducted money from the card

Disputes between customers and banks are not uncommon. The former, having learned about the unauthorized debiting of funds from their accounts, ask to return their hard-earned money, and the latter often shrug: “You yourself told the scammers everything.”

In 2011, Federal Law No. 161 “On the National Payment System” came into force, designed to streamline and change for the better the practice of providing payment services. In particular, he established the legal foundations for the entire payment system as a whole and adjusted the rules for non-cash payments, as well as the issuance and use of electronic money.

In 2014, article 9 of this law came into force. The norm protects bank card users from fraud. The law establishes the presumption of innocence of clients. The Bank is obliged to reimburse the amounts transferred from the client's account as a result of an operation not authorized by him, unless it is proved that the client himself violated the procedure for using the electronic payment instrument.

From September 26, 2018, banks will legally be able to block customer cards if they suspect that fraudsters are transferring money from them. After blocking, the bank must inform the account holder about this, and he will either have to confirm the operation or report an attempted theft.

In other words, the law delimits the responsibility of the bank and the client.

  1. Did the bank inform the customer about the unauthorized transaction? If not, the responsibility lies entirely with the bank. If informed, go to point number 2.
  2. Did the client inform the bank no later than the next working day after the notification from the bank that this operation was performed without his (client's) consent? If not, the responsibility lies with the customer. If informed, go to point number 3.
  3. Was the bank able to prove that the client violated the procedure for using electronic money? If so, the responsibility lies with the client. If not, the bank is fully responsible and is obliged to reimburse the client for the entire amount of the disputed transaction.

A prerequisite for the reimbursement of unauthorized debited funds is to notify the bank about the use of the card without the consent of its holder.

Tell the bank that the card is being used by someone else no later than one day following the day the customer discovered the fraud.

Meeting this deadline is very important. Overdue - you can not count on a refund.

In addition, the client must have proof of the notification in his hands. We are talking about the second copy of the appeal to the bank with a note of acceptance made by an authorized employee, or a written notification of sending a valuable registered letter with a list of attachments to the bank's address.

Contacting the bank does not cancel or replace the appeal to law enforcement agencies.

conclusions

So, a brief algorithm of actions in case of illegal debiting of funds from a bank card is as follows:

  1. Do not panic, call the bank and block the card. Plus, we ask the operator to name the account balance and the last transactions made.
  2. During the day we run to the bank and write a statement. Be sure to endorse our copy of the application with an authorized employee of the bank.
  3. If the employees of the credit institution in any way prevent this and refuse to accept the application (the forms have run out, the technical break, and so on), we turn to the prosecutor's office.
  4. We write a statement to the police. Especially if you are faced with robbery or robbery.
  5. We are waiting for a refund.

If the bank refuses to refund funds debited from the card, referring, for example, to a violation of the procedure for using electronic money, you can defend your rights in court.

When concluding various transactions, making payment transactions and other things, you should protect your data and not disclose it to third parties unnecessarily. To understand how not to become a victim of scammers, a number of rules developed by professional lawyers will help. To date, fraud carried out via the Internet is especially developed.

People have been victims of scammers for a long period of time. This category of illegal acts is widespread all over the world. The amount of punishment is provided for by regulations issued at the state level.

Speaking about the reason why the number of committed scams is increasing, it is worth noting that the standard of living of the population in the country plays a big role in this issue. The richer the state and the wealthier the people, the lower the number of crimes under consideration. In countries where the level of GDP per person is high, there are fewer cases of cheating. These include Denmark, Switzerland, Luxembourg and others.

In our country, the growth in the number of swindlers is associated with a crisis in the economy. People were left without jobs, which prompted them to commit illegal acts. Also, the reason for the growth of fraud is the development of technology and payment for goods and services made using money transfers. When choosing a site where you want to buy an item, you need to make sure that it is safe.

You can protect yourself from deception by knowing the schemes through which scammers operate. Here are the most common ones:

    The child got into an accident, committed a crime and so on. This method is associated with the provision of psychological pressure on the victim. Fraudsters inform parents that their child is in an unpleasant situation, from which you can get out by depositing a certain amount of money to the “victims”. The instinct of self-preservation is triggered, and parents seek to protect the child by giving money to swindlers. The easiest way to recognize deception is to call the child's number and find out if everything is in order.

    Together with the loan agreement, a contract for the sale of housing is drawn up. Before signing the documentation related to the loan, you need to carefully check and re-read the contract. This type of fraud is common in the microcredit industry. The fraudster gives the victim a package of papers for signing, including a sale and purchase agreement and a receipt for receiving funds, after which the real estate is re-registered to another person.

    On sites where ads are posted, they ask you to make an advance payment. You can protect yourself from a fraudster by not disclosing your bank card details and other personal information. In a situation where a person submits an advertisement for the sale of something, he receives a call from a person who wants to purchase the item and offers to make an advance payment on the card. The victim reports the card details for transfer, after which funds are debited from his account.

    They ask to borrow money, promising to return it tomorrow. Reception is used in social networks, through SMS messages, calls. They introduce themselves as acquaintances, friends, relatives and ask to send money to the card. For this purpose, accounts are often hacked. You can recognize deception by making a call to a person who asks for help.

    They ask you to transfer a certain amount in order to earn or win a prize. Attackers call a person and say that he won an expensive item and in order to get it, you need to pay a small amount. They may also say that there is a highly paid position and invite you, saying that initially you need to pay some financial expenses. In this case, you can protect yourself by not sending money to strangers.

    Transfer of funds from one Pension Fund to another. Recognizing fraud here is difficult for those who do not understand this area, so you need to consult a lawyer before changing the fund.

Important! Remember that scammers can commit crimes not only in real life, but also via the Internet.

The victims of fraudsters are those who do not have sufficient protection - these are retired persons who are disabled. There are several reasons for this:

    Fraudsters are well versed in psychology, which allows them to manipulate people. It is difficult for a gullible person to distinguish a lie from the truth, so he falls into the street of a scammer.

    It is more difficult for older people to protect themselves because they are poorly versed in modern technology and do not know that it is necessary to protect information.

    It is easier for them to become victims because at the time when they were growing up (under the USSR), there were fewer crimes, therefore they are more gullible than today's youth. It is possible to determine that a crime is being committed against you, and you can avoid becoming a victim under the following conditions:

    1. Protect your information. You must take steps to avoid sharing your confidential information.

      Be careful with payment systems.

      Make sure that your electronic data is kept secure.

      Ask for documents before letting medical workers, police officers and other representatives of government agencies into the apartment. This is especially true when they come to you without an invitation.

      Avoid gambling and predicting the future.

      Be careful about calls from strangers.

      Don't trust strangers.

    If you follow these precautions, you can almost completely protect against scammers. However, you need to remember that new schemes of deception can be invented, so always be careful.

A plastic bank card is a universal means of payment. It provides round-the-clock access to the money contained in your current account. Plastic cards can be debit and credit. This article will discuss how to protect yourself from fraud.

More about cards

The plastic card itself does not contain cash. All of them are on the account of the owner. A piece of plastic is just a means of access to this money.

On the outside of the card, the details of the owner are indicated, which are necessary for the bank to identify him and make a decision on carrying out the requested transactions. To use the card, its physical presence is not necessary. It will be enough to specify the details.

Ways to access cards

Card fraud can occur in one of two ways.

1. Using a stolen or counterfeit card, goods are purchased for subsequent resale.

2. With the help of various tricks, attackers gain access to the ATM, account details and pin code.

An ATM or ATM (automated telling (teller) machine) was created to simplify operations for issuing, receiving, transferring cash, paying for services and other financial transactions, without the participation of an employee of a credit institution. At the same time, you can use these services at any time of the day. Simplicity, convenience and direct access to cash have made ATMs in demand and popular among the population, and, consequently, among criminals.

Fraud with bank cards occurs through hacker attacks aimed at ATMs. It is also possible to do this by copying information from the magnetic strip of the card, setting traps for banknotes, which leads to the disappearance of money or the issuance of not the entire requested amount from the ATM.

A lost or stolen plastic card that has fallen into the hands of fraudsters can threaten its owner with debiting all funds on the account. The same applies to a fake bank card, which is made in the name of a specific person whose account has funds.

Types of card fraud

Today, it is desirable for every citizen to get acquainted with this information. Card fraud includes many different types of tricks and deception.

Fake - the manufacture of plastic with identical details of the real card of the real owner. This trick allows you to perform any operation. To save itself from fakes, the bank sets up protection against the selection of details. The development of methods for stealing money from cards has made this method less cost-effective. Now the easier option is to steal props.

Phishing is a theft method by which fraudsters contact the cardholder on behalf of the bank through various means of communication (phone, email, etc.). Their purpose is to find out the confidential data of the owner. Phone phishing is a very common type of theft. So the cardholder receives a call, most often a message with information that a payment has been made from the account, the debt needs to be paid off, the card has been blocked, etc. The call is made automatically and is voiced by an electronic voice with frightening information, without specifying the data on the financial institution from which the message comes. After that, for more information, you will need to contact the operator. The same text is indicated in SMS and e-mail messages. During a call to the indicated number, the operator tries to find out confidential information, which will subsequently allow criminals to empty plastic cards. Skimming fraud allows data to be copied using a special device installed on an ATM.

Theft of card details from the servers of online stores, which are required not to store data about their owner. But this is often not followed. What scammers successfully use.

Sometimes unscrupulous bank employees themselves provide criminals with card data. Or due to the negligence of the staff, this information becomes the property of intruders.

With the help of special equipment, fraudsters hack the card along with the pin code while using an ATM using special devices (micro cameras, overhead keyboards, card readers). Such equipment reads details and entered passwords.

The use of fake ATMs also allows you to empty plastic cards. Fraud is carried out by the "Lebanese loop" method. This option allows criminals to take possession of someone else's card. To do this, fraudsters place a piece of photographic film in the slot of the reader, which prevents the card from leaving the slot after the operation is completed. Nearby are attackers offering to enter a pin code, assuring that after this action the card will come out. After unsuccessful attempts, the scammers convince the owner to contact the bank the next day, when collectors and engineers are working, and nothing will happen until that time. You can safely leave the card. When the owner leaves the ATM, the scammers remove the film and card. They withdraw all funds.

Fraud with bank cards also occurs by conducting a CNP transaction, that is, an operation performed on the Internet based on the details received. The owner himself and his bank plastic are not involved in this.

Carrying out operations on stolen or lost cards, which takes place between the specified events and the blocking of plastic. Also, many forgetful people write down their pin code on the card itself, on some piece of paper or in a notebook. When a bag with a wallet is stolen or lost, fraudsters become the owners of not only the entire contents, but also money from a personal account.

Acquiring is a method in which a slip is repeated. You can also change its content. To do this, several slips or prints of cards are made on the electronic terminal on the imprinter. This is necessary in order to be able to change the transaction amount or create new payment documents after the client has signed the slip.

The return of the purchase threatens the owner of the bank card to go negative. To do this, a scammer, hacker or an employee of the merchant where the client made the purchase conducts a refund operation, which increases the balance of the card. The attacker then uses the credited funds. The merchant is revoking the return. After that, the client remains in the red.

What to do when you discover the first signs of fraud?

Fraud using payment cards is a very common phenomenon. Any owner of a plastic device can become its victim. Therefore, at the first suspicions, it is necessary to immediately block the card. And at the bank, you can write a statement of disagreement with the operation, indicating the reason, if this happened without your knowledge.

Fraud with Sberbank cards

The plastic devices of this institution are very often subjected to various attacks by scammers. The most common methods of theft are SMS messages with the text that the card is blocked, and to resume functioning, you need to call the specified number. Such text notifications can be received by thousands of Sberbank card users. Do not forget that all messages sent by Sberbank come from one number. If the notification is from another addressee, these are criminals.

PrivatBank

Fraud with PrivatBank cards is most often carried out using a skimmer. So that when entering a pin code, attackers do not see the numbers through a pre-installed camera, it is necessary to close the dialed combination with the palm of your hand.

Another way is "emergency money", which allows fraudsters to find out the code that came in an SMS message to the card owner, which the account owner himself (not suspecting a trick) dictates to them over the phone. This is a common occurrence when shopping online.

Fraud with "Corn" cards

Criminals often use another interesting way to steal money, which uses the Corn card. Fraud occurs by creating an online store, allegedly from Euroset, where you can make a purchase much cheaper than in the salon itself. Plus there are bonuses. To make a purchase, the consultant needs to dictate his full name, date of birth, barcode of the card, the secret word that came in a text message, that is, the data that should never be spoken. After that, money is debited from the card account, and the account holder is left without a purchase.

Who will return the stolen money?

The return of funds stolen by scammers occurs after an investigation, which should establish some facts.

1. Is it the owner himself who spent his savings, and then decided to return them?

2. ATM or bank error?

3. Or is it the tricks of scammers?

If it is established that the money was debited through no fault of the cardholder, then the stolen amount will be reimbursed to him. The issuer is obliged to return it, which is usually in no hurry to do so. The burden of reimbursement rests with the merchant or acquirer. While the participants understand who should return the losses and who is to blame, the cardholder can wait for his funds for a very long time. In order not to delay with compensation, the payment system acts as a regulatory body, which forms uniform rules for all participants, terms and algorithm of behavior.

Account Theft Investigation Process

Fraud with credit cards, as well as with debit plastic devices, occurs by the same methods. This means that the investigation to identify the perpetrator of the theft takes place according to a single scheme.

First, the acquirer (owner of the ATM) presents the debited amount, which the holder disputes. The issuer (bank) requires the acquirer to provide documents. They must confirm the legitimacy of debiting funds. Thirty days are allotted for this. Within the established period, the acquirer provides the requested documents, and the account holder also familiarizes himself with them. If the client agrees and confirms the fact of the operation, then the issue is considered resolved, and the investigation is terminated. If the acquirer provided documents drawn up with violations or neglected the deadlines, then the amount is debited from his account in favor of the bank (issuer), after which the fact of withdrawal is argued and the reason for the legality is indicated. At this stage, the money will not be returned to the owner. After the write-off, within forty-five days, if no action was taken by the acquirer, the stolen amount is credited to the account of the owner of the payment card.

There are situations when the owner of the ATM did not properly respond to the issuer's demand for the provision of documents, since he believes that neither he nor the outlet is to blame for the theft, therefore, they are not obliged to bear responsibility for this. In this case, the investigation is carried out in a different way.

An amount similar to the stolen funds is debited from the issuer's account by the acquirer. This is documented. After that, the issuer must prove his innocence to the acquirer. If this fails, then the ATM owner returns the stolen amount to the cardholder.

There are times when the acquirer's arguments turn out to be unconvincing or do not fully prove his case. In such situations, the responsibility for the theft falls on several parties to the process, and the investigation takes place through a pre-arbitral settlement. To do this, the issuer submits an application for consideration of the case within sixty days from the date of the chargeback. In the process, the acquirer and the issuer act, who prove their case by providing arguments and evidence. If the parties have reached an agreement, the payment of damages occurs equally, if not, then the case is referred to the arbitration committee. It is a commission for the payment system. The Committee considers all the arguments and evidence of the parties, and then draws a conclusion. The decision of the arbitration committee is binding. If the parties do not agree with the decision, an appeal is filed, but the amount of theft in this case must be at least five thousand dollars.

ATM Fraud Investigation Process

Fraud with payment cards related to transactions carried out through ATMs is undergoing different stages of investigation. If the ATM issuer sends a request to the acquirer, who must check the possibility of technical failures in servicing a particular account or the presence of incorrect distribution of banknotes. This situation is not a scam.

In the event that a fraudulent transaction is carried out using an ATM, for example, cash withdrawal, one issuer or together with the acquirer takes part in the investigation. The guilt of the cardholder and points of compromise are being clarified. For most of these cases, the issuer is responsible, so he anticipates such risks in order to compensate the cardholder for theft with compensation from the insurance company.

Banks' fight against fraud

Credit card fraud has meant that many institutions have to fight against criminals. But they are not always successful with this.

For example, to combat skimming, the protection of SRK+ technology from TMD Security is most often used. This company is a leader among the creators of ATM skimming protection. The success of the technology is explained by the fact that special protection is installed from the inside, fits all types of ATMs and is easy to mount.

The transition of ATMs to Microsoft Windows operating systems, the Intel elementary base using TCP / IP protocols, on the contrary, significantly increases the risk of attacks. For this purpose, fraudsters carry out targeted (targeted) attacks.

Now more and more often criminals resort to the help of various programs to gain access to payment cards. They are entered into ATMs. After that, the program itself will collect all the necessary information about the operations. Such an ATM is no different from a normal ATM. Therefore, it is impossible for an ordinary person to recognize him.

Bank card fraud can be prevented by installing special security features on the ATM. They are an alarm on the doors of the service area and a program that provides information protection.

How to protect yourself from scammers?

Fraud with credit cards or debit plastic devices is now a very common occurrence. Therefore, steps must be taken to minimize the risk of theft of funds. For this, the following rules must be observed.

1. Do not tell anyone your PIN code, do not write it down on a card, notepad, etc.

2. Do not transfer your card to another person.

3. Make purchases in trusted stores.

4. Cover the keyboard with your hand while entering a personal code.

5. Do not provide imaginary bank employees with card details.

6. Do not tell the password that came in a message to the phone.

7. In case of loss or loss of the card, you must have a number in your mobile phone by which it can be urgently blocked.

Currently, all new types of fraud with bank cards and methods of protection against theft are being invented. Therefore, in addition to the precautions provided by the issuer, merchant or acquirer, you must yourself comply with all security requirements.

To avoid becoming a victim of scammers , listen to our advice:

- Keep the law, remember that any dubious transaction is fraught with sad consequences.

- beware strangers(usually very talkative), from the threshold offering you a good deal or selling goods at a reduced price (it may be stolen or of poor quality). An important signal of danger is the feeling that you are unexpectedly and incredibly lucky. Be a skeptic, do not believe explanations that seem convincing at first glance ("exhibition party", "we are selling everything and finishing trading", "partners have no time to wait", "today is the chef's anniversary", etc.). Don’t be fascinated by refined manners, excessive charm, foreign cars or special vehicles, business cards (the data on which often do not correspond to reality), or “connections” with high-ranking people, etc., etc.

Concluding an agreement with the company, demand so that guarantees are provided by its founders. If you suspect that letterheads and seals are fake, check their authenticity at the bank branch or at the organization that is the founder of the company. Feel free to ask questions and do not react to indignation from the opposite side. Better to be safe than to be robbed.

- Don't play in gambling (lotteries, cards, thimbles, etc.). It will not be possible to outplay the specialists in swindling simpletons: by giving the opportunity to win a little and awakening the excitement, they will take everything from you.

- Don't sell goods to strangers, especially expensive ones (cars, video equipment, etc.): instead of money, they can give you a “doll” (a pack of colored paper) or simply take away the money. Nevertheless, having decided on such a deal, do not allow buyers to enter the passage yards, construction sites, houses with an emergency exit or a service entrance, as in these places it is possible to hide unnoticed.

In the process of making a transaction with strangers, never don't pass they have money in their hands even for the shortest time, no matter how plausible the pretext may be.

When advertising in the newspaper for the sale or purchase of valuables, never do not give your address or phone; indicate the pager number or poste restante address (PO box in the post office) so as not to become a victim of a robbery.

It is better not to buy valuable things from your hands alone. Check the packaged goods before paying and do not give them back to the seller so that the purchase is not changed at the time of settlement.

- Do not buy and do not sell currency with your hands. Use the services of a bank or an exchange office.

lending money, take written receipts: they can come in handy if in the future there will be a need to go to court.

- Take your time pick up a wallet with money that suddenly appeared at your feet. If at this moment a person approaches you and starts a conversation about the find, immediately step aside. Will pester - say that contact the police.

What to do if you are a victim of a scam?

Immediately report the incident to the police, indicate the signs of the criminals. To initiate a criminal case on the fact of fraud, you need to write a statement addressed to the head of the department. We advise you to contact the police, even if the transaction was illegal, otherwise you later risk becoming a victim of blackmail by the people who deceived you.

Vylegzhanina, Ulyana. Cyberspruit: more and more new ways of withdrawing money from the population are being invented / U. Vylegzhanina // Rossiyskaya Gazeta Nedelya. - 2010. - September 16/22 (No. 209). - S. 5.

Gostyushin, A.V. The ABC of Survival. Man in emergency. Extreme medicine / A. V. Gostyushin, S. I. Shubina. - M.: Knowledge, 1995. - 270 p.

Grekova, Elena. Automatic money: how not to fall for the bait of scammers using payment terminals / E. Grekova // Rossiyskaya Gazeta Nedelya. - 2009. - August 13/19 (No. 150). - S. 5.

Mindfulness is the best weapon in the fight against fraudsters: [about mobile fraud] // Rossiyskaya Gazeta. - 2010. - March 17 (No. 54). - S. 5.

Ermolov, Yuri. Mobile self-defense: protection against fraudsters in mobile networks / Yu. Ermolov // World of PC: a magazine for users of personal computers. - 2010. - No. 3. - S. 67.

McNab, Chris. Survival in the city = The handbook of urban survival: a guide / K. McNab, D. Rebaiger; per. V. N. Egorova. - M. : FAIR-PRESS, 2004. - 327 p. : ill. - (On the verge of extreme).

Simonson, J. L. 76 ways to protect your child from criminals / J. L. Simonson, J. McCall; per. V. Andreev. - St. Petersburg. : Peter Press, 1995. - 192 p.

Encyclopedia for children / editor-in-chief V.Volodin. - Personal safety: Precautions in daily life. Behavior in extreme situations / ed. : V. Volodin. - M., 2001. - 447 p. : ill.

Call and order books in any library of the city! (738084)