- Recent Fraud Alerts
- Heartbleed Bug FAQs
- Secure Email Awareness Program
- 5 Tips to Stay Safe on Public Wi-Fi
- Calculate your Online Identity Risk Score
- OnGuard Online Web Site Provides Valuable Online Security Info
- Social Engineering - Phishing, Vishing and Smishing!!!
- FBI Fraud Alert - Don't Get Scammed!
- Identity Theft -- What Is It and What to Do
- Protect Yourself and Your Computer
- Government Agency Links
- Visit the Business Fraud Education Center
Security Breach at Home Depot® Stores:
The security of the payment card system of Home Depot has been breached. The unauthorized access impacts customers who made credit or debit card purchases in their U.S. and Canadian stores from April 2014 to September 7, 2014. If you want more details on the compromise, please see Home Depot’s website (www.homedepot.com) or to call Home Depot (1-800-HOMEDEPOT) for more information.
QNB Bank takes your financial security very seriously. If you performed a transaction with your QNB Visa Check Card during the time frame noted above, your card information has been compromised which could result in unauthorized transactions being performed.
We believe it prudent to close the card as a precautionary measure. This will minimize the risk of any unauthorized transactions being charged to your account. If you used your QNB Visa Check Card at Home Depot during the time frame noted, please visit your local QNB branch at your earliest convenience where a Customer Service Representative will process your request for a replacement card. There will be no fee to replace your QNB Visa Check Card.
If you used your credit card at Home Depot during the time frame noted, please contact your credit card issuer at the number provided on your credit card.
We will be notifying QNB customers in an effort to expedite the closing of the at-risk cards. Contact our Customer Service Center at 215-538-5605 if you have any questions
Microsoft Internet Explorer Vulnerability
QNB would like to make you aware of recent news regarding a Microsoft Internet Explorer vulnerability. The vulnerability affects all versions of Internet Explorer (IE), from IE6 - IE11. The US Department of Homeland Security is advising people to avoid using Internet Explorer for web browsing until Microsoft has issued a patch.
We, here at QNB, would like to let you know that QNB-Online is compatible with other browsers like Chrome, Safari or Firefox.
For more information on the Microsoft Internet Explorer security flaw please see Microsoft Corp. website, the US Department of Homeland Security website or contact your local technical support company.
Message for Consumer Hacking Victims
The Consumer Financial Protection Bureau has posted a Blog article listing four steps consumers can take to determine if fraudulent charges or debits have been made on their accounts. The Bureau also released a Consumer Advisory to help consumers protect themselves in the wake of the recent breaches of payment card and other data.
Heartbleed Bug – Open SSL Vulnerability FAQ’s
Although QNB-Online is not affected by the Heartbleed bug, we thought our customers might be interested in the following FAQs.
What is the “Heartbleed” bug?
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This vulnerability could be exploited to steal the information normally protected by OpenSSL, which could include user id, password and “keys” that identify and verify that you are transacting with the correct online service provider. The bug only affects a certain version of OpenSSL, so not all websites are vulnerable.
For more technical information on this topic please see: http://heartbleed.com/
How do I know if a site uses OpenSSL?
Many websites you go to, you’ll see a padlock icon in the address bar of the browser, and a website address beginning with "https". This indicates that OpenSSL may be used by that provider. Again, the bug only affects a certain version of OpenSSL, so not all websites are vulnerable. Please check with the company that owns the website.
Is QNB-Online affected by the Heartbleed bug?
No, QNB-Online is not affected by the Heartbleed vulnerability. QNB-Online does not use the affected version of OpenSSL, nor have we ever used the affected version in the past.
Is my bank account information safe?
Yes, bank’s use many different systems to protect customers’ information including rigorous security standards, encryption, and fraud detection software. Banks are also monitoring your accounts; consumers are protected from unauthorized transactions. If you see any unusual activity in your QNB accounts, please contact us immediately at 1-800-491-9070.
Do I have to change my password?
At this time, QNB won’t require you to change your password since our online banking site was not affected by this security flaw. Generally, you should use a unique user id and password for each online banking or other financial transaction websites. If you have been using the same user id or password at QNB-Online and other websites, we strongly advise you to change your online banking information to something unique to only your online banking services.
Read about our new email security service from Zixcorp. Learn how to register to receive messages from us.
Just click here for a step-by-step guide: Guide to Zixcorp Secure Email
Check out this great article by Kim Komando that appeared in USA Today. These are great tips to follow to protect yourself while accessing public Wi-Fi.
Read the article 5 Tips to Stay Safe on Public Wi-Fi
This tool is sponsored by StaySafeOnline.org from the National Cyber Security Alliance. It gives insight into understanding your current level of exposure to online identity theft, as well as helpful preventive tips.
OnGuardOnline.gov is the federal government’s website to help you be safe, secure and responsible online.
The Federal Trade Commission manages OnGuardOnline.gov, in partnership with the federal agencies listed below. OnGuardOnline.gov is a partner in the Stop Think Connect campaign, led by the Department of Homeland Security, and part of the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology.
Click the following link to access OnGuard Online: OnGuardOnline.gov.
Social Engineering is the act of manipulating people into performing actions or divulging confidential information. The term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.
Types of Social Engineering
“Phishing” is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication or email.
1. A criminal will send email messages to a list of email addresses stolen from a financial institution.
2. The email messages alert the consumer that their credit card has had fraudulent activity or that their bank account has had unusual activity.
3. The email message instructs the victims to call a phone number or click on a link to visit a website where their personal information is requested.
4. Once the victim calls the phone number in the text message or visits the website and provides the information requested, the “Phisher” has the information necessary to make fraudulent use of the card or access the account.
“Vishing” is a combination of Voice and phISHING. Vishing is the criminal practice of using social engineering over the public telephone system.
1. A criminal will call a list of phone numbers stolen from a financial institution.
2. When the victim answers the phone, an automated message is played to alert the consumer that their credit card has had fraudulent activity or that their bank account has had unusual activity.
3. The automated message instructs the victim to “call the following phone number immediately”. The same phone number is often shown in the spoofed caller ID and given the same name as the financial company they are pretending to represent.
4. When the victim calls the number provided, it is answered by automated instructions to enter their credit card number or bank account number on the key pad.
5. Once the victim enters their credit card number or bank account number, the “Visher” has the information necessary to make fraudulent use of the card or to access the account.
“Smishing” is a combination of SMS and phISHING. SMS (Short Message Service) is the technological protocol used for sending and receiving text messages on cell phones. Smishing is the criminal practice of using social engineering over the cellular phone system.
1. A criminal will send text messages to a list of cellular phone numbers stolen from a financial institution.
2. The text messages alert the consumer that their credit card has had fraudulent activity or that their bank account has had unusual activity.
3. The text message instructs the victims to call a phone number or visit a website where their personal information is requested.
4. Once the victim calls the phone number in the text message or visits the website and provides the information requested, the “Smisher” has the information necessary to make fraudulent use of the card or access the account.
PROTECT YOURSELF against Social Engineering, malware, viruses, etc…
- Be skeptical of suspicious e-mail, text messages, unfamiliar sites and links and any unprompted requests for personal information.
- Protect your personal information. Keep your user names and passwords secret and be skeptical of any requests for personal information.
- Always look for "https://" in the address of any site where you enter personal information; this indicates a secure connection.
- Do not click on links contained within e-mails. Open a new browser window and type the address yourself.
- Do not reply to phishing, smishing or vishing attempts. Never reply to phone calls, e-mail, or text messages asking for personal or financial information unless you can confirm the requestors identity.
- Keep security software (antivirus, anti-malware) up-to-date and keep firewall settings active.
Cash Advance Scams Are Increasing. You Could Be Involved In A Fraud Or About To Be Scammed!
- Mystery Shopper Scams: Paying a fee to be a “Mystery Shopper”
- Lottery Winning Scams: Paying Fees or Taxes to receive winnings
- Agent Scams: Paying Commission for facilitating Items
- Inheritance Scams: "A Long Lost Family Member Has Died"
- Have you been instructed to either "Wire", "Send by Western Union", or "Ship" money, as soon as possible, to a foreign country, such as Canada, England, Nigeria or to a different area of the United States?
There are different variations on the types of frauds listed above. Please take the time to ask bank employees for assistance before depositing or cashing any checks that may be suspicious!
You are responsible for any checks you cash or deposit! Amount of items returned will be charged against your account!
For more information visit www.fakechecks.org.
Identity theft and account fraud are making big headlines. How can someone steal your identity? Identity theft occurs when someone uses your personal information such as your name, Social Security Number, credit card number, account number, or other identifying information, without your permission to commit fraud or other crimes.
Identity theft is a serious crime. People whose identities have been stolen can spend months or years - and their hard-earned money - cleaning up the mess thieves have made of their good name and credit record. In the meantime, victims may lose job opportunities, be refused loans, education, housing or cars, or even get arrested for crimes they didn't commit.
Your bank works hard every day to ward off these threats. Security is paramount in gathering personal data, as well as tracking transactions. There is a great deal of emphasis and specialization on things like encryption of information and strict authentication practices, but maximum security is possible only with your help.
Educating yourself on how to protect against privacy invasions is critical. Once you understand what information should be protected and what to do in case that information is compromised, you'll feel much more secure.
Here are some things you can do to prevent these crimes from happening and protect your assets and your good name:
- Don't give out financial information such as checking and credit card numbers and especially your Social Security number over the phone unless you initiated the call and know the person or organization you're dealing with.
- Report lost or stolen checks immediately. Also, review new deliveries of checks to make sure none has been lost in transit.
- Do not carry all your credit cards, your Social Security card, passport, etc in your wallet or purse at all times. Carry these only when need them.
- Carefully monitor your monthly bank and credit card statements and order a credit report once a year to check for inaccuracies and fraudulent use of your accounts.
- Guard your ATM Personal Identification Number and the ATM receipts.
- Be very careful when using your credit card on the Internet, or providing other information such as your Social Security number or other personal information.
- Always shred preapproved credit applications, credit card receipts, bills and other financial information before discarding them in the trash.
- If you applied for a new credit card or your regular bills have not arrived in a timely manner, call the bank or company involved.
- Don't put outgoing mail in or on your mailbox. Drop it into a secure, official Postal Service collection box.
If you think your identity has been stolen, here's what to do now:
- Contact your bank(s) and credit card issuers immediately so that the following can be done: access to your accounts can be protected/restricted; stop payments on missing checks; personal identification numbers (PINS) and online banking passwords changed; and a new account opened if appropriate. Be sure to indicate to the bank or card issuer all of the accounts and/or cards potentially impacted including ATM cards, check (debit) cards and credit cards. Customer service or fraud prevention telephone numbers can generally be found on your monthly statements.
- Contact the fraud departments of any one of the three major credit bureaus (see list below) to place a fraud alert on your credit file. The fraud alert requests creditors to contact you before opening any new accounts or making any changes to your existing accounts. As soon as the credit bureau confirms your fraud alert, the other two credit bureaus will be automatically notified to place fraud alerts, and all three credit reports will be sent to you free of charge.
Credit Bureau Web sites and Phone Numbers
Equifax: www.equifax.com 800-525-6285
Experian: www.experian.com 888-397-3742
TransUnion: www.transunion.com 800-680-7289
- Close the accounts that you know or believe have been tampered with or opened fraudulently.
- File a police report. Get a copy of the report to submit to your creditors and others that may require proof of the crime.
- File your complaint with the FTC (www.ftc.gov ). The FTC maintains a database of identity theft cases used by law enforcement agencies for investigations. Filing a complaint also helps us learn more about identity theft and the problems victims are having so that we can better assist you.
For more in-depth information on recovering from identity theft and help with protecting your personal records, visit www.consumer.gov/idtheft.
There are many nasty things that can happen to your computer resulting in loss of data and/or unintended divulgence of personal information. Following are things that could make you and your PC very unhappy and some recommended ways to protect yourself…
A program or piece of computer code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses are capable of replication to other computers. Viruses can compromise computer and network resources and bypass security systems. Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.
- Purchase Antivirus (AV) software – AV software detects and removes viruses/worms from your computer (McAfee, Symantec).
- Purchase Firewall software - firewall software protects your computer from anything (or anyone) on the Internet that tries to access or alter files on your PC without your permission (McAfee, Symantec).
- Regularly update the virus definition files associated with the AV software.
- Regularly scan your computer for viruses.
- Do not click on or follow hyperlinks you are not familiar with or do not trust.
- Do not open e-mail attachments sent from a source you are not familiar with or do not trust.
Software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are inadvertently installed when visiting a website or clicking a hyperlink. Once installed, spyware monitors user activity on the Internet and transmits that information covertly to someone else. Spyware can also gather and transmit personal information (e-mail addresses, passwords, credit card numbers, etc…). Spyware can also cause problems with computer resources causing PC's to run slowly or erratically.
- Purchase software that protects your computer from anything (or anyone) on the Internet that tries to access or alter files on your PC without your permission (AdAware, Spybot).
- Minimize unnecessary “surfing” on the Internet
- Do not click on or follow hyperlinks you are not familiar with or do not trust.
- Do not open e-mail attachments sent from a source you are not familiar with or do not trust.
Electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e-mail. E-mail advertising for some product sent to a mailing list or newsgroup.
- Purchase Anti-Spam Software - this software filters your e-mail for SPAM and either deletes it or directs it to a destination of your choosing. There are many companies who offer anti-spam software packaged with AV software (McAfee, Symantec).
- Utilize SPAM filters provided by your email provider.