Queenslanders Credit Union


How to Protect Yourself from Fraud and Online Viruses

(Source: Microsoft Corporation)

5 Quick Steps for Online Protection

  1. Install virus protection and firewall software and update it regularly.
  2. Don’t open email attachments from unknown sources.
  3. Don’t install or run programs of unknown origin.
  4. When not in use, turn off your computer or disconnect from the network.
  5. Keep your operating system and all applications updated (known as “patching”).

Fraud & Online Viruses:

Phishing
Viruses (including Trojans, Spyware, Zombies and Worms)
Spam
Credit/Debit Card fraud

Protection:

Back-up
Patches
Firewall
Virus Protection
Spam Protection
Password Protection
Verified by Visa
Credit/Debit Card & Identity Protection

Phishing

The most recent online scam in recent times. Phishing uses fraudulent emails and poses as a communication from someone you recognize and trust, to entice you to give out your banking details, passwords or credit card details.

Queenslanders will never ever ask you for your security information via email. If you receive any emails from Queenslanders asking for confirmation of your details, contact us by phone immediately.

As you click on the link within the fraudulent email, you are taken to the fraudster’s fake website. Fraudsters are very good at their craft, these fake websites look identical to the legitimate website, which often include identical logos, formatting and design elements. These website copies are often called “spoofed” websites.

You will then be asked to enter your account details, passwords and other identification – the “phisher” has caught you!

It may be weeks before you notice that anything is amiss with your accounts. You may then notice that your account balance is lower than you thought, your credit card statement has strange items charged to it. If this happens to you, call us immediately.

Viruses

Viruses come in many different shapes and forms. However, they all have a common denominator – they are all nasty programs that can infect your computer and cause chaos. Virtually all viruses and many worms cannot spread unless you open or run an infected program.

Never open anything that is attached to an email unless you were expecting the attachment and you know the exact contents of that file. If you are unsure about the file you have been sent either delete it or contact the sender to confirm the contents before you open it. Viruses can also be transmitted software you download from the internet, so make sure the software is legitimate and clean before you download it to your computer.

Email transmitted viruses – they look through your email address book and send copies of themselves to everyone in your email address book. The recipient opens the email and unwittingly infects themselves. The process then repeats itself.

Worms – Like a virus, a worm is designed to copy itself from one computer to another, but it does so automatically by taking control of features on the computer that can transport files or information. Once you have a worm in your system it can travel alone. Because worms don’t need to travel via a “host” program or file, they can also tunnel into your system and allow somebody else to take control of your computer remotely. When new worm are unleashed, they spread very quickly, clogging networks.

Trojans – This is a program that appears to be something useful, but instead they compromise your security and cause a lot of damage. Trojans cannot spread or reproduce by themselves but they can cause a lot of damage to their host computer. Trojans spread when people are lured into opening a program because they think it comes from a legitimate source.

Zombies – once your computer has been turned into a zombie, it spews out spam emails to hundreds and thousands of people. These emails can cost you a lot of money if you are on a broadband account which charges for uploads and downloads.

Spyware – unwanted software installed on your computer that gathers information from your computer without your knowledge. It usually enters your computer as a software virus or from the installation of less-than-reputable programs. Unwanted software or spyware may make your computer behave strangely, you may see pop-up advertisements even if you aren’t browsing the Web or your Web browser’s setting may have changed. Spyware may not cause damage to your machine, it may just watch. If your computer carries sensitive business information and it “watches” you type credit card details, the implications are very alarming.

Spam

Electronic junk mail. More than just annoying, spam often contains viruses and other nasty material. Spam can be hard to avoid, but installing anti-Spam software is a great start. Many email programs have built-in filters that can help you separate Spam from the email you really want or contact your Internet Service Provider (ISP) and ask for their help.

Credit/Debit Card Fraud

A crime where your credit or debit card details are reproduced in order to access your card account. “Skimming” is when the information contained on the magnetic strip is reproduced. This information is then illegally downloaded by criminals via the Internet and encoded onto a counterfeit card. These thieves use a skimmer device sometimes as small as a pager either worn on their belt or situated beside a cash register. Once quick swipe is all that’s needed to copy all of your card’s details.

You card may also be lost or stolen; it could be intercepted in transit while being mailed to you. Or your card could be compromised by a dishonest merchant who duplicates transactions on your card.

Protection

Regular computer maintenance is essential to a clean computer.

Back – up

Back-up your files on a regular basis, the frequency dependant upon how much importance you place on your files. The easiest way to do this is to burn your files to a CD using back-up software.

Patches

Make sure you update your operating system and software applications regularly. Software manufacturers attempt to fix problems with their products with small software programs called “patches”. These patches are generally free to download. If you’re running Windows, go to Microsoft’s website and click on “Windows Update”, this will tell you what patches you need to install. If you’re running Macintosh OSX, click on “software update: in the “systems preferences” panel. This will check whether any updates are available.

Firewall software

If you’re connected to the Internet you need Firewall protection, this is especially so if you are a broadband customer. Firewall software is a valve that only lets desirable traffic get through and stops any unwanted or malicious connections. Make sure you read the manual and set your preferences appropriately.

Virus Protection

The best protection is anti-virus software. This software attempts to trap viruses before they get to your computer. The software scans every incoming piece of information looking for patterns or definitions that match known viruses. Anti-virus software needs to be kept up-to-date. Make sure you log onto the manufacturer’s website and download updates.

Spam Protection

Keeping Spam at bay is essential to keep out viruses and phishing. Reputable anti-Spam software will learn what spam looks like and gets better the more its used. They usually move the spam to a separate file to that you can review it periodically. You can also subscribe to a Spam-trapping service. These services act as a filter, removing dodgy email before it gets to your inbox. Ask your Internet Service Provider (ISP) if it offers any anti-Spam filters.

Don’t reply or buy anything from Spam emails. Never contribute to a charity from Spam mail. Don’t forward chain email messages, these may be hoaxes or even a virus delivery system. Plus you lose control over who sees your email address. Spammers also use chain letters to gather email addresses. To check on the legitimacy of a chain letter, visit the Hoaxbusters website hoaxbusters.ciac.org

It is also important to hide your email address from Spammers. When you sign up for free offers, ordered something online or entered a contest, many Spammers will use these address lists. Here are some tips to help hide your address:

  1. Set up an email address dedicated solely to Web transactions. There are many free mail services available.

  2. Only share your primary email address with people you know.

  3. Disguise your email address – use a disguised address whenever you post to a newsgroup, chat room or bulletin board. For example: you could give your email address as [email protected] using “0” (zero) instead of “o”. A person can interpret your address, but the automated programs that Spammers use cannot.

  4. Watch out for checked boxes – when you buy things online, companies sometimes pre-check boxes to indicate that it’s fine to sell or give your email address to responsible parties. Un-check these boxes if you don’t want the company to contact you.

  5. Review privacy policies – when you sign up for web-based services, review the privacy policy closely before you reveal your email address. The privacy policy will outline the terms and circumstances regarding if or how the site will share your information. To review Queenslanders Credit Union’s privacy policy click here.

Password Protection

  • NEVER tell anyone your passwords or PIN.

  • NEVER give your passwords or PIN to anyone.

  • Memorise your passwords or PIN.

  • Don’t use the same PIN for all your cards.

  • Change your passwords regularly, say, every few months.

  • Don’t use something obvious as your password, e.g. your surname, birthdate, spouse’ name.

  • Don’t keep your password near your account details or cards. Don’t keep your password in an obvious place such as your wallet or address book.

Verified by Visa

Verified by Visa is a service that lets you use a password and Personal Assurance Message (PAM) with your Queenslanders Credit Union Visa card. Your password is as easy to use as your PIN at an ATM – and it means you’re the only one who can use your Visa card to make purchases over the Internet from participating merchants. For added security, your PAM confirms that you are connected to a legitimate website, and that your card is being authenticated by your credit union. For more information about Verified by Visa click here.

Credit/Debit Card & Identity Protection

  • Protect your passwords and PIN using the rules above.

  • Never respond to requests for personal information via email. If in doubt, call the institution that claims to have sent you the email.

  • Visit websites by typing the URL into your address bar – never follow the links to a website from an email message.

  • Check your statements and call us immediately if you see anything suspicious on your statement.

  • Don’t let your card out of your sight at any time – when paying your bill at a restaurant, follow your card and keep it in your sight.

  • Watch the cashier as they process your payment to ensure they don’t swipe it through any other device other than the EFTPOS machine.

  • Card Skimming doesn’t only occur in Australia – be especially careful overseas.

  • Always sign your card as soon as your receive it.

  • Make sure your mailbox is secure or lockable.

  • Tear up all credit card receipts and pre-approved credit card offers into small pieces before you throw them away. Keep your billing statements in a safe place.

  • When using your card online, make sure you are using a secure website or have registered for Verified by Visa.

  • If possible, don’t enter sensitive information whilst using a public computer at a library or internet café. Make sure you log out of websites instead of just closing the browser window or typing in another URL. Don’t leave the computer unattended with sensitive information on the screen. Delete the temporary files and your Internet