Fraud Information Center

Each year more and more Americans are victims of fraud. Home State Bank is dedicated to assisting its customers in protecting their private information.

Stay Informed

We strive to provide our customers with the most up to date information we can, to help prevent anyone from being a victim of fraud. While we can't guarantee this will never happen, we will do our best to keep our customers informed.  Please always remember Home State Bank will never call you asking for personal information such as account numbers, social security numbers, etc.  

 Glossary of Terms

There have been a few new words and phrases being thrown around lately in terms of fraud. Without knowing what these terms mean, it can be more confusing than it needs to be.  Let us help explain a few of terms we've been learning about here at Home State Bank.

Social Engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing and spear phishing, are examples.
Phishing (pronounced fishing) is a hacking technique that is the digital equivalent of “casting a net.” Phishing campaigns don’t target victims individually—they’re sent to hundreds, sometimes thousands, of people. Emails claiming to be from popular social web sites, banks, auction sites, or IT administrators are commonly used to lure the unsuspecting public.
Spear Phishing is highly targeted and targets a single individual. Hackers do this by pretending to know you. It’s personal.
Smishing is a form of phishing that uses mobile phones as the attack platform.   This form of attack has become increasingly popular due to the fact that people are more likely to trust a message that comes in through a messaging app on their phone than from a message delivered via email.

Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information.

Phishbait is an email crafted to attract prospective phishing victims to open an email and follow a malicious link.

Multi-Factor Authentication (MFA) is used to ensure that digital users are who they say they are by requiring that they provide at least two pieces of evidence to prove their identity. When you sign into an account for the first time on a new device or application (like a web browser) you need more than just the username and password. You need a second thing - what we call a second "factor" - to prove who you are.
Juice Jacking refers to the threat of malicious access gained to your phone or other USB devices when plugged into a public charging kiosk - such as at an airport or sporting event.
Malware is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Scareware is malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.

 Fraud Alerts

Updated December 14, 2023

Watch Out for Fake Shipping Notification Emails and Text Messages

When you order something online, you might get several emails or text messages about your order: Confirming your order. Telling you it shipped. Saying it's out for delivery. Notifying you about delivery. Did you know that scammers send fake package shipment and delivery notifications to try to steal people's personal information — not just at the holidays, but all year long? Here's what you need to know to protect yourself from these scams.

The bogus stories the scammers deliver

The scammers send bogus messages by email or text. The message might say that you missed a delivery attempt and ask you to click on a link to re-schedule the delivery. Or it could say that your item is ready to ship but you need to update your shipping preferences. Some create a sense of urgency by saying if you don’t respond right away, they'll return your package to the sender.

They want you to click on the link without thinking about it and enter your personal or financial information. But the site is fake. A look-alike of a real website. And it’ll capture all the information you enter. The link could also install harmful malware on your phone or computer that steals your information. Things like your usernames and passwords to your online banking, email, or social media accounts that scammers could use to steal your identity and open new accounts in your name.

What should you do?!
  • If you get a message about an unexpected package delivery that tells you to click on a link for some reason, don’t click.
  • If you think the message might be legitimate, contact the shipping company using a phone number or website you know is real. Don’t use the information in the message.
  • If you think it could be about something you recently ordered, go to the site where you bought the item and look up the shipping and delivery status there.

--Information from Federal Trade Commission Consumer Advice

That friend request could be from a scammer

Scammers are using social media to go after your money and personal information. And it’s working: since 2021, people have reported losing $2.7 billion to scams that started on social media — way more than with any other contact method.

Scammers like social media because they can pretend to be someone they’re not. They can hack your profile, pretend to be you, and con your friends. They can target you and others using information from your profile like your age, hobbies, and what you buy. And they can do all this at little to no cost.

So what do social media scams often look like? Scammers might target you with an ad for something, but after you pay (for the thing that turns out to be fake), they take your money and run. Or they might try to sell you on a bogus investment opportunity (often involving cryptocurrency). Or they might send a friend request out of the blue and pretend to be a potential love interest. But then…they ask for money.

To avoid these and other scams on social media:

  • Use your privacy settings to limit who can see your information and what you post.
  • Don’t reply to messages that ask for money or personal information. Even if the message looks like it’s from a friend or family member, their account may have been hacked. Call them to check.
  • Before you buy something, check out the company. Search online for its name along with words like “scam” or “complaint.”

--Information provided by Federal Trade Commission Consumer Advice website

Hello, it's ME?

Artificial Intelligence

AI can and is being used to increase the efficiency of security measures; however, it is also being used to create harmful, targeted, and more sophisticated cyber threats. AI threats are not just behind screens; they are in your ear. Malicious actors are utilizing not only SPAM emails and other digital attacks but also spoofing customers' voices to gather personal information and approve the transfer of funds.

Joana Stern of The Wall Street Journal proved this theory by cloning herself with AI, which successfully fooled her bank and her family.[2] Attackers will often pair these attempts with a sense of urgency in hopes that they can catch the employee off-guard. It is no longer enough to hear someone quickly confirm on the phone.

Below are steps you can take to protect yourself and your customers from these attacks.

    • Listen - If spam is suspected, avoid speaking first and let the caller speak. Whoever is calling you could be recording snippets of your voice and later using it to impersonate you. A simple "Hello, who is this?" may be too much.
    • Quality of Questions - Ensure the questions you are asking are in-depth. Don't be afraid to have a personal conversation if you are unsure who you are talking to is who they say they are. It is not impolite; it's assurance.
    • Think Before You Click - Cyber attackers use AI to craft and scale unique SPAM emails. Always hover before you click any links to see the full URL.
    • Limit Personal Data - Always be aware of what information you submit online. If you are utilizing a productivity resource, be sure to generalize all business, personal, and premise information.

--Information from Information Security Brief from BankOnIT

 Tips to Help Safeguard Your Passwords:

If you’re like most people and recycle the same password, or use a close derivative of it, across multiple accounts, then you’re making things even easier for attackers and put yourself at additional risk of identity theft and fraud. The most common password of 2020 was ‘123456’, followed by ‘123456789’. Coming in at number four was the one and only ‘password’.

ESET’s Phil Muncaster's offers the following advice to help safeguard your passwords:

  • “Use only strong and unique passwords or passphrases on all your online accounts, especially your banking, email and social media accounts
  • “Avoid reusing your login credentials across multiple accounts and making other common password mistakes
  • “Use a password manager, which will store strong, unique passwords for every site and account, making log-ins simple and secure
  • “Change your password immediately if a provider tells you your data may have been breached
  • “Only use HTTPS sites for logging in
  • “Don’t click on links or open attachments in unsolicited emails
  • “Only download apps from official app stores
  • “Invest in security software from a reputable provider for all your devices
  • “Ensure all operating systems and applications are on the latest version
  • “Never log-on to an account if you’re on public Wi-Fi; if you do have to use such a network, use a VPN”

--Information from KnowBe4 CyberHeist Newsletter & Blog

Tips for Online Shopping

With more and more people doing their shopping online, the U.S. Department of Homeland Security has issued some general tips to keep shoppers safe.

  • Software Updates
    Whether shopping from your laptop or tablet, make sure your operating system (OS) and antivirus software is installed and up to date.
  • Password Protection
    Make sure you don’t use the same password for multiple accounts. When possible, use multi-factor authentication.
  • Avoid Public Wi-Fi
    Public Wi-Fi networks are not secure and should never be used to conduct online shopping or banking transactions.
  • Know Your Vendor
    Stick to doing business with established companies you know. Legitimate vendors us Secure Socket Layer (SSL) to protect your information. 

 Tips to Avoid Becoming a Victim of Identity Theft

  1. Keep passwords secure and always shred documents that contain any sensitive information.
  2. Do not carry your social security card with you.
  3. Sign the back of your debit and/or credit cards.
  4. Never provide a caller with your personal information such as your date of birth or your social security number. This information is not a requirement for placing an order at an e-commerce web site.
  5. Never give any of your personal information to anyone you don't know or trust.
  6. Take advantage of electronic banking services, such as E-Statements, Online Banking, Mobile Banking. By using these services, you can avoid sensitive information being left in your mailbox.
  7. Know who you are dealing with before providing and confirming any personal information to mail order, telephone or internet merchants.
  8. Review your bank statements each month and know your billing cycles. If you know you have a bill due and you haven't seen the bill, call the company to investigate.
  9. Review your credit report annually to see if anything seems unusual, for example, like an account you didn't open or charges you didn't make. You are entitled to one free credit report a year.

See Additional Safety Tips

 My Identity Has Been Stolen. Now What Do I Do?!

If you have been the victim of identify theft, here are some steps to help you get your life back on track:

  1. Place a fraud alert on your credit report.
    • When you place an alert on your credit, this will prevent any other account from being opened.
    • You can request a report to see if any charges seem suspicious.
  2. Close the accounts you think could be affected.
    • Contact someone in the fraud or security department of your financial institution.
    • Follow up in writing with copies of any supporting documents.
    • If any debits exist on your accounts, or a new account has been opened, ask the financial institution for the correct paperwork to dispute them.
  3. File a complaint with the Federal Trade Commission (FTC)
    • When you file with the FTC, you are providing information to help law enforcement officials track down thieves.
  4. File a report with the local police department
    • Filing a report, along with a complaint to the FTC, can give you certain protections to ensure your identity can be protected and restored.

 Ways to Protect Your ID

Under the Gramm-Leach-Bliley Act (GLBA) and Privacy Laws we are required to ensure the confidentiality of a consumer's information. Here are ways a consumer can protect their ID's from theft:

Questions?

If you have any questions about any of the services we offer, please call us at 877-474-5511 or 712-933-5511, Email us, or stop in to see us during normal business hours.

Back to Top

Internet Explorer 11 is outdated. For improved security and optimized performance we highly recommend upgrading your browser. ChromeFirefoxEdge