312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

Alert: Hackers Target Mobile Banking Apps, Warns FBI

Alert: Hackers Target Mobile Banking Apps, Warns FBI

More people than ever are utilizing the conveniences of the Internet and mobile apps to avoid unnecessary human contact during the coronavirus pandemic. In fact, mobile banking alone has increased by 50 percent over the last few months, nationwide. In a recent PSA, the FBI warned that hackers are likely to be targeting mobile banking apps.

According to the FBI’s public service announcement:

“As the public increases its use of mobile banking apps, partially due to increased time at home, the FBI anticipates cyber actors will exploit these platforms.”

The PSA is definitely worth a read, and includes some good tips and potential threats that are out there. It’s worth noting that many of the tips apply to a lot more than just mobile banking.

If you are in a rush, here are some of the best tips to take away from it to protect yourself.

Utilize 2-Factor Authentication

You’ll see this called 2-Factor Authentication, Multi-Factor Authentication, 2FA, or MFA. That’s where a website or service will email or text you a little code to log you in. Some services will utilize an authentication application, such as Google Authenticator, Authy, Duo, or LastPass Authenticator. Using an authentication app is definitely a safer way to go, as they are harder to spoof than email and text, but anything is better than nothing.

You should always set up 2-Factor Authentication on any account you have, especially if it deals with sensitive information or your money.

Always Have Good Password Hygiene

Use strong passwords that contain lower and uppercase letters, numbers, and symbols. Your passwords should always be unique and not be used for multiple accounts, and your passwords should never contain information that could be guessed like your name, birthdays, your pets, and so forth.

If Something Seems Fishy, Don’t Install It

Never install something you aren’t 100 percent sure about. If your bank has a mobile app, be sure to download their official app, which they should have linked in their website. Avoid installing a mobile banking app that is sent to you via email or text message, because there is a chance that it could be bogus. 

When In Doubt, Call the Bank

We’re really glad the FBI covered this tip too, as it’s often glossed over. If you have any suspicion that something is strange or not working correctly, just call your bank. Go to their official website, or use the number on the back of your card or from a statement. 

If you accidentally called the number from the banking app, and that phone call seems suspicious, immediately hang up and be sure you use the number from their official website. If the hackers were clever enough to get you to download a fake banking app, they could easily have a fake support number to get you to call and submit your credentials. Your bank will never need your username and password over the phone.

All in all, be ever vigilant, because cybercriminals want to take advantage of the chaos to grift people out of their money. Don’t let them!

If you need help locking down your business and protecting your staff from cyberthreats, give Alchetec a call at 312-253-4321 today!

Working at the Office Has Its Benefits, Too
Why You Need to Consider How Your Data is Stored


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 04 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions IT Support Software Malware Hackers Internet Email Efficiency Outsourced IT Business Microsoft Innovation Data Recovery Computer Hardware Business Continuity Cloud Computing Small Business Productivity Cybersecurity Managed IT Services Mobile Devices Managed IT Services Tech Term Google User Tips Backup Ransomware Upgrade Collaboration Phishing Communication Business Management Windows 10 Mobile Device VoIP Workplace Tips Smartphone IT Support Android Disaster Recovery Paperless Office Smartphones Managed Service Provider Remote Monitoring Managed Service Office 365 Data Management Quick Tips Browser Managed IT Server Internet of Things Communications Encryption Network Social Media Save Money Passwords Facebook Business Technology Virtualization Compliance BDR Miscellaneous Holiday Saving Money Help Desk Artificial Intelligence Wi-Fi Training Microsoft Office Windows 10 Remote Work Health Government Healthcare Document Management BYOD Windows 7 Laptops Employer-Employee Relationship Automation Users Password Vendor Management Risk Management Office Windows Applications Data Security SaaS Infrastructure Apps Data loss Tip of the week Avoiding Downtime Telephone Systems Blockchain File Sharing Bandwidth Unified Threat Management Information Going Green Antivirus Recovery Mobility Redundancy Regulations Maintenance Vulnerability IT Management Scam Analytics Project Management Two-factor Authentication Chrome Processor Storage Gmail Firewall App Software as a Service Hard Drive Computing Tablet Gadgets IoT Customer Relationship Management Big Data Website Covid-19 Files Company Culture Data Storage Money Wireless Flexibility Word Politics Mobile Device Management VPN Bring Your Own Device Machine Learning Proactive Access Control Virtual Reality Hosted Solution Employee-Employer Relationship Virtual Private Network Computers IT Service Robot Meetings OneDrive Router Work/Life Balance RMM Professional Services Identity Theft Payment Cards HIPAA Remote Workers The Internet of Things Display Licensing Internet Exlporer Co-Managed IT How To Operating System Assessment Alert Remote Worker Managed Services Cooperation Monitors Patch Management Mobile Security Apple Time Management How To Customer Service Consultation Search Samsung Uninterrupted Power Supply Monitoring Mobile Office Information Technology Recycling Network Management Utility Computing Chromebook Electronic Health Records Consulting Settings Twitter Server Management Dark Web Printing Unified Communications Social Network Networking Social Solid State Drive Outlook Managed Services Provider Remote Computing Employees Augmented Reality File Management Data Storage Management Downtime Smart Technology Data Breach Electronic Medical Records Upgrades Net Neutrality Digital Payment Remote Monitoring and Management Statistics Microsoft Excel SharePoint Connectivity Unsupported Software Point of Sale Spyware IBM Firefox Vulnerabilities IT Solutions Processors Wires Zero-Day Threat Safety Outsourcing Security Cameras Value of Managed Services Mail Merge Alerts Enterprise Resource Planning USB Instant Messaging Manufacturing Hacker Employer/Employee Relationships IT Distributed Denial of Service Technology Laws Modem Legal 3D Printing Law Enforcement Windows Server Remote Working Shortcut Dark Data Private Cloud Transportation Budget Techology Personal Information WPA3 Bitcoin Video Conferencing Bluetooth Downloads Update Mobile Data E-Commerce Virtual Assistant Telephone Lenovo IT Technicians Geography Social Engineering Backup and Disaster Recovery Disaster WiFi VoIP Address Mobile Finance Hard Disk Drives Software Tips Proactive Maintenance Business Telephone Heating/Cooling Managed IT Service Unified Threat Management Cookies Gadget User Management Technology Tips Cache Bookmarks Optimization Disaster Resistance Social Networking Virus Fleet Tracking Tech Terms Current Events Biometric Permissions Multi-Factor Security Star Wars Features Wasting Time Mobile VoIP Superfish Mirgation High-Speed Internet Human Error Cybercrime ROI GPS YouTube Vendor Staff Black Market Authentication Database Management IT Assessment Servers Break Fix User Error Nanotechnology Asset Tracking Theft Batteries Peripheral Hotspot Mouse Network Congestion Favorites Teamwork Google Maps Solid State Drives Virtual Machines Black Friday Proactive IT Motherboard Computer Repair Crowdsourcing Projects Gamification Hacking Fraud Google Calendar Humor Botnet Database Supercomputer Spam Cyber security Migration Development Notifications MSP Permission Travel Cortana Sports Notes Tracking Smart Devices Operations Managing Stress Physical Security End of Support Authorization Content Filtering History GDPR Digitize Printer Screen Reader OneNote Financial Corporate Profile PCI DSS Language Comparison eWaste Business Growth Education Conferencing Shared resources Options Credit Cards Touchscreen Cyber Monday IT Consulting Mobile Computing Return on Investment Outsource IT Trending Legislation Office Tips Cyberattacks Voice over Internet Protocol IT Budget Chatbots Cables Test Data Warehousing Smart Tech Telephony PowerPoint Digital Sensors Wearable Technology Enterprise Content Management G Suite Cabling Shadow IT Websites Procurement Computer Care WannaCry Computing Infrastructure Specifications Automobile Wireless Internet Holidays Wireless Technology 5G Active Directory Laptop Cost Management Emoji Read Only Tech Support Windows Server 2008 Google Drive Identity Taxes Hard Disk Drive Fun Staffing CRM Sync Marketing Printers IT Consultant CrashOverride Competition Mobile Device Managment IP Address Error Students Administrator Hard Drives Regulation Domains Public Cloud Cleaning Public Speaking Presentation Hacks Motion Sickness Emergency Lithium-ion battery Hiring/Firing Relocation