Fraud Prevention Tips
You may have experienced or read about incidents of unsolicited email or SMS text messages masquerading as legitimate companies that trick recipients into divulging personal and financial information. These fraudulent “phishing” and “SMShing” messages prompt to you to visit website or call phone numbers pretending to be legitimate companies or government agencies that ask for your personal and financial information.
(At no time will members of Wilshire Bank request personal or financial information by sending out unsolicited emails, text messages or via the phone).
How the Scams WorkCommon email scams use unsolicited emails and text messages (usually marked URGENT!) to deceive consumers into disclosing confidential personal information. The deceptive texts and emails tell you to call a phone number or click a link or attachment for any one of the following reasons:
- Ensure continued account access
- Change / update personal information
- Possible suspension of client cards or accounts
- Possible loss of deposit insurance
- Application for products
After calling an apparent legitimate bank number or clicking on an attachment or link from the unsolicited email, the user is taken to a bogus site that requests confidential personal information, which could include:
- Bank Card Numbers/User ID's
- Account Numbers
- Personal Identification Numbers (PINs)
- Credit Card Numbers
- Social Security Numbers
- Other Personal or Private Information
How to Identify the ScamThere are some commonalities that can help you identify the scams:
- They are designed to mimic the look and feel of a genuine site
- They are most commonly sent out through unsolicited emails, containing links or attachments
- The web address will often have the @ symbol or a numeric IP address (eg.123.456.1.2).
- The address may also include the word, phrase or text about the bank to make it appear authentic.
How To Help Protect YourselfIt is important to understand that there are ways you can help protect yourself:
- If you receive an email that looks like it is from a member of Wilshire Bank asks for personal or financial information, do not call the number in the text message nor click on any links.
- Forward the phishing email to email@example.com.
- Review your financial statements regularly for unauthorized or suspicious transactions.
- Never send personal and/or financial information via unsecured email.
- Do not trust email headers. They can be easily forged.
If you have sent personal information in response to a suspicious email or text message, please contact us at 866. 886. BANK (2265). Representatives are available Monday - Friday from 7am to 6pm PST.
Learn more about consumer alerts from the Federal Trade Commission.
ATM skimming is when thieves attach devices onto the ATM machines that will copy your credit or debit card information on the magnetic strip and even your personal identification number. According to Bankrate.com, theft from ATM-skimming is approaching $1 billion annually and estimates that one in five people have been hit by an ATM skimmer.
Here are some helpful tips to stay safe..
- Avoid using ATM machines that are not in the bank branch, not in well-lit area and tucked away somewhere.
- Avoid using ATM machines that does not look or feel right. (ex. Mirrors, brochure holders or panels in an odd place, overlay on the keypad)
- Immediately remove your ATM card from the slot if you feel that the machine feels different than usual.
- Cover the keypad with your hand to block your PIN number from being viewed.
If you feel that our ATM machines is different than usual or spot suspicious objects on our machines, please report it to the branch or contact our e-banking department at 213-427-2471.
Malware is a program that gets installed without your knowledge. You might have seen a pop up that stated that your computer has a virus or needs to be scanned. Do not click on the link! The pop up message makes the potential victim to think that they have a virus and will need to use the program suggested by the pop up to get rid of the virus. But in fact by clicking on the pop up a malware will get installed on your computer without the user’s knowledge. Even if you think you have successfully deleted the malware sometimes the malware is hidden or still inside your computer and will install itself back onto your computer as the malware or spyware is left untreated.
As malware attacks are becoming more common, software companies have developed software that will detect virus, malware, and spyware. Remember to always have the option for real-time protection selected and always scan your computer for viruses and malwares on a daily basis.