Security News: The "Heartbleed" Bug
You may have heard about the Heartbleed Bug, a serious vulnerability in the popular OpenSSL cryptographic software library which allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs). Basically, this security risk could impact servers and non-personal computers, which could lead to security breaches including your username and passwords being leaked to hackers.
Rest assured, Waukesha State bank has confirmed that our online banking systems have not been impacted and we will continue to monitor our services to ensure both your safety and ours. While no action by you is needed to protect your accounts at this time, if you are concerned about your online security, some simple steps can be taken:
- Make sure to maintain and update the anti-virus software installed on your computers.
- Create strong passwords and change them frequently.
- Be sure to log out of your online accounts when you're done.
As always, if you ever have any questions, please do not hesitate to call us at (262) 549-8500. Or if you'd like to learn more about the Heartbleed Bug, visit heartbleed.com.
Click to learn more about Protecting Your Identity
FDIC Offers Identity Theft Help
The FDIC unveiled an online multimedia presentation about identity theft - "Don't Be an Online Victim: How to Guard Against Internet Thieves and Electronic Scams" - that is available on the agency's Web site. It provides information on steps consumers should take to secure their computer and protect themselves from identity theft, as well as what they should do if they are victimized by the crime.
Click to visit the FDIC's Identity Theft Help Presentation.
Click Here for tips on how you can prevent credit card fraud and what Visa does to protect you.
Waukesha State Bank is aware of an increase in scam e-mails, popularly called “phishing” e-mails. Each day, many Internet users are assaulted by "important" emails that require "immediate attention" about some type of banking or e-commerce matter. This involves third parties using the name of legitimate companies such as our Bank to obtain private information from customers, such as personal or financial details (e.g. credit card numbers, bank account information, Social Security number, passwords, or other sensitive information). This practice is carried out either by sending a phony e-mail directed to the victims or by directing them to a website where information is requested.
At Waukesha State Bank we are committed to protecting your privacy and security. We will never initiate a request for sensitive information from you via e-mail (i.e. Social Security Number, User or Access ID, Password, PIN or account number).
What is the Phishing threat?
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, banking institutions, even the IRS or FDIC. The message may ask you to "update," "validate," or "confirm" your account information. Some phishing emails threaten a dire consequence if you don't respond. The messages direct you to a website that looks just like a legitimate organization's site. Instead, it's a fake site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go to a website from an email. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information from you via email. However, even if you visit the fake website and just enter your username and password, the phisher may be able to gain access to more information by just logging into your account.
The following is an example of a suspicious e-mail. Please note the "First Generic Bank" is not associated with Waukesha State Bank and please do not click the link embedded in the example. Remember, Waukesha State Bank will never ask for personal information, login credentials, or account numbers via email request. If you ever receive an email which appears to be from Waukesha State Bank asking for this type of information, contact us at 262-549-8500.
Back to top
This is an example of a phishing email attempt:
From: First Generic Bank, email@example.com
Subject: Please update your account information
Date: September 12, 20063:23 PM PST
Dear First Generic Bank user,
As a curteousy to our valued customers, First Generic Bank conducts regulary account informationn verification processes. During the most recent process, we found that we could not verify your information.
In order to make sure that your account information is not made vulnerable, please visit http://www.firstgenericbank.com.account-updateinfo.com.
Please click on the above link to our website and confirm or update your account information. If you do not do this within 48 hours of receipt of this email, you will not be able to use your First Generic Bank account or 30 days. This is an extra precaution we take to ensure your account remains secure.
First Generic Bank
If there is any doubt that the e-mail is legitimate, take the proper precautions and don't enter your information. Even if you believe the message is valid, following the guidelines above will prevent you from giving phishers your personal information.
Back to top
What to look for in a phishing email
- Generic greeting. Phishing emails are usually sent in large batches. To save time, Internet criminals use generic names like "First Generic Bank Customer". If you don't see your name, be suspicious.
- Forged link. Even if a link has a name you recognize somewhere in it, it doesn't mean it links to the real organization. Roll your mouse over the link and see if it matches what appears in the email. If there is a discrepancy, don't click on the link.
- Request for personal information. The point of sending phishing email is to trick you into providing your personal information. If you receive an email requesting your personal information, it is probably a phishing attempt.
- Sense of urgency. Internet criminals want you to provide your personal information now. They do this by making you think something has happened that requires you to act fast. The faster they get your information, the faster they can move on to another victim.
You can take steps to avoid phishing attempts by slightly modifying your browsing habits. To avoid getting hooked:
- Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the internet. E-mails and internet pages created by phishers may look exactly like the real thing. They may even have a fake adlock icon that ordinarily is used to denote a secure site. If you did not initiate the communication, you should not provide any information.
- If you believe the contact may be legitimate, contact the financial institution yourself. You can find phone numbers and websites on the monthly statements you receive from your financial institution or you can look the company up on a phone book or on the Internet. The key is that you should be the one to initiate the contact, using contact information that you have verified yourself.
- Never provide your password over the phone or in response to an unsolicited Internet request. A financial institution would never ask you to verify your account information online. Thieves armed with this information and your account number can help themselves to your savings.
- Review account statements regularly to ensure all charges are correct. If your account statement is late in arriving, call your financial institution immediately. If your financial institution offers electronic account access, periodically review activity online to catch suspicious activity.
- If you are uncertain about the information, contact the company through an address or telephone number you know to be genuine. If you are contacted about an account needing to be "verified" (or any other topic used by phishers), a good rule of thumb is to contact the company directly to check that the e-mail is legitimate. You could also type the website address into the address bar of the browser, rather than trusting any hyperlinks in the suspected phishing message.
If you get an email or pop-up message that asks for personal or financial information, do not reply, do not click on the link in the message, or cut and paste a link from the message into your Web browser. Phishers can make links look like they go one place, but actually send you to a different site. Legitimate companies don't ask for this information via email. If you are concerned about your account, contact the organization directly.
If you receive an unexpected e-mail saying your account will be shut down unless you confirm your billing information, do not reply or click any links in the e-mail body. Again, if you are concerned about the account, contact the organization directly.
If you unknowingly supplied personal or financial information, contact your bank and credit card company immediately.
Back to top
- Area codes can mislead. Some scammers send emails that appear to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use Voice over Internet Protocol technology (VOIP), the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. And delete any emails that ask you to confirm or divulge your financial information.
Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.
Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.
A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It's especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software "patches" to close holes in the system that hackers or phishers could exploit.
- Don't email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization's website, look for indicators that the site is secure, like a lock icon on the browser's status bar or a URL for a website that begins "https:" (the "s" stands for "secure"). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
- Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
- Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer's security.
Back to top
How to Report if You Have Been a Victim of a Phishing Scam
- Forward phishing emails to firstname.lastname@example.org – and to the company, bank, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems. You also may report phishing email to email@example.com. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing.
- If you believe you've been scammed, file your complaint at ftc.gov, and then visit the FTC's Identity Theft website at ftc.gov/idtheft. Victims of phishing can become victims of identity theft. While you can't entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk. If an identity thief is opening credit accounts in your name, these new accounts are likely to show up on your credit report. You may catch an incident early if you order a free copy of your credit report periodically from any of the three major credit reporting companies. See www.annualcreditreport.com for details on ordering a free annual credit report.
- Learn other ways to avoid email scams and deal with deceptive spam at ftc.gov/spam.
Back to top