Personal Alert Attention Clients: Our online, mobile and automated telephone banking services will be unavailable the weekend of July 22-23, starting at 8:00pm ET on Friday, July 21, while we make important system updates. All services will resume Monday, July 24.
BOB - Business Online Banking Alert Attention Clients: Our online, mobile and automated telephone banking services will be unavailable the weekend of July 22-23, starting at 8:00pm ET on Friday, July 21, while we make important system updates. All services will resume Monday, July 24.
Download our e-Treasury Secure Browser
Download the Sterling e-Treasury Token Client
CBO - Business Online Banking Alert Attention Clients: Our online, mobile and automated telephone banking services will be unavailable the weekend of July 22-23, starting at 8:00pm ET on Friday, July 21, while we make important system updates. All services will resume Monday, July 24.
Published on April 14, 2020 | Kevin Thompson
You just checked your bank accounts, like you normally do everyday, but today there is a big problem — your checking account is negative! You were sure that you had enough money to cover your transactions, but what about those three transactions for $400 at Walmart in Texas? You’ve never been to Texas and your debit card is in your wallet; how could these transactions have happened? Unfortunately you’re not alone, you have just fallen victim to debit and credit card fraud.
These fraudsters are able to steal your debit card information a couple different ways. One is a skimming device (pictured above), which captures all of your card information when you swipe your card at an ATM or a credit card processing machine. Once crooks have obtained your information through a skimmer, they can sell your info online and use it to make purchases. Card information is also stolen when computer hackers install a virus into a merchant’s card processing software, which allows them to steal the card information as the data passes through the authorization process.
So, how did they use your stolen information to buy things in Texas? Most likely, they used a device to clean magnetic stripes off another debit or credit card and re-encode it with your stolen information. The fraudsters can even use a hotel room key to make purchases using your debit card information. That’s right, the person who made the purchases at Walmart in Texas (most likely a self-checkout terminal) could have been using a hotel room key with your debit card information to buy those flat screen TVs. If the fraudsters are not daring enough to go into an actual store, they can place an order online or over the phone with your debit card information and have the goods shipped to them (most likely a P.O. Box opened with fraudulent identification).
Don’t cut up all of your cards and go back to cash just yet. Banks work very hard to detect these card compromises and prevent the fraud from happening. At Webster, we have a number of processes in place to help prevent and minimize fraud losses and we collaborate with other banks and law enforcement to make sure the people responsible are brought to justice.
Know the different kinds of skimming devices
Card reader overlays: plastic devices that fit over ATMs and other card processing machines
Hidden cameras: usually located very close to an ATM and can capture your card number and PIN
PIN capture overlays: these fit over a real ATM keypad and capture your PIN
ATM faceplates: these are placed over an ATM keypad and capture your card info and PIN
Look for signs of tampering. Check the ATM or card processing machine before using. If there are multiple scratches around the opening or if you see an odd piece of plastic or other material that doesn’t look like it fits, this could be a sign of a skimmer. Also, tiny holes in an ATM machine where a camera could be hidden or loose wires around the machine could be a red flag.
Avoid ATMs in remote locations and credit card processing machines at questionable businesses. It is safer to use an ATM in a high-traffic area; ideally an ATM at an actual bank when possible or at a business that you know to be reputable and have gone to before.
Be aware of your surroundings when at the ATM; watch for others standing close by and try to cover the keyboard as much as possible so others can’t see you key in your PIN.
Review your bank accounts daily.
Sign up for alerts through online and mobile banking.
Make sure the bank has your most current contact information in case of a breach.
If you see any unauthorized transactions, call the bank as soon as you can so a dispute can be filed and we can reimburse you for the fraudulent charges.