Utah Community Credit Union
UCCU be fraud smart
MEET THE EXPERTS UCCU PROTECTS YOU PROTECT YOURSELF CURRENT FRAUDS & SCAMS ARE YOU A VICTIM? GLOSSARY
UCCU be fraud smart

DARK WEB 
The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

DATA BREACH 
A security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.

IDENTITY THEFT 
When a fraudster uses someone else’s name, social security number or other personal information to establish accounts in their name.

MAIL FRAUD
Identity thieves steal someone’s mail (which may include pre-approved credit card applications) to obtain their personal information. Mail fraud is the #1 form of fraud in the US.

MALWARE
Short for “malicious software,” any harmful software that affects a computer, including computer viruses, worms, Trojan horses and spyware.

PHARMING
When hackers redirect internet traffic from one website to a different, identical-looking site in order to trick someone into entering their username and password into the database on their fake site. Similar to spoofing.

PHISHING
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

PRETEXTING
The collection of an individual’s personal information under false pretenses, typically over the phone or via e-mail.

SHOULDER SURFING
The procedure fraudsters use to spy on someone when they enter their PIN code into an ATM or Pont of Sale device, either by looking over their shoulder or watching from a distance (possibly with binoculars).

 

SKIMMING
A method fraudsters use to steal personal information by swiping a card into a hidden device or a device that resembles part of an ATM or Point of Sale device. Skimming is commonly done by an employee of a restaurant, gas station, or any other place where people swipe cards.

SOCIAL ENGINERING
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

SPAM
Unsolicited commercial emails. Spam comes from legitimate companies as well as questionable sources.

SPOOFING
A fraudulent website or email that appears to be from a well-known company and attempts to get someone to provide, update, or confirm their personal information. Similar to pharming.

SPYWARE
General term for any technology that gathers information about a person or organization without their knowledge.

TROJAN HORSE
When someone downloads something they want and also gets something else they don’t want, cleverly hidden inside (yes, just like the famous story).

VIRUS
Malware that can copy itself like a biological virus. Viruses typically lie dormant inside of an executable file until someone runs that file, when it spreads to other executable files on a system.

VHISHING
Using Voice over Internet Protocol (VoIP) phone numbers to steal user information.

WORM
Like a virus, a worm self-replicates and uses the internet to spread from computer to computer. Unlike a virus, a user doesn’t need to download or run any files to become infected by a worm. An internet connection is all that is necessary.

 


 

how uccu protects you how to protect yourself current scams and frauds apply now why wait? start the application process now
NCUA Equal Housing Lender
Utah Community Credit Union, PO Box 1900, Provo, Utah 84603-1900, 1 (800) 453-8188. All Rights Reserved. Utah Community Federal Credit Union does business as (DBA) Utah Community Credit Union. Unauthorized account access or use is not permitted and may constitute a crime punishable by law.