Fictitious correspondence, allegedly issued by the Office of the Comptroller of the Currency (OCC) regarding funds purportedly under the control of the OCC and possibly other government entities, is in circulation. Correspondence may be distributed via e-mail, fax, or postal mail.
Any document claiming that the OCC is involved in holding any funds for the benefit of any individual or entity is fraudulent. The OCC does not participate in the transfer of funds for, or on behalf of, individuals, business enterprises, or governmental entities.
The correspondence may indicate that funds are being held by a specific financial institution and that the recipient will be required to pay an “approval fee” before the Federal Reserve Wire Network will release the funds to the beneficiary.
Attached is a copy of the “Interim Stop Order” document. E-mails being sent in regard to this scam appear to be sent from officials at the Federal Reserve Bank of Cleveland and the United States Department of Financial Institutions, but they are not. E-mail addresses utilized in the electronic correspondence may be from [firstname.lastname@example.org] or [email@example.com]. This material is being sent to consumers in an attempt to elicit funds from them and to gather personal information to be used in possible future identification theft.
Before responding in any manner to any proposal supposedly issued by the OCC that requests personal information or personal account information or that requires the payment of any fee in connection with the proposal, recipients should take steps to verify that the proposal is legitimate. At a minimum, the OCC recommends that consumers
- Contact the OCC directly to verify the legitimacy of the proposal (1) via e-mail at firstname.lastname@example.org; (2) by mail to the OCC’s Special Supervision Division, 400 7th St. SW, Suite 3E-218, MS 8E-12, Washington, DC 20219; (3) via fax to (571) 293-4925; or (4) by calling the Special Supervision Division at (202) 649-6450.
- Contact state or local law enforcement.
- File a complaint with the Internet Crime Complaint Center at www.ic3.gov if the proposal appears to be fraudulent and was received via e-mail or the Internet.
- File a complaint with the U.S. Postal Inspection Service by telephone at (888) 877-7644; by mail at U.S. Postal Inspection Service, Office of Inspector General, Operations Support Group, 222 S. Riverside Plaza, Suite 1250, Chicago, IL 60606-6100; or via the online complaint form at https://postalinspectors.uspis.gov/forms/MailFraudComplaint.aspx, if the proposal appears to be fraudulent and was delivered through the U.S. Postal Service.
Any information regarding the subject of this or any other alert that you wish to bring to the attention of the OCC may be sent to email@example.com.
For more information please visit http://www.occ.gov/news-issuances/alerts/2014/alert-2014-33.html
The internet is a powerful resource that many Americans have come to depend on for everyday activities like shopping, banking, and connecting with friends. Yet, for all the internet’s advantages, it can also make users vulnerable to fraud, identity theft and other scams. According to a Norton Cybercrime Report, 378 million adults worldwide were victims of cybercrime in 2013.
In recognition of National Cybersecurity Awareness Month, we’d like to offer the following tips to help consumers stay safe and secure online:
- Keep your computers and mobile devices up to date. Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats. Turn on automatic updates so you receive the newest fixes as they become available.
- Set strong passwords. A strong password is at least eight characters in length and includes a mix of upper and lowercase letters, numbers, and special characters.
- Watch out for phishing scams. Phishing scams use fraudulent emails and websites to trick users into disclosing private account or login information. Do not click on links or open any attachments or pop-up screens from sources you are not familiar with.
- Forward phishing emails to the Federal Trade Commission (FTC) at firstname.lastname@example.org – and to the company, bank, or organization impersonated in the email.
- Keep personal information personal. Hackers can use social media profiles to figure out your passwords and answer those security questions in the password reset tools. Lock down your privacy settings and avoid posting things like birthdays, addresses, mother’s maiden name, etc. Be wary of requests to connect from people you do not know.
- Secure your internet connection. Always protect your home wireless network with a password. When connecting to public Wi-Fi networks, be cautious about what information you are sending over it.
- Shop safely. Before shopping online, make sure the website uses secure technology. When you are at the checkout screen, verify that the web address begins with https. Also, check to see if a tiny locked padlock symbol appears on the page.
Read the site’s privacy policies. Though long and complex, privacy policies tell you how the site protects the personal information it collects.
The volume of cyber threats to mobile computing devices continues to increase as new applications and devices proliferate. McAfee reports that there were more than two million new mobile malware samples in 2013. Symantec reports that nearly 40% of mobile device users have experienced mobile cyber crime in the past 12 months. Some experts estimate that nearly 10% of applications sold on particular platforms are malicious. Most mobile malware gets installed when a user visits an infected website or downloads a malicious application, or clicks on a link or an attachment.
How can you protect yourself? Here’are some helpful tips for keeping the information on your mobile device safe.
- Lock the device
An easy way for malware to get on a device is for someone to manually install it. Locking your device with a strong PIN/password makes unauthorized installation of applications more difficult.
- Install applications from trusted sources
Users must recognize that some applications may be malicious. If an app is requesting more permissions than seems necessary, do not install it, or uninstall the application. Only install applications from trusted sources.
- Don’t jailbreak your device
To “jailbreak” or to “root” a device means to bypass important controls and gain full access to the operating system. Doing this will usually void the warranty and can create security risks. This also enables applications, including malicious ones, to bypass controls and access the data owned by other apps.
- Keep operating systems and apps up-to-date
Manufacturers, telecommunications providers, and software providers regularly update their software to fix vulnerabilities. Make sure your device’s operating system and apps are regularly updated and running the most recent versions.
- Use a mobile security software solution
Install antivirus software, if available.
- Block web ads and/or don’t click on them
Malware can find it’s way onto your mobile device through a variety of methods, including advertisements. The malicious advertisements are called “malvertisements.” Mobile ads accompany a significant amount of content found in mobile applications. Whether you find them annoying or amusing, cyber criminals have turned their attention toward using them to spread malware to unsuspecting users. What makes these “malvertisements” so dangerous is the fact that they are often delivered through legitimate ad networks and may not appear outright spam, but can contain Trojans or lead to malicious websites when clicked on. Some mobile devices have software that can block harmful sites.
- Don’t click suspicious links and attachments
While it may be difficult to spot some phishing attempts, it’s important to be cautious about all communications you receive, including those purported to be from “trusted entities”. Be careful when clicking on links or attachments contained within those messages.
- Disable unwanted services/calling
Capabilities such as Bluetooth and NFC can provide ease and convenience in using your smartphone. They can also provide an easy way for a nearby, unauthorized user to gain access to your data. Turn these features off when they are not required.
- Don’t use public Wi-Fi
Many smartphone users use free Wi-Fi hotspots to access data (and keep their phone plan costs down). Smartphones are susceptible to malware and hacking when leveraging unsecured public networks. To be safe, avoid logging into accounts, especially financial accounts, when using public wireless networks.
We are aware of the concerns surrounding the “Heartbleed Bug” (OpenSSL vulnerability).
Please be aware that our web site uses web servers, which are not affected by the Heartbleed Bug. Our technology personnel have been assessing all systems to determine if there are any other known vulnerabilities, and will continue to review those until we are confident we have covered all areas of concern.
If any vulnerabilities are identified, and action needs to be taken, we will notify customers immediately.
Today is National Agriculture Day, a day organized by the Agriculture Council of America, a nonprofit organization dedicated to increasing the public’s awareness of agriculture’s key role in modern society.
Ag Day is the perfect time to recognize and celebrate the abundance provided by modern agriculture. We salute and thank all of you involved in the agriculture industry. We know that food, clothing and other daily necessities don’t just arrive in stores, but rather, go through many steps on the way to our tables and homes.
Central National Bank is proud to have served local farmers and ranchers and agri-businesses for the past 130 years. Money for Life isn’t just a tagline for us… we intend to continue to do all we can to assist our agriculture clients in any way we can.
We’re in the process of finalizing and releasing new and improved mobile apps! Over the next week, you will see a new version of our apps available in the Google Play Store and iTunes. Once the new app is available, you can download and install it and then uninstall the previous version. You’ll also be prompted within the current version of the app to download the new version of our app once it’s available.
The new apps will feature a much-improved user interface as well as additional features such as CNB branch location listings and debit card integration! Stay tuned for more information, and thanks for your patience as we go through this process.
A screenshot of the “Home” screen on the new iOS app is shown below, first, and the Android version, second.
Customers have reported receiving telephone calls regarding Government Grant Scams. As usual, we like to let you know when a specific type of scam is popular, so you can be better prepared to avoid these situations yourself.
The scammer will say something like, “Because you pay your income taxes on time, you have been awarded a free $12,500 government grant! To get your grant, simply give us your checking account information, and we will direct-deposit the grant into your bank account!”
This is fraud, plain and simple. For more information on Goverment Grant Scams visit the FTC’s website at http://www.consumer.ftc.gov/articles/0113-government-grant-scams#.UwT_r-ulg0k.email
We’ve had several reports that customers are receiving automated telephone calls from a restricted number. The call informs the customer that there has been fraud on their account, to continue press 4 (or another number). These are phishing calls designed to get customers to provide account information. Please do not provide account information if this happens. Contact your local branch with questions or concerns.
October 2014 marks the 130th year of service for Central National Bank, but we’re really excited, so we’re celebrating all year. Watch for specials and other fun stuff throughout the year, there’s bound to be something that interests you!
To sign up contact your local branch.
There have been daily news stories about the Target data breach and how it may affect shoppers. This is a great time for scammers to send out phony emails from Target pretending to help. What they are really trying to do is to trick you into giving them your personal information.
If you get an email that says it is from Target, look for the following to make sure you don’t get scammed.
- If any email asks for your personal or financial information, it is most likely a scam.
- If you receive an email that asks for your debit or credit card number, do not reply. No legitimate business will ask for your personal information through unsecure methods like email.
- If there are links in the email, do not click on them.
- Scammers create links and sites that look like the real deal. These phony sites can install viruses to your computer or direct you to spoof sites that exist to steal your information. Hovering over a link can reveal a deliberately misspelled web address, or a completely different destination. To be safe, you should typed the URL directly into your browser.
- Be aware that scammers may send emails promising a free gift card, a new tablet or computer, or even a job in exchange for your personal information. Remember, if it sounds too good to be true, it probably is too good to be true.