Fraudsters could be targeting you – Together Against Fraudsters
As Emirates NBD, we thrive in providing our customers the finest banking experience, it’s also our goal to ensure that they are safe from frauds.
If you believe that you are a victim to fraud, report your case to 16664 from inside Egypt, and +2 (02) 23661000 from outside Egypt. You can also block your debit or credit card instantly from the Mobile Banking Application.
#SecureYourAccount
Protecting your identity matters at all times. Our latest film, "It Wasn't Me", brings you the do’s and don’ts of keeping your identity and bank account secure at all times.
Watch the film to find out all the things a bank won’t ask, but a fraudster will.
We're here to help.
#SecureYourAccount at all times.
Short for voice-based-phishing, 'Vishing' is a criminal mechanism where people are attracted to share their personal identity data and financial account credentials over the telephone, either to an Interactive voice response (IVR) machine or a person.
These calls always try to convince bank customers that there's an issue with their banking account or debit/credit card or that they won a big prize amount, which attract them to share personal details with them over the call.
Phishing is a cybercrime in which a target or targets are contacted by email, by someone acting as a legitimate institution to attract individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
It uses deceptive e-mails and fake websites to gain this personal information that is then used to access important accounts and can result in identifying theft and financial loss.
Card skimming is the act of using a skimmer to illegally collect data from the magnetic stripe of a credit, debit or ATM card. These skimmers are installed in the ATM or POS machines. This information, copied onto another blank card's magnetic stripe, is then used by an identity thief to make purchases or withdraw cash in the name of the actual account holder.
Check the ATM or the POS machine for any abnormalities and look for any unusual or strange additions to the machine.
Ecommerce fraud is an illegal transaction made in a web-shop. The big difference between physical and online payment fraud is, that, the card does not need to be present when making an online transaction. The fraudster simply needs the card information. With a large amount of card information stored and transferred online, it has become easier for fraudsters to get access to this information.
Accordingly, we highly pursue our customers to use their cards on trusted websites and avoid fake ones.
Ensure to have an updated browser software as it helps to add protection against fake websites. Modern browsers warn you if you visit fake websites and it is harder for viruses to infect them.
However, if you suspect any transactions on your debit/credit cards, you can instantly block your card from the Mobile Banking Application.
Safeguard your details and protect yourself from identity fraud
Email Security Tips
Use your email safely by keeping in mind the following
Don't reply to any e-mail that requests your personal information.
Be very suspicious of any business or person who asks for your password, PIN (Personal Identification Number), or other highly sensitive information.
Learn to spot fake emails and fake websites
Fraudsters set them up to deceive people into giving away their passwords and bank details. The technical word for this is 'phishing'.
For example, they might send you an email that looks like it comes from us and it might contain a link to a website that looks like this one. When you try to log on, they can steal your password. They could also ask you to make a phone call or reply by email.
They are good at making their emails and websites look realistic. But you can often spot the fake ones:
If in doubt, check with us first. Avoid clicking on links in emails. A starting point on protecting yourself online is to use the software we refer to from this site. Rapport software and up-to-date web browsers block fake websites.
Minimise the use of attachments
Copy and paste text as often as possible.
Question unsolicited/unwanted documents
Unsolicited bulk mail and commercial email can put you and your organization at risk. Questioning it means not opening it, not passing it on, and notifying your system administrator immediately.
Never respond to spam email
For a spammer, one "hit" among thousands of mailings is enough to justify the practice. Instead, if you want a product that is advertised in a spam email, go to a Web site that also carries the product, inquire there, and tell them you do not approve of spam methods and will not support a company that uses spammers.
Never respond to the spam email's instructions to reply with the word "remove"
This is just a trick to get you to react to the email – it alerts the sender that a human is at your address, which greatly increases its value. If you reply, your address is placed on more lists and you receive more spam.
Never sign up with sites that promise to remove your name from spam lists
These sites are of two kinds: genuine AND spam address collectors. The first kind is ignored (or exploited) by spammers, and the second is owned by them. In both cases your address is recorded and valued more highly because you have just identified it as read by a human.
Question executable programs received via email
This is a common means for passing on viruses. Do not open them, do not pass them on, and notify your system administrator if you receive them.
Disable macros on your machine
To do this, you will need to open the application. On Word 2000, select Tools, then select Macros, then select Security, and then checked High: Only signed macros from trusted sources will be allowed to run. Unsigned macros are automatically disabled
Make sure that file extensions are viewable
This will alert you to files of the following types: .exe, .vbs, and .shs. To view file extensions in Windows select the Start menu, then select Settings, then select Control Panel, then select Folder Options, then select View, then UNCHECK the command that reads Hide File Extensions for Known file Types.
Notify the person you received an infected file from
This helps them correct the problem within their system before passing the virus on to other users.
Monitor your transactions.
Review your order confirmations, credit card, SMS transactions, and bank statements as soon as you receive them to make sure that you are being charged only for the transactions you made. Immediately report any irregularities.
Keep your virus protection up-to-date
If you experience anything that arouses your suspicions, please reach our call center representative on 16664 from inside Egypt, and +2 (02) 23661000 from outside Egypt
Protect your mobile phone
Your mobile phone may contain personal information.
You may even use it for internet banking and online shopping.
For example, they might send you an email that looks like it comes from us and it might contain a link to a website that looks like this one. When you try to log on, they can steal your password. They could also ask you to make a phone call or reply by email.
You may want to think about:
If you lose your phone report it to your mobile phone provider immediately. Make a note of your phone's IMEI number (dial *#06# to get it). This will make it easier for your phone company to disable a stolen phone.
ATM Security Tips
Here are some of the ways by which you can protect yourself every time you use your ATM
You should always be aware of the security when using an ATM and should always follow these general tips to ensure your personal information is kept safe:
Online Banking Security
Protect your information every time
You have to protect your information at all times over the internet or during your normal banking activities by simply following these tips:
Protect your Password and Personal Information:
Protect your Computer and Internet session:
Update your browser
Modern browser software adds protection against fake websites.
The program you use to look at websites is called a web browser. Modern browsers warn you if you visit fake websites and it is harder for viruses to infect them.
If you have updated your computer regularly, it is likely that you are already running either the latest version of Microsoft Internet Explorer / Google Chrome / Mozilla Firefox (on Windows PCs) or Safari (on Macs). It is a good idea that you install an up-to-date web browser. There are several to choose from and they are all free.
Keep your software up-to-date
It's harder for viruses to infect updated software.
You can check if your Windows computer is up to date in the Action Center in Windows 7. For Windows 10, the Update & Security link is located in the Windows Settings menu.
Don't share private information online
Double-check privacy settings on social networking sites.
What's your mother's maiden name? What's the name of the first school you went to? What was your favorite subject at school? What's your address? Birthday? Phone number?
All these information is useful to people who want to steal your identity or break into your online banking. You wouldn't give this information away to a stranger on the street but if you use social networking sites, such as Facebook, Twitter or MySpace, you could be over-sharing personal data.
You may want to think carefully about the information you put into your profiles on sites like these. It is also a good idea that you check the privacy settings on each site that you use to make sure you only share personal information with people you trust.
Please also remember that you must take all reasonable precautions to keep your details safe and prevent any unauthorised use of any cards and security details. If any information forms part of your security details, you should make sure that you do not disclose it to anyone else.
Look after your paper statements
Fraudsters use personal information from different sources to steal people's identities.
Viruses are one way to do it. But they also use paper documents of your accounts containing personal details, such as receipts and bank statements.
Fraudsters use many methods such as searching in dustbins to obtain these documents. You should take simple precautions to keep your details safe and to dispose these documents safely, such as shredding them before you bin them.
Understand how criminals use the internet
Criminals are in it for the money
There are many ways for them to make money online:
We take your online banking security and privacy very seriously. Protecting yourself and your money takes a bit of know-how and the right software.
Avoid online fraud and con tricks
If it's too good to be true, it probably is
When it comes to protecting yourself and your money on the internet be wary of ridiculous deals.
Criminals may contact you by email, through websites you use, via SMS or even by phone. It pays to be on your guard as they can be quite convincing.
Here are some warning signs:
If an attachment looks suspicious, don't open it. Don't install software unless it comes from a website you trust. If it doesn't feel right, take your time.
If you suspect that there is a problem with your online banking, you can always talk to us first.
Reporting Fraud
Follow the below guidelines if you faced fraud
Contact your bank(s) and credit card issuers immediately to ensure the following are done:
Maintain a written chronology of what happened, what was lost, and the steps you took to report the incident to the various sources. Be sure to record the date, time, contact telephone number, person you talked to, and any relevant report or reference number and instructions.
For further information or queries, please call 16664 from inside Egypt, and +2 (02) 23661000 from outside Egypt
Don't reply to any e-mail that requests your personal information.
Be very suspicious of any business or person who asks for your password, PIN (Personal Identification Number), or other highly sensitive information.
Learn to spot fake emails and fake websites
Fraudsters set them up to deceive people into giving away their passwords and bank details. The technical word for this is 'phishing'.
For example, they might send you an email that looks like it comes from us and it might contain a link to a website that looks like this one. When you try to log on, they can steal your password. They could also ask you to make a phone call or reply by email.
They are good at making their emails and websites look realistic. But you can often spot the fake ones:
If in doubt, check with us first. Avoid clicking on links in emails. A starting point on protecting yourself online is to use the software we refer to from this site. Rapport software and up-to-date web browsers block fake websites.
Minimise the use of attachments
Copy and paste text as often as possible.
Question unsolicited/unwanted documents
Unsolicited bulk mail and commercial email can put you and your organization at risk. Questioning it means not opening it, not passing it on, and notifying your system administrator immediately.
Never respond to spam email
For a spammer, one "hit" among thousands of mailings is enough to justify the practice. Instead, if you want a product that is advertised in a spam email, go to a Web site that also carries the product, inquire there, and tell them you do not approve of spam methods and will not support a company that uses spammers.
Never respond to the spam email's instructions to reply with the word "remove"
This is just a trick to get you to react to the email – it alerts the sender that a human is at your address, which greatly increases its value. If you reply, your address is placed on more lists and you receive more spam.
Never sign up with sites that promise to remove your name from spam lists
These sites are of two kinds: genuine AND spam address collectors. The first kind is ignored (or exploited) by spammers, and the second is owned by them. In both cases your address is recorded and valued more highly because you have just identified it as read by a human.
Question executable programs received via email
This is a common means for passing on viruses. Do not open them, do not pass them on, and notify your system administrator if you receive them.
Disable macros on your machine
To do this, you will need to open the application. On Word 2000, select Tools, then select Macros, then select Security, and then checked High: Only signed macros from trusted sources will be allowed to run. Unsigned macros are automatically disabled
Make sure that file extensions are viewable
This will alert you to files of the following types: .exe, .vbs, and .shs. To view file extensions in Windows select the Start menu, then select Settings, then select Control Panel, then select Folder Options, then select View, then UNCHECK the command that reads Hide File Extensions for Known file Types.
Notify the person you received an infected file from
This helps them correct the problem within their system before passing the virus on to other users.
Monitor your transactions.
Review your order confirmations, credit card, SMS transactions, and bank statements as soon as you receive them to make sure that you are being charged only for the transactions you made. Immediately report any irregularities.
Keep your virus protection up-to-date
If you experience anything that arouses your suspicions, please reach our call center representative on 16664 from inside Egypt, and +2 (02) 23661000 from outside Egypt
You may even use it for internet banking and online shopping.
For example, they might send you an email that looks like it comes from us and it might contain a link to a website that looks like this one. When you try to log on, they can steal your password. They could also ask you to make a phone call or reply by email.
You may want to think about:
If you lose your phone report it to your mobile phone provider immediately. Make a note of your phone's IMEI number (dial *#06# to get it). This will make it easier for your phone company to disable a stolen phone.
You should always be aware of the security when using an ATM and should always follow these general tips to ensure your personal information is kept safe:
You have to protect your information at all times over the internet or during your normal banking activities by simply following these tips:
Protect your Password and Personal Information:
Protect your Computer and Internet session:
The program you use to look at websites is called a web browser. Modern browsers warn you if you visit fake websites and it is harder for viruses to infect them.
If you have updated your computer regularly, it is likely that you are already running either the latest version of Microsoft Internet Explorer / Google Chrome / Mozilla Firefox (on Windows PCs) or Safari (on Macs). It is a good idea that you install an up-to-date web browser. There are several to choose from and they are all free.
You can check if your Windows computer is up to date in the Action Center in Windows 7. For Windows 10, the Update & Security link is located in the Windows Settings menu.
What's your mother's maiden name? What's the name of the first school you went to? What was your favorite subject at school? What's your address? Birthday? Phone number?
All these information is useful to people who want to steal your identity or break into your online banking. You wouldn't give this information away to a stranger on the street but if you use social networking sites, such as Facebook, Twitter or MySpace, you could be over-sharing personal data.
You may want to think carefully about the information you put into your profiles on sites like these. It is also a good idea that you check the privacy settings on each site that you use to make sure you only share personal information with people you trust.
Please also remember that you must take all reasonable precautions to keep your details safe and prevent any unauthorised use of any cards and security details. If any information forms part of your security details, you should make sure that you do not disclose it to anyone else.
Viruses are one way to do it. But they also use paper documents of your accounts containing personal details, such as receipts and bank statements.
Fraudsters use many methods such as searching in dustbins to obtain these documents. You should take simple precautions to keep your details safe and to dispose these documents safely, such as shredding them before you bin them.
There are many ways for them to make money online:
We take your online banking security and privacy very seriously. Protecting yourself and your money takes a bit of know-how and the right software.
When it comes to protecting yourself and your money on the internet be wary of ridiculous deals.
Criminals may contact you by email, through websites you use, via SMS or even by phone. It pays to be on your guard as they can be quite convincing.
Here are some warning signs:
If an attachment looks suspicious, don't open it. Don't install software unless it comes from a website you trust. If it doesn't feel right, take your time.
If you suspect that there is a problem with your online banking, you can always talk to us first.
Contact your bank(s) and credit card issuers immediately to ensure the following are done:
Maintain a written chronology of what happened, what was lost, and the steps you took to report the incident to the various sources. Be sure to record the date, time, contact telephone number, person you talked to, and any relevant report or reference number and instructions.
For further information or queries, please call 16664 from inside Egypt, and +2 (02) 23661000 from outside Egypt
Thank you for your feedback!
We'd love to know.