Search
Loading Search Results...
Popular Links
Locations
Loading Locations...
Loading Search Results...
Loading Locations...
Follow the tips on our 'Stay Protected' page and be aware of any suspicious activity on your bank or credit card statements or on your credit report. It is important that you report these activities quickly in order to put a stop to the fraud and minimize the impact these activities have on your credit score and finances.
Report any suspected fraud or identity theft activity concerning your Online accounts or services immediately to Customer Service from 7 am to 6 pm weekdays. You should also contact the following agencies:
Federal Trade Commission (FTC)
Identity Theft Hotline: (877) ID-THEFT
www.ftc.gov/idtheft
Equifax: (800) 525-6285
Experian: (888) 397-3742
TransUnion: (800) 680-7289
Contact your credit card companies if you suspect your credit card numbers have been compromised. Their numbers can be found on the back of your credit cards.
Below is a list of the most active and dangerous fraud attacks discovered around the world. Staying informed is the best way to avoid falling victim to one of these scams.
Tech Support Fraud involves a criminal claiming to provide customer, security, or technical support in an effort to defraud unwitting individuals. This type of fraud continues to be a problematic and widespread scam.
Criminals may pose as a security, customer, or technical support representative offering to resolve such issues as a compromised e-mail or bank account, a virus on a computer, or to assist with a software license renewal. Some recent complaints involve criminals posing as technical support representatives for computer or printer companies, cable companies, or government agents, even offering to recover supposed losses related to tech support fraud schemes or to request financial assistance with “apprehending” criminals.
Initial contact with the victim typically occurs through the following methods:
Tech support fraud was originally an attempt by criminals to gain access to devices to extort payment for fraudulent services. However, criminals are creating new techniques and versions of schemes to advance and perpetuate fraud. Never give unknown, unverified persons remote access to devices or accounts and remember that legitimate customer, security, or tech support companies will not initiate unsolicited contact with individuals. You should also ensure all computer anti-virus, security, and malware protection is up to date. Some victims report their anti-virus software provided warnings prior to attempt. Read our Identity Theft Safety Tips for more information on how to fight fraud and what to do if you become a victim.