The online world is full of scams and fraud, and if you don't know how to protect yourself from them, you’d be jeopardising your financial security. Read on to find out how you can stay safe while banking online.
We will never ask for sensitive information like your Digital Banking user ID or password, account number, credit/debit card number, CVV, PIN, OTP, answers to verify your identity, etc.
Please do not provide or share these details via email/SMS or on calls received from individuals claiming to be from RAKBANK.
Kindly report any suspicious activity immediately to firstname.lastname@example.org. You can also call our Phone Banking unit at 04 213 0000 to confirm if the call you have received was legitimate.
Secure your computer
Do not miss important banking signposts designed to provide you with fraud-detection information
Be careful while travelling
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit.
Smishing (also known as SMShing) is the mobile phone version of phishing. An example of smishing fraud would be a text message that appears to be sent from a legitimate source, such as a bank or credit card company, that urgently requests the recipient to call a phone number or follow a link in the message. The phone number or website will then ask for sensitive account or personal information.
Malware is an umbrella term used to refer to various forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
Ransomware is a security threat that has data-kidnapping capabilities. It is a malicious software that denies you access to your computer or files until you pay a ransom.
Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Spam distributors often use spoofing to get recipients to open and possibly even respond to their solicitations. Spoofing can be used legitimately.
Shoulder surfing, in computer security, refers to using direct observation techniques, such as looking over someone's shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and similar data.