Opting out also means the online content and advertising you receive on our non-servicing sites (before you log in) will be untailored and will not be based on your online behavior or your relationship with us. In addition, financial advisors/Client Managers may continue to use information collected online to provide product and service information in accordance with account agreements. When you opt-out, we will not use information based on online Site behavior to provide online and offline tailored content and advertising to you, but you may still receive untailored advertising from Bank of America. Instead, call the number on your statement or back of your card. Hang up if you receive a suspicious call from someone saying they're from the bank.However, we'll never ask you to send money to anyone, including yourself, or request that you share a code to resolve fraud. Know that Bank of America may send you a text to validate unusual activity.Be wary if someone tells you to click through bank warning messages.Don't grant remote access to your computer to anyone you don't know.Verify all requests before acting on them. Be cautious if someone you don't know asks you to download software.Don't call any phone numbers the imposter shares with you. Don't click unsolicited pop-ups, links or attachments you receive by text or email.They may even send you an email or letter to make the scam look more legitimate. Phase 3: Government imposter - Then, you'll receive a third call from another imposter claiming to be a government official who is confirming the transaction.They'll tell you to electronically move money to a “safe” account, such as one with the Federal Reserve or another U.S. Phase 2: Bank imposter - Next, you'll receive a call from an imposter claiming to be from your bank, saying fraud is happening on your account.Then they'll ask you to log into Online Banking and look for fraudulent charges. They'll ask you to call a number and download software allowing them remote access to your computer to resolve the “issue”. Phase I: Tech Support - The impersonator claims to be from a legitimate tech support company and claims your computer has been hacked.Some scammers now combine multiple scam types and take a phased approach to try to gain your trust and make scams more convincing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |