HSBC France

Security

Common Fraud

Protect yourself: be aware of the risks of fraud.

Phishing

This technique aims to collect personal information (PINs, etc.) by e-mail.

The idea is simple:

Fraudsters send e-mails that could have come from your bankand using the bank's identity, in order to obtain confidential information such as credit card numbers or access to your Remote Banking PINs.

In detail:

Criminals use fake emails and fake websites. They set them up to con people into giving away passwords and bank details. The technical word for this is 'phishing'.

For example, they might send you an email that looks like it comes from us and it might contain a link to a website that looks like this one. When you try to log on, they can steal your password. They could also ask you to make a phone call or reply by email.

They are good at making their emails and websites look realistic. But you can often spot the fake ones:

  • Dodgy looking email or web addresses
  • Poor design, typos or bad spelling
  • They ask you to do something unusual
  • A site doesn't display the padlock symbol in the address bar when you log in

If in doubt, check with us first. Avoid clicking on links in emails.
A starting point on protecting yourself online is to use the software we refer to from this site. Rapport software and up-to-date web browsers block fake websites.

Mules

Mules are people recruited by e-mail by fraudsters to carry out money laundering.

The idea is simple:

You receive an email that invites you to become the employee of a
so-called International Finance Corporation (a fake employment contract
is sometimes attached to lend credibility to the proposal) and to have funds transferred via your bank account, in return for a share of the money.

In detail:

Funds are transferred to your bank account and you are asked
to transfer some of the funds to another account. The amount transferred is thus laundered and the remainder is your payment. This makes you an accomplice to fraud. You are liable to prosecution.

Pharming

This technique involves diverting you to a fake site.

The idea is simple:

When you type an internet address (URL) into your browser, the domain name is translated into an illegitimate IP address by means of a global directory. Any confidential information entered is captured by the hacker.

In detail:

The risks run are the same as for "phishing". The difference with "phishing" is that you don't receive an e-mail prompting you to go to the website.

Spam

Spam is the receipt of unsolicited e-mails.

The idea is simple:

You can buy anti-spam software to filter unwanted e-mails or to remove you from mailing lists until you delete the spam. Usually, spams are not dangerous, they are just advertising. However sometimes e-mails may include attachments that contain a virus. In other cases, they may consist of phishing.

Viruses

Viruses are small software programs that spread between computers.

The idea is simple:

Each time the program is opened, the virus is transmitted and can infect other programs or damage your computer. Viruses often make your computer unusable by destroying essential files or flooding the machine's resources.

In detail:

Computer viruses are sent as an attachment through e-mail, shared folders and downloaded programs. Some viruses work primarily by e-mail. They replicate by automatically sending themselves to the entire email address book on the infected computer.

Spyware

Spyware are small spying programs that install themselves on your computer.

The idea is simple:

When installing software or visiting a web page, little spyware programs are installed without your knowledge. In contrast to viruses they do not spread. They are often designed to gather information on your browsing habits.

In detail:

Spywares are usually not dangerous, they are just advertising. However sometimes they may include a virus. In other cases, they may consist of pharming or phishing.

Trojans

They collect personal information or open a back door to the computer.

The idea is simple:

A Trojan is based on the same principle as a virus or spyware: it installs itself to damage the computer or retrieve confidential information.

In detail

The Trojan will attempt to use the computer to divert, distribute, or destroy information, or to open a door that will allow a hacker to take remote control of the computer

Protection software

Protect your home PC
against online fraud.
Download now

Close overlay window

5 recommandations pour garantir une sécurité efficace :

  1. Ne communiquez jamais vos codes par e-mail ou téléphone.
  2. Déconnectez-vous après avoir consulté vos comptes sur Internet.
  3. Conservez votre identifiant et votre code secret de Banque à Distance séparément.
  4. Mémorisez le code confidentiel de votre carte bancaire.