Cyber Threat Report: A Cash App Con
When it comes to paying the babysitter, splitting bills, or lending a friend a few bucks, cash transfer apps are super convenient. These apps include Venmo, PayPal, Zelle, Cash App, and more. As convenient as these apps are, beware – they are susceptible to scams.
Just last week, many Square’s Cash App users filed complaints, reported fraud, and are out of a lot of money. Barry Moore, President and CEO of the Central Virginia Better Business Bureau, explained how the scam works, “Most of the complaints to the BBB have come from Cash App customers who did Google searches after encountering app issues. Their searches let to believable but bogus Cash app websites and fake customer service numbers. Scammers are standing by, ready to steal your money.”
Cash App is aware of the problem and released this statement, “We are always working to protect our customers, which includes educating them about phishing scams. As a reminder, the Cash App team will never ask customers to send them money, nor will they solicit a customer’s PIN or sign-in code outside of the app.”
Click here to read more about this story.
Your phone isn’t just a phone anymore, it is everything that you care about. It stores everything from work email and documents to your credit card information. Most likely, you store all of your personal and business data in your phone. That’s why it’s such an attractive target for hackers and why you need to practice smart cybersecurity guidelines.
Don’t put yourself at risk. Secure your smartphone with these safety precautions:
- Always keep your operating system up to date.
- Activate your ‘find my phone’ feature.
- Activate a screen lock. After a short period of inactivity, your phone should auto-lock itself.
- Set up a more complicated passcode. Use a unique and lengthy password or pattern. If possible, use fingerprint or Face ID.
- Enable two-factor authentication. Every time you sign in on a new device or new location, two-factor authentication will require you to verify your identity with a unique and time-sensitive code.
- Set your phone to wipe itself after 10 failed password attempts.
- Activate an automatic backup in case your phone is lost, stolen, or wiped after the failed attempts to unlock it.
- Regularly change your phone, cloud, and app passwords.
- Avoid using public Wi-Fi and only use secure Wi-Fi, especially when accessing sensitive data!
- Keep your Bluetooth turned off – it’s not a secure way to communicate.
- Only use trusted charging stations and never plug your phone into a computer you don’t trust.
- If you have an iPhone, disable Siri on the lock screen.
- Mind your apps. Always use official app stores to download apps and make sure you disable the option to allow installations of third-party apps. Check the permissions too, a game doesn’t need permission to access your text messages, right?
- Update your apps as outdated apps leave your phone exposed to new viruses and attacks.
- Beware of phishing – it’s so much harder to spot on your cellphone than on your computer. Never click on short, suspicious links and be careful of attachments that you download.
Remember, your cell phone is just as vulnerable to cyber-attacks as your computer. Implement and enforce these easy security layers to keep your data protected.
4332 Wheeler Road #105, Augusta GA 30907