Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Alert: Hackers Target Mobile Banking Apps, Warns FBI

Alert: Hackers Target Mobile Banking Apps, Warns FBI

More people than ever are utilizing the conveniences of the Internet and mobile apps to avoid unnecessary human contact during the coronavirus pandemic. In fact, mobile banking alone has increased by 50 percent over the last few months, nationwide. In a recent PSA, the FBI warned that hackers are likely to be targeting mobile banking apps.

According to the FBI’s public service announcement:

“As the public increases its use of mobile banking apps, partially due to increased time at home, the FBI anticipates cyber actors will exploit these platforms.”

The PSA is definitely worth a read, and includes some good tips and potential threats that are out there. It’s worth noting that many of the tips apply to a lot more than just mobile banking.

If you are in a rush, here are some of the best tips to take away from it to protect yourself.

Utilize 2-Factor Authentication

You’ll see this called 2-Factor Authentication, Multi-Factor Authentication, 2FA, or MFA. That’s where a website or service will email or text you a little code to log you in. Some services will utilize an authentication application, such as Google Authenticator, Authy, Duo, or LastPass Authenticator. Using an authentication app is definitely a safer way to go, as they are harder to spoof than email and text, but anything is better than nothing.

You should always set up 2-Factor Authentication on any account you have, especially if it deals with sensitive information or your money.

Always Have Good Password Hygiene

Use strong passwords that contain lower and uppercase letters, numbers, and symbols. Your passwords should always be unique and not be used for multiple accounts, and your passwords should never contain information that could be guessed like your name, birthdays, your pets, and so forth.

If Something Seems Fishy, Don’t Install It

Never install something you aren’t 100 percent sure about. If your bank has a mobile app, be sure to download their official app, which they should have linked in their website. Avoid installing a mobile banking app that is sent to you via email or text message, because there is a chance that it could be bogus. 

When In Doubt, Call the Bank

We’re really glad the FBI covered this tip too, as it’s often glossed over. If you have any suspicion that something is strange or not working correctly, just call your bank. Go to their official website, or use the number on the back of your card or from a statement. 

If you accidentally called the number from the banking app, and that phone call seems suspicious, immediately hang up and be sure you use the number from their official website. If the hackers were clever enough to get you to download a fake banking app, they could easily have a fake support number to get you to call and submit your credentials. Your bank will never need your username and password over the phone.

All in all, be ever vigilant, because cybercriminals want to take advantage of the chaos to grift people out of their money. Don’t let them!

If you need help locking down your business and protecting your staff from cyberthreats, give Central Technology Solutions a call at 1-844-237-4300 today!

Working at the Office Has Its Benefits, Too
Why You Need to Consider How Your Data is Stored


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Network Security Privacy Hosted Solutions IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Microsoft Innovation Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Cybersecurity Ransomware Backup Phishing User Tips Communication Tech Term Collaboration Smartphone Managed Service Provider Managed IT Services Workplace Tips Business Management Windows 10 Disaster Recovery Smartphones Internet of Things Mobile Device VoIP Android Remote Monitoring Data Management Paperless Office Social Media communications Managed IT Facebook Browser Encryption Managed Service Quick Tips Windows 10 Server Windows Network Office 365 Save Money Artificial Intelligence BDR Virtualization Saving Money Miscellaneous BYOD Passwords Business Technology Help Desk Holiday Wi-Fi Risk Management Compliance Health Training Microsoft Office App Automation Remote Work Vendor Management Healthcare Users Password Government Mobile Device Management Document Management Windows 7 Apps Office Employer-Employee Relationship Gmail Laptops Bring Your Own Device Recovery Going Green Data Security Big Data Chrome Avoiding Downtime Analytics Bandwidth Unified Threat Management Robot Applications Firewall Antivirus Regulations Project Management Content Filtering Two-factor Authentication Infrastructure Money Computers Data storage Computing Storage Data loss Vulnerability Mobility File Sharing Information Technology Wireless Blockchain IT Management Hosted Solution Website Redundancy Information Processor Tip of the week SaaS Telephone Systems Scam Apple Social IT Service Software as a Service VPN Company Culture Router Maintenance RMM Customer Relationship Management Virtual Private Network Gadgets Machine Learning Proactive Budget Tablet Operating System Unified Communications Meetings Employee-Employer Relationship Printing Flexibility Access Control Files Customer Service Downtime Remote Computing Virtual Reality Settings OneDrive Politics Hard Drive Work/Life Balance IoT Covid-19 Electronic Health Records Hacker IT solutions Licensing End of Support Employees Solid State Drive Monitoring The Internet of Things Monitors Patch Management Current Events Mobile Office Time Management Networking Wireless Technology Legal Electronic Medical Records Alert Smart Technology Recycling Sports Remote Worker Net Neutrality Data Breach Utility Computing Consulting Network Management How To Samsung Assessment Internet Exlporer Server Management Bitcoin Social Network How To Managed Services Provider Data Storage Chromebook HIPAA Uninterrupted Power Supply Cooperation Remote Monitoring and Management Outlook Management Consultation Mouse Spam File Management Mobile Security YouTube WiFi Google Drive Payment Cards Remote Workers Private Cloud Word Search Tech Support Upgrades Co-Managed IT Twitter Business Growth Administration LiFi Education Digital Payment Display Augmented Reality Mobile Computing Websites Identity Theft Dark Web Professional Services Managed Services User Error Language Test Backups Manufacturing Optimization Telephony Processors Cyber Monday Cache Firefox technology services provider Drones Security Cameras User Management Sync Smart Tech IT Consulting Transportation Mobile VoIP Law Enforcement Star Wars Migration Deep Learning Biometric Public Cloud Office Tips Peripheral High-Speed Internet Heating/Cooling Virtual Assistant Vendor Travel Update WannaCry Operations Asset Tracking Employer/Employee Relationships IT Assessment Botnet Unsupported Software Virus Data Warehousing Conferencing Computing Infrastructure MSP Hacking Hard Disk Drives Virtual Machines Technology Assurance Group ’s 18 Cyberattacks Alt Codes Batteries Mobile Device Managment Software Tips Development Servers Zero-Day Threat Cryptocurrency Cyber security Gadget Social Engineering USB Technology Tips Chatbots Marketing Projects Gamification Automobile Computer Care PCI DSS Buisness Wasting Time Smart Devices Multi-Factor Security Wearable Technology OneNote Proactive Maintenance Digitize Mobile Data Outsource IT Microsoft Excel Managing Stress Modem Instant Messaging Printer Disaster Alerts Trending Tech Terms Hacks Solid State Drives Credit Cards GPS Distributed Denial of Service eWaste Annual Convention Read Only Typing ROI Cables Backup and Disaster Recovery Technology Laws Teamwork Safety Comparison Identity Mail Merge Best Practice Return on Investment Dark Data Personal Information Database Sensors Crowdsourcing Google Calendar VoIP Sponsor Database Management Shadow IT Supercomputer Laptop Enterprise Content Management Touchscreen Cookies Finance Techology G Suite History Theft Options Holidays Tracking Notifications Managed IT Service San Diego Lenovo Notes Wires Statistics Human Error Windows 8 Save Time Shared resources Windows Server 2008 Taxes Black Market Specifications Cost Management E-Commerce Address Active Directory Google Maps Identities Voice over Internet Protocol Writing Emoji Legislation Connectivity Digital IT Technicians Obstacle GDPR Outsourcing IT Budget Remote Working Permissions Vulnerabilities Nanotechnology Authentication Disaster Resistance Cabling Network Congestion SharePoint Staff WPA3 Financial 5G IT Break Fix Enterprise Resource Planning Social Networking Bookmarks Superfish PowerPoint Value of Managed Services Unified Threat Management Hotspot Bluetooth Permission Black Friday Roanoke — Central Technology Solutions Features Google Wallet Windows Server Computer Repair Hard Drives Google Docs Telephone Point of Sale Retail Cortana Spyware Mirgation Course Video Conferencing Physical Security Fraud Geography Screen Reader Authorization Proactive IT Cybercrime Downloads Fleet Tracking Shortcut Procurement Humor Virtual Desktop Wireless Internet Business Telephone 3D Printing Mobile Motherboard Favorites Regulation Web Server Emergency Students Cameras CrashOverride Motion Sickness CCTV Administrator Relocation Printers CRM Webcam IT Consultant Error Hard Disk Drive