Identity fraud. A fraudster stealing information about your identity and financial affairs enough to take over your account or to impersonate you. If the fraudster can impersonate you, he or she will open accounts in your name and then defraud them.
Account take over. An account takeover can happen when a fraudster or computer criminal poses as a genuine customer, gains control of an account and then makes unauthorized transactions. Any account could be taken over by fraudsters, including bank, credit card, email and other service providers.
Phishing. Phishing is a method used by fraudsters to access valuable personal details, such as usernames and passwords. Phishing can also involve sending malicious attachments or website links to infect computers or mobile devices. Criminals send bogus communications: emails, letters, instant messages or text messages. Once your personal details have been accessed, criminals can then record this information and use it to commit fraud such as identity theft and card fraud. Viva Wallet will never ask you, via any means (by phone call or email) or under any circumstances, to disclose the passwords you have set up against your Viva Wallet payment account. In addition, we recommend to check the authenticity of any site where you register personal information. This can be verified in the browser address bar through the green padlock security icon and the company name in a green font, while the website address starts with “https” which certifies the protection of your personal data in the transmission. If you are contacted by email or telephone to provide such information please consider it suspicious and contact us immediately.
Card fraud. Ιnvolves the compromise of any personal information from a payment card. The information stolen from a card, or the theft of a card itself, can be used to commit fraud. Fraudsters might use the information to purchase goods or withdraw funds from an account.
Skimming. A fraudster uses a device to capture card information as a cardholder is withdrawing money from an ATM. The fraudster then uses this information to purchase goods or withdraw funds from an account, or even counterfeit a card to carry out fraudulent transactions in countries where Chip & PIN technology is not supported (known as counterfeit card fraud).