¿Cómo mantengo mi cuenta de Luxon Pay seguro?

Para garantizar el más alto nivel de seguridad, asegúrese de nunca compartir la información de su cuenta, como la contraseña, con nadie más.
Asegúrese de tener la autenticación de 2 factores (2FA) activada en su cuenta
Cree una contraseña segura que sea difícil de adivinar
No use la misma contraseña en su cuenta de Luxon Pay que usa para otros servicios.
Cambie su contraseña periódicamente
Tenga cuidado si un correo electrónico parece sospechoso
Si cree que alguien que no sea usted ha realizado una transacción utilizando su cuenta, comuníquese con nuestro equipo de soporte a través del chat en vivo de inmediato.

¿Están mis fondos seguros con Luxon Pay?

Sí, utilizamos una variedad de métodos para garantizar que su dinero y su información personal permanezcan seguros en todo momento:

  • Niveles de cifrado estándar de la industria para toda la información confidencial
  • Centros de datos de alta seguridad
  • Monitoreo de transacciones automatizado 24 horas al día, 7 días a la semana, más nuestros equipos internos de fraude y cumplimiento
  • Soporte 24/7 para inquietudes inmediatas

¿Es posible activar / desactivar la identificación de huellas dactilares / rostro?

Sí, es posible desactivar la identificación de huellas dactilares / rostro yendo a «Cuenta» y seleccionando «Seguridad». Aquí puede activar o desactivar el interruptor.

¿Cómo puedo proteger mi cuenta cuando inicio sesión a través de una computadora pública?

Cuando inicie sesión a través de su aplicación de escritorio, asegúrese de desmarcar la casilla «Agregar a dispositivos confiables» si está usando una computadora pública.

¿Puedo iniciar sesión en Luxon Pay usando un proxy de IP o VPN?

No, no puede iniciar sesión en Luxon Pay utilizando un proxy IP o una conexión VPN. Esto es como una precaución para proteger sus fondos e información personal. Su cuenta puede suspenderse si intenta iniciar sesión a través de un proxy de IP o VPN.

¿Está disponible la autenticación de 2 factores (2FA) en Luxon Pay?

Sí, para aumentar la seguridad de su cuenta, puede configurar SMS o Google Authenticator como 2FA. Vaya a su cuenta, seleccione «Seguridad» y Autenticación de 2 factores para habilitar 2FA y personalizar su configuración.

¿Cómo puedo administrar mis dispositivos de confianza?

Puede administrar sus dispositivos confiables seleccionando «Cuenta», seleccione «Seguridad» y luego «Dispositivos confiables». Desde aquí, puede administrar sus dispositivos.

¿Qué es el Strong Customer Authentication?

La forma en que su banco o proveedor de servicios de pago verifica su identidad o valida una instrucción de pago específica está cambiando. Estos cambios están diseñados para reducir el riesgo de que un estafador se haga pasar por usted para robar su dinero. Información para los consumidores sobre el Strong Customer Authentication

¿Mis transacciones están protegidas con Strong Customer Authentication (SCA)?

Sí, sus transacciones en Luxon Pay tienen autenticación adicional que incluye administración de dispositivos confiables y verificación por SMS.

What is Authorised Push Payment (APP) Fraud?

Authorised Push Payment Fraud is when scammers trick people or businesses into transferring money manually. They pretend to be trustworthy figures like banks or solicitors. These scams are widespread, targeting high-value transactions. Automated fraud is increasing. Victims transfer money without realising it, leading to significant financial losses. Globally, APP Fraud is common. It impacts people and businesses. Fraudsters use tricks like impersonation to sneak in payments without victims catching the scam. Authorised Push Payment fraud requires convincing payers to allow payments under false pretences. Scammers pose as trusted entities, such as your bank or a company representative.

How Does Authorised Push Payment Fraud Work?

APP fraud involves manipulating victims into approving payments to appear legitimate. The fraudster investigates, gathers personal details, and deceives victims, often impersonating trusted entities. Victims unknowingly initiate irreversible payments. The fraudster quickly withdraws funds, making the recovery challenging.

Criminals also use varied tactics, such as phishing. They also elaborate schemes like romance scams. They exploit a sense of necessity, claiming urgent needs or emergencies. This pushes victims to comply hurriedly. The urgency, misrepresentation, and emotional manipulation convince victims to approve payments. This enables fraudsters to get stolen funds quickly.

Below is how Authorised Push Payment Fraud works:

  1. Deceptive Contact: Scammers pose as trusted entities, often through emails or phone calls.
  2. False Urgency: They create a sense of urgency, pressuring you to act quickly.
  3. Fraudulent Instructions: You receive instructions to transfer money, believing it’s a legitimate request.
  4. Account Exploitation: Scammers exploit your trust to access funds directly from your bank account.
  5. No Recourse: Unlike unauthorised transactions, you willingly transfer money, making it challenging to recover funds.

What are the Types of Authorised Push Payment Fraud?

Authorised push payment fraud comes in various forms, all centred on deception. Here are specific types of scams, each exploiting misrepresentation, impersonation, or social engineering:

  1. Invoice Scam
    – Victims pay a fake invoice, misled by social engineering and falsified documents.
    – Targets regular payments or tricks businesses into changing payees.
  2. Romance Scam
    – Fraudsters forge romantic connections to exploit victims emotionally.
    – Often culminates in Authorised Push Payment Fraud, with requests for real-time money transfers.
  3. Personal Relationship Scam
    – Similar to romance scams, fraudsters impersonate family or friends.
    – Urgency and personal information are used to convince victims to send money quickly.
  4. Property Funds Scam
    – Targets property purchases, with fraudsters manipulating payee information.
    – Infiltrates real estate transactions through false documentation and social engineering.
  5. Account Takeover Fraud
    – Criminals gain direct access to victims’ accounts for fraudulent activities.
    – Enables fraudsters to perform authorised push payments without victim authorisation.
  6. Contractor Scam
    – Deceptive home renovation scheme where victims pay the fraudster instead of the real contractor.
    – Fraudsters use phishing to gather renovation information, submit a fake invoice, and disappear with the payment.

What are Common Examples of APP Scams?

  1. Home Renovation Scam
    Criminals spot a house under renovation and learn about the homeowner and builder. They send a fake invoice, seemingly from the builder, redirecting funds to their account. The scam is only noticed when it’s too late.
  2. New Bank Details Scam
    Fraudsters target a business, posing as a supplier. They notify a change in bank details for future payments. The company updates the information, unknowingly directing payments to the fraudsters until the deception is discovered.
  3. Property Purchase Fraud
    Scammers target property buyers, intercepting emails between them and professionals. They alter bank details on crucial documents. During a transaction, funds intended for the property payment end up in the fraudster’s account.
  4. Familial Impersonation Frauds
    Someone gets a payment request, seemingly from a family member in urgent need. Eager to help, they send money without confirming the email. Later, it turns out the family member is unaware, and the funds land in the hands of a scammer.
  5. Relationship Scams
    Fraud often preys on social media relationships. A person bonding with someone on Instagram is persuaded to send money via a payment platform. After the transfer, attempts to reach the “partner” fail; the Instagram account vanishes, leaving the victim deceived and heartbroken.

How can you protect yourself from potential scams?

  • Keep your One-Time Passcodes (OTPs) to yourself. Never share them with anyone calling you, no matter how legitimate they may seem.
  • Your PIN should never be shared with anyone.
  • Don’t give personal details over the phone unless you’ve been able to positively identify the caller to be genuine – especially if you aren’t expecting the call.
  • Check your account regularly to be sure that you recognise all the activity. If there are any transactions or changes to your account that you don’t recognise, contact us immediately.
  • Use a variety of passcodes and PINs for your account. Make sure they are not easy to guess.
  • Regularly change your online passcodes. Try to use a combination of uppercase and lowercase letters, as well as numbers and special characters.
  • Keep your contact details up to date. This means we can contact you promptly if necessary.

 

It’s important to keep an eye out for potential fraud or scams. If you have any doubts or concerns about the safety of your account, please contact us.

¿No puede encontrar lo que busca?

Chat en vivo 24/7

Puede hablar directamente con un miembro de nuestro equipo haciendo clic en el círculo pequeño en la parte inferior derecha.

Correo electrónico

Envíe sus preguntas a nuestro equipo de soporte enviando un correo electrónico a support@luxon.com

Enviar email ahora