Pagalba

Saugumas

Ar mano lėšos saugios su Luxon Pay?

Taip, mes naudojame įvairius metodus, siekiant užtikrinti, kad jūsų pinigai ir jūsų asmeninė informacija visada būtų saugūs:

Pramonės standarto šifravimo lygiai visai jautriai informacijai;

Labai saugūs duomenų centrai;

24/7 automatizuotas pavedimų stebėjimas, taip pat mūsų vidinės sukčiavimo ir tapatybės patvirtinimo komandos. Susisiekite jei turite klausimų.

Kas yra "Strong Customer Authentication"?

Būdai, kaip vykdomi banko ar mokėjimų patikrinimai, kaip patvirtinama jūsų tapatybė arba patikrinamas tam tikras mokėjimo pavedimas, keičiasi periodiškai. Šie pokyčiai yra skirti sumažinti sukčių kiekį, kurie gali bandyti apsimesti jumis, pavogti jūsų pinigus. Informacija vartotojams apie „Strong Customer Authentication”

Ar Luxon Pay siūlo "2 Factor Authentication" (2FA)?

Taip, siekiant padidinti jūsų sąskaitos saugumą, galite nustatyti arba SMS, arba Google Authenticator kaip 2FA. Prašome eiti į savo sąskaitą, pasirinkti „Saugumas” ir 2 Factor Authentication, kad įjungtumėte 2FA ir pritaikytumėte savo nustatymus.

Kaip galiu valdyti savo patikimus įrenginius Luxon Pay?

Jūs galite valdyti savo patikimus įrenginius pasirinkdami „Paskyra“, pasirinkdami „Saugumas“ ir tada „Patikimi įrenginiai“. Iš čia galite tvarkyti savo įrenginius.

Ar galiu prisijungti prie Luxon Pay naudodamas IP proxy ar VPN?

Ne, negalite prisijungti prie Luxon Pay naudodami IP proxy ar VPN ryšį. Tai yra atsargumo priemonė, skirta apsaugoti jūsų lėšas ir asmeninę informaciją. Jūsų sąskaita gali būti suspenduota, jei buvo bandoma prisijungti per IP proxy ar VPN.

Kaip saugoti savo Luxon Pay paskyrą?

Tam, kad užtikrintumėte aukščiausią saugumo lygį, prašome:

  • Niekada nesidalinkite savo paskyros informacija, pvz., paskyros slaptažodžiu, su kitais asmenimis.
  • Užtikrinkite, kad 2 veiksnių autentifikacija (2FA) būtų įjungta jūsų paskyroje.
  • Sukurkite stiprų slaptažodį, kuris būtų sunkiai atspėjamas.
  • Nesinaudokite tuo pačiu slaptažodžiu savo Luxon Pay paskyroje ir kitose internetinėse paslaugose.
  • Keiskite savo slaptažodį reguliariai.
  • Būkite atsargūs, jei atrodo, kad el. laiškas yra įtartinas.
  • Jei manote, kad kažkas, išskyrus jus, atliko sandorį, naudodamasis jūsų paskyra, nedelsdami susisiekite su mūsų klientų aptarnavimoper tiesioginę pokalbių programą.

Ar mano pavedimai apsaugoti stipriąja kliento autentifikacija (SCA)?

Taip, jūsų pavedimai Luxon Pay yra papildomai patvirtinami autentifikacija, įskaitant patikimų įrenginių panaudojimą ir SMS patvirtinimą.

Ar galima įjungti / išjungti pirštų antspaudų / veido atpažinimą?

Taip, galite įjungti / išjungti pirštų antspaudų / veido atpažinimą eikite į „Paskyra“ ir pasirinkite „Saugumas“. Čia galite įjungti arba išjungti šias funkcijas.

Kaip apsaugoti savo paskyrą, kai esate prisijungęs per viešą kompiuterį?

Kai prisijungiate per savo stalinę programą, įsitikinkite, kad jei naudojate viešą kompiuterį, atžymėkite langelį „Pridėti prie patikimų įrenginių”.

What is Authorised Push Payment (APP) Fraud?

Authorised Push Payment Fraud is when scammers trick people or businesses into transferring money manually. They pretend to be trustworthy figures like banks or solicitors. These scams are widespread, targeting high-value transactions. Automated fraud is increasing. Victims transfer money without realising it, leading to significant financial losses. Globally, APP Fraud is common. It impacts people and businesses. Fraudsters use tricks like impersonation to sneak in payments without victims catching the scam. Authorised Push Payment fraud requires convincing payers to allow payments under false pretences. Scammers pose as trusted entities, such as your bank or a company representative.

How Does Authorised Push Payment Fraud Work?

APP fraud involves manipulating victims into approving payments to appear legitimate. The fraudster investigates, gathers personal details, and deceives victims, often impersonating trusted entities. Victims unknowingly initiate irreversible payments. The fraudster quickly withdraws funds, making the recovery challenging.

Criminals also use varied tactics, such as phishing. They also elaborate schemes like romance scams. They exploit a sense of necessity, claiming urgent needs or emergencies. This pushes victims to comply hurriedly. The urgency, misrepresentation, and emotional manipulation convince victims to approve payments. This enables fraudsters to get stolen funds quickly.

Below is how Authorised Push Payment Fraud works:

  1. Deceptive Contact: Scammers pose as trusted entities, often through emails or phone calls.
  2. False Urgency: They create a sense of urgency, pressuring you to act quickly.
  3. Fraudulent Instructions: You receive instructions to transfer money, believing it’s a legitimate request.
  4. Account Exploitation: Scammers exploit your trust to access funds directly from your bank account.
  5. No Recourse: Unlike unauthorised transactions, you willingly transfer money, making it challenging to recover funds.

What are the Types of Authorised Push Payment Fraud?

Authorised push payment fraud comes in various forms, all centred on deception. Here are specific types of scams, each exploiting misrepresentation, impersonation, or social engineering:

  1. Invoice Scam
    – Victims pay a fake invoice, misled by social engineering and falsified documents.
    – Targets regular payments or tricks businesses into changing payees.
  2. Romance Scam
    – Fraudsters forge romantic connections to exploit victims emotionally.
    – Often culminates in Authorised Push Payment Fraud, with requests for real-time money transfers.
  3. Personal Relationship Scam
    – Similar to romance scams, fraudsters impersonate family or friends.
    – Urgency and personal information are used to convince victims to send money quickly.
  4. Property Funds Scam
    – Targets property purchases, with fraudsters manipulating payee information.
    – Infiltrates real estate transactions through false documentation and social engineering.
  5. Account Takeover Fraud
    – Criminals gain direct access to victims’ accounts for fraudulent activities.
    – Enables fraudsters to perform authorised push payments without victim authorisation.
  6. Contractor Scam
    – Deceptive home renovation scheme where victims pay the fraudster instead of the real contractor.
    – Fraudsters use phishing to gather renovation information, submit a fake invoice, and disappear with the payment.

What are Common Examples of APP Scams?

  1. Home Renovation Scam
    Criminals spot a house under renovation and learn about the homeowner and builder. They send a fake invoice, seemingly from the builder, redirecting funds to their account. The scam is only noticed when it’s too late.
  2. New Bank Details Scam
    Fraudsters target a business, posing as a supplier. They notify a change in bank details for future payments. The company updates the information, unknowingly directing payments to the fraudsters until the deception is discovered.
  3. Property Purchase Fraud
    Scammers target property buyers, intercepting emails between them and professionals. They alter bank details on crucial documents. During a transaction, funds intended for the property payment end up in the fraudster’s account.
  4. Familial Impersonation Frauds
    Someone gets a payment request, seemingly from a family member in urgent need. Eager to help, they send money without confirming the email. Later, it turns out the family member is unaware, and the funds land in the hands of a scammer.
  5. Relationship Scams
    Fraud often preys on social media relationships. A person bonding with someone on Instagram is persuaded to send money via a payment platform. After the transfer, attempts to reach the “partner” fail; the Instagram account vanishes, leaving the victim deceived and heartbroken.

How can you protect yourself from potential scams?

  • Keep your One-Time Passcodes (OTPs) to yourself. Never share them with anyone calling you, no matter how legitimate they may seem.
  • Your PIN should never be shared with anyone.
  • Don’t give personal details over the phone unless you’ve been able to positively identify the caller to be genuine – especially if you aren’t expecting the call.
  • Check your account regularly to be sure that you recognise all the activity. If there are any transactions or changes to your account that you don’t recognise, contact us immediately.
  • Use a variety of passcodes and PINs for your account. Make sure they are not easy to guess.
  • Regularly change your online passcodes. Try to use a combination of uppercase and lowercase letters, as well as numbers and special characters.
  • Keep your contact details up to date. This means we can contact you promptly if necessary.

 

It’s important to keep an eye out for potential fraud or scams. If you have any doubts or concerns about the safety of your account, please contact us.

Nerandate ko ieškote?

Tiesioginė pagalba 24/7

Pokalbiai su mūsų klientų aptarnavimo personalu galimi tiesiogiai paspaudus mažą ratuką dešinėje apačioje.

El. paštas

Savo klausimus galite pateikti mūsų klientų aptarnavimo komandai, parašę el. laišką adresu support@luxon.com.

Rašyti laišką