-
Our solutions
- Our solutions
-
About us
- About us
- Partners
- Support
- Offer
We work diligently to ensure that all your transactions are safe. However, to make sure that everything works smoothly, it is advisable to take care of your own safety during shopping, making payments and engaging in other online activities.
Phishing (spoofing) is a fraud method in which a criminal impersonates another person or institution in order to obtain confidential information (e.g. logon information, credit card details).
When you receive a false e-mail message:
phishing@payu.com
An identity theft occurs when someone unlawfully takes possession of your personal data. The most frequently stolen details include first name and surname, address of permanent residence, PESEL identification number or the credit card number. Using someone’s data, the Internet criminals can for example embezzle loans, or shop online.
The Nigerian scam (or the 419 scam – based on number of article in the Penal Code of Nigeria, describing this offence) is a crime: a fraud initiated by a contact with a victim via e-mail. It involves dragging the victim (previously the victims were chosen at random, nowadays they are selected more carefully) into a psychological game, whose essence is based on a fictional transfer of a huge amount of money (frequently excessive, exorbitant – even several million British pounds or US dollars) from one of the African countries (most frequently from Nigeria, although now it can be basically any country – Great Britain and Spain are used more often). The purpose of this game is to embezzle money from the victim.
E-mail messages containing links to “invoices” which turn out to be malware are one of the oldest phishing scams. They are sent from different e-mail addresses. The crooks impersonate well-known companies operating in Poland – stores, courier companies or telecommunication companies. In such messages, they ask the recipient to click on a link to download an invoice – this usually results in the download of a file infected with a computer virus or malware. Such file may steal your online banking data during logon process or during online transactions.
An increasingly frequent form of phishing scam are requests to pay a certain, small amount for a package. In one version, the users receive an SMS message informing them of the need to make a small additional payment to receive their package, for example PLN 1.00. In such case the link to the payment leads to a false website of e-payment agent. A person who enters his/her bank login details at such website will be robbed and could lose all his/her savings.
In the case of this scam, the e-consumer shops at online store which has a good opinion among users and offers products at exceptionally attractive prices. At the time of finalizing the order and choosing payment via PayU, the user sees a message on the screen, which says, “You are being redirected to the website of payment operator, please be patient, as we have a large number of orders this can take a few minutes”. Next, the consumer either receives a new link to the payment site from the store’s consultant via the company chat, or after a few minutes is directed to the correct website of payment operator, which raises no doubts regarding payment safety. However, some information can be wrong, such as name of the store where the item is being bought, or the amount of payment. In that case of fraud, while the consumer waits for a new link to the payment site, the crook creates a new order in another, legally operating store, serviced by the same payment operator. The cheated user makes a payment to the benefit of the cyber-crook who attacked him/her, instead of paying for his/her own order.
This is a new type of fraud tied to payments made via mobile phone. The fraud involves swindling the code for mobile payment to rob the bank account of the victim. The crooks hack Facebook accounts, impersonate friends and using Messenger, they ask people from the friends’ list for a loan. They explain they have suddenly found themselves in a difficult situation, and the explanation seems viable. The victim gives them the BLIK code and next accepts the payment in his/her bank application. We remind you to never give anyone your bank account details.
The basis for safe use of the Internet is to have legal software, with safety support. When executing payment transactions, it is worth remembering about using:
The anti-virus software should provide protection against viruses, Trojans and other malware that can harm our computer. There are many sources of potential infection, such as e-mails with infected attachments, or downloading infected software from the Internet. Anti-virus software should by definition protect against such threats. For the best protection, we recommend the use of professional anti-virus software. Unlike the free versions, the commercial ones offer more effective protection and better support. Many manufacturers offer the option to test their software during a trial period, which usually lasts 30 days. If you do not have anti-virus software, or if you suspect that you are a victim of a cyber-attack, install the trial version today! You can buy the full license later on, e.g. at Allegro.
The firewall protects your computer against unauthorized access attempts. Imagine that you are in a popular fast food restaurant and surf the Internet, using the free Wi-Fi provided by the restaurant. Without proper firewall setting, a third person can attempt to connect to your computer. Firewall should protect your computer against such unauthorized access. We recommend to purchase the firewall together with the anti-virus software. Such combination offers high effectiveness of protection, and products of that type are frequently marketed under the name “Internet Security”.
Up-to-date software is the basis for security. Many persons think that up-to-date operating system is sufficient for their protection. Unfortunately this is not the case – to have full protection, you should also regularly update all installed software.
The basic steps:
Authentication security:
Network safety
The described configuration covers iPhone 3GS and later versions, all iPads and iPods Touch of the 3rd generation and later models – with iOS 4 and higher. Some settings and security options can be unavailable on older devices. Some settings require iOS 8.
Configuration profiles
Configuration profiles can be viewed and edited ( https://support.apple.com/apple-configurator).
Apple provides also a configurator (available from App Store https://apps.apple.com/pl/app/apple-configurator-2/id1037126344?mt=12), which may be used for mass configuration and management of a larger number of iOS based devices.
The basic steps:
Authentication security:
Browser safety
Network safety:
Origin of your software
For your computers and mobile devices, avoid downloading software from a non-trusted source. This generates the risk of infecting your hardware.
Illegal software is the perfect environment for malware. Usually, to activate pirated software, you need to download the so-called crack. This is the perfect opportunity to infect your device – what other benefit is there for the author of the crack? We recommend to use only software obtained from legal sources.
In the case of mobile devices, install applications only from official sources, such as Google Play or iStore. Please report other cases of fraud or security incidents tied to the operation of PayU to help@payu.pl.