Enable Accessibility
×
Close
Personal Online Banking
All personal banking clients, please enter your online credentials here:
e‑Treasury Business Banking
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact Client Support at [email protected] or 855.274.2800.

Download our e-Treasury Secure Browser

Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800.
e‑Treasury
Log in
Safeguarding your online banking sessions is our top priority. For information about how you can help protect your online banking sessions, or if you need additional assistance with your e-Treasury log-in, please contact TM Service at [email protected] or 212.575.8020.


Download our e-Treasury Secure Browser

Download the Sterling e-Treasury Token Client


Business Online Banking
If you need assistance, please contact Client Services at [email protected] or 855.274.2800

For optimal viewing experience, please use a supported browser such as Chrome or Edge

Download Edge Download Chrome

How debit and credit card fraud works; ways to protect yourself

Published on April 14, 2020 | Kevin Thompson

You just checked your bank accounts, like you normally do everyday, but today there is a big problem — your checking account is negative! You were sure that you had enough money to cover your transactions, but what about those three transactions for $400 at Walmart in Texas? You’ve never been to Texas and your debit card is in your wallet; how could these transactions have happened? Unfortunately you’re not alone, you have just fallen victim to debit and credit card fraud.

How they get your digits

These fraudsters are able to steal your debit card information a couple different ways. One is a skimming device (pictured above), which captures all of your card information when you swipe your card at an ATM or a credit card processing machine. Once crooks have obtained your information through a skimmer, they can sell your info online and use it to make purchases. Card information is also stolen when computer hackers install a virus into a merchant’s card processing software, which allows them to steal the card information as the data passes through the authorization process.

How they use your card

So, how did they use your stolen information to buy things in Texas? Most likely, they used a device to clean magnetic stripes off another debit or credit card and re-encode it with your stolen information. The fraudsters can even use a hotel room key to make purchases using your debit card information. That’s right, the person who made the purchases at Walmart in Texas (most likely a self-checkout terminal) could have been using a hotel room key with your debit card information to buy those flat screen TVs. If the fraudsters are not daring enough to go into an actual store, they can place an order online or over the phone with your debit card information and have the goods shipped to them (most likely a P.O. Box opened with fraudulent identification).

Now what?

Don’t cut up all of your cards and go back to cash just yet. Banks work very hard to detect these card compromises and prevent the fraud from happening. At Webster, we have a number of processes in place to help prevent and minimize fraud losses and we collaborate with other banks and law enforcement to make sure the people responsible are brought to justice.

Things you can do to help protect yourself:

  1. Know the different kinds of skimming devices
    1. Card reader overlays: plastic devices that fit over ATMs and other card processing machines
    2. Hidden cameras: usually located very close to an ATM and can capture your card number and PIN
    3. PIN capture overlays: these fit over a real ATM keypad and capture your PIN
    4. ATM faceplates: these are placed over an ATM keypad and capture your card info and PIN
  2. Look for signs of tampering. Check the ATM or card processing machine before using. If there are multiple scratches around the opening or if you see an odd piece of plastic or other material that doesn’t look like it fits, this could be a sign of a skimmer. Also, tiny holes in an ATM machine where a camera could be hidden or loose wires around the machine could be a red flag.
  3. Avoid ATMs in remote locations and credit card processing machines at questionable businesses. It is safer to use an ATM in a high-traffic area; ideally an ATM at an actual bank when possible or at a business that you know to be reputable and have gone to before.
  4. Be aware of your surroundings when at the ATM; watch for others standing close by and try to cover the keyboard as much as possible so others can’t see you key in your PIN.
  5. Review your bank accounts daily.
  6. Sign up for alerts through online and mobile banking.
  7. Make sure the bank has your most current contact information in case of a breach.

If you see any unauthorized transactions, call the bank as soon as you can so a dispute can be filed and we can reimburse you for the fraudulent charges.

Related Resources

SecurityArticles
Scams Targeting Retirees—and How to Prevent Them
Fraud is a growing concern, with scams targeting retirees or people aged 60 and older becoming increasingly sophisticated and widespread. Understanding common scams and how to prevent fraud are crucial to protect yourself and your loved ones. The Broad Impact The financial impact of age-targeted fraud is profound, exploiting older Americans out of an estimated […]
SecurityArticles
Cybersecurity Awareness Month 2024: Seven Tips to Stay Safe Online
October marks National Cybersecurity Awareness Month, a time dedicated to highlighting the significance of cybersecurity, sharing best practices, and promoting ways to minimize online risks. At Webster, our commitment to bolstering our team’s cybersecurity knowledge remains strong, as does our dedication to enforcing stringent online security measures to safeguard our clients’ personal information. We also […]
SecurityArticles
Protecting Your Finances When Using Peer-to-Peer Payments
Popular digital payments like Zelle®, Venmo, CashApp, and PayPal have been making headlines—and not just for their ease of use. While these digital payments come in handy for splitting the cost of the bill at a restaurant or paying back a friend, they can open up users to the risk of their accounts—and money—being compromised. […]
Connect With Us
Learn more about Webster products, services and the communities we serve.
We’d love your feedback
×