Retail Banking

Security
Security
Security
Security

t

Security
Security
Security
Security

Important points for your credit card’s security

  • If your credit card has been lost or stolen, immediately call the Albaraka Türk call center at 444 5 666. This will prevent others from using your card. You can then go to a police department to report the incident.

  • Sign the white band on the back of your card.

  • Keep copies of your receipts until the expenses show up on your next account statement. When you see the expenses on your statement you can dispose of the receipts.

  • After every purchase, do not forget to take your credit card back.

  • Do not give your credit card to anyone else.

Important Points For Shopping Online

  • Be sure that the site you are purchasinng from is reliable and well known. Do not forget that there are sites that exist just to steal your credit card information.

  • Never enter your credit card PIN code while shopping online.

  • Do not send your credit card, account or financial information via e mail.

  • Do not use your credit card on sites that are informing us very exaggerated shopping processes.

What Is Identity Theft?

Identity theft is the illegal, unauthorized use of someone’s identity, tax ID number, credit card number, or other personal information.

How do criminals access your personal information?

  • By stealing your purse or wallet

  • Obtaining bank, tax chamber, or checking documents from you

  • By accessing information you are sharing with someone else online

  • “Phishing”

Online Cheating Methods

E-mail security
Our bank will never ask for your personal information via email. If you are asked for such information, do not make provide it. Instead, immediately call 444 5 666 to report the situation to Albaraka Türk.

Phishing
Phishing is a kind of online crime that involves stealing personal or financial information used for shopping online.

Phishing is generaly carried out with forged emails or Web sites made to resemble those of legitimate banks or businesses.

Credit, debit, and ATM card numbers, PIN codes, account numbers, user IDs, and online banking passwords that are used for access to Internet banking sites are requested through these forged emails or sites.

Our bank only uses email to send you information. We will never send any email that requests your bank account number, credit card PIN code, customer number, user password, etc. If you receive an email requesting such information, do not click on any links within it and do not enter the information requested. Please call us at 444 5 666 to report these kinds emails.

Nigerian email scam -- False promises of profit
This is a common form of spam email in which you are promised high profits for helping somone transfer funds to your bank account. These are often messaages that inform you that you have won a lottery prize. The aim is to obtain personal information, back account numbers, and passport numbers for further fradulent use online. They request your bank account number and they check to see if the information you have provided is valid by transfering a small amount of money to your account.

Trojan, key-logger, and screen-logger programs

A “trojan horse” virus enables hackers to control your computer and steal your information.

You should scan your computer with an anti-virus program regularly to protect yourself from these malicious files.

A key-logger program transfers records of the keystrokes you have made to hackers, who then use the information to get personal information you have typed.

A screen-logger program is similar to a key-logger but transmits images from your computer screen.

If you install anti-virus and anti-spyware programs on your computer and use and update them regularly, you can protect yourself from these kinds of dangers.

Spyware

Spyware is another means of stealing your personal information. These programs track the online actitivites of affected computers and transmit personal information back to hackers.

Below are some tips for understanding if spyware has been loaded on your computer:

  • There is an increase in pop-up windows on your screen

  • Your web browser sends you to sites you did not request

  • Changes to your browser’s home page

  • Keyboard or mouse not functioning correctlly

  • Slower downloads or uploads