Attempted fraud

The Internet is the lifeblood of digital communication, but also a platform for fraud and other criminal activity. Viseca tells you the threats you face and how you can protect yourself.

Phishing e-mails

Organised fraudsters regularly send phishing e-mails to gain unauthorised access to your card details. You will be warned, for instance, that your login details or account information are no longer secure. You are then asked to confirm your details by clicking on a link or on an attached form. In this way, the fraudsters gain full access to your details.

Protect yourself

How to protect yourself

  • Do not respond to any e-mail that seems suspicious to you.
  • Do not open any attachments and do not click on any links from unknown senders.
  • Secure access to your router with an individual password. Encryption affords additional protection. The most secure method is Wi-Fi Protected Access (WPA or WPA2).
  • Always type the URL www.viseca.ch directly into your browser. Our pages are encrypted and bear a Viseca certificate. The “https” at the beginning of the URL and the padlock in the browser indicate that the website is encrypted.
  • Carefully check your card statements.
  • If you have disclosed your card details, please contact us immediately to have your credit card blocked: +41 58 958 83 83 (24-hour service). You will not be charged for the replacement card.
  • Please forward suspicious e-mails to internetsecurity@viseca.ch.

Frequently used phrases in phishing e-mails

  • Your account or your credit card has been blocked
  • Update your details
  • We have identified unusual activity on your credit card
  • Review your transaction
  • Your credit card has been suspended
  • Activate 3-D Secure

Other kinds of attempted fraud

Read the following scam tactics carefully. Be wary of suspicious calls or messages. In case of doubt, you can contact Viseca at internetsecurity@viseca.ch.

You may at some time have received an e-mail from a known person who is in desperate need of your (usually financial) help. It is essential that you check by phone whether the e-mail is really from that person and is not a fraud attempt. Requests for money transfers or card details to pay hotel bills are suspicious.

You may also encounter fraudulent phishing text messages. The aim of these is to steal credit card details via a link to a phishing website. Do not click on the link, and delete these messages.

Viseca never sends text messages requesting confirmation or disclosure of personal details and credit card details.

It is quite possible that fraudsters will telephone you in an attempt to obtain your credit card details. They may, for example, claim to work for a software company and to have identified a virus on your PC. To "resolve" the issue, you are asked to provide your credit card details and install a ridiculously expensive program that will repair the damage.

MELANI, the Reporting and Analysis Centre for Information Assurance, warns about such telephone calls. As Microsoft never makes unannounced or unsolicited support calls, the callers are most likely fraudsters whose sole objective is to tamper with the PCs concerned or infect them with malware.

Scareware refers to software intended to unsettle or scare you. Usually, an offer is made to resolve (often non-existent) computer problems in return for a fee. Alternatively, you may be misled into altering settings on your computer or using a link which causes damage to your computer and which, of course, can only be "fixed" for a charge.

The term malware denotes a whole range of damaging software - from viruses and Trojans to worms. Once the malware has installed itself on your computer, it is very hard, and sometimes impossible, to remove it completely.

To protect against malware, install an anti-virus program or a security suite. Make sure that this program is from a well-known provider.

Data are exchanged when surfing the Internet or on a wireless network. There is an inherent risk that hackers will log into the network. If the protection is inadequate, those hackers may be able to use the Internet connection for illegal activities or even spy on data on your computer.