FMFCU March 2025 Security Newsletter
March 21, 2025Topics include: Generative AI Voice cloning scams – what are the signs and how to protect yourself. Also, we show you how to avoid becoming the target of AI investment scams.
Topics include: Generative AI Voice cloning scams – what are the signs and how to protect yourself. Also, we show you how to avoid becoming the target of AI investment scams.
The latest SMSishing trend (SMS text) is sending texts to people demanding payment for unpaid toll fees or legal enforcement will result. Here is an example: Smishing is a type of cyberattack where scammers use SMS (text messages) to deceive individuals into revealing personal information or downloading malicious software. Please be on the lookout for […]
Thousands of people have lost millions of dollars and their personal information to tax scams. Scammers target taxpayers by posing as the IRS through the regular mail, telephone, or email to set up individuals, businesses, payroll and tax professionals.* It is important to remember that The IRS doesn’t initiate contact with taxpayers by email, text […]
As scams continue to vary and increase, imposter scams remain the most prevalent and financially harmful. Imposter scams take many forms, but all share a basic premise: a scammer posing as someone you trust and persuades to send money or give out personal, financial information in order to obtain the money themselves. How Imposter […]
The FBI is warning the public that criminals exploit generative artificial intelligence (AI) to commit fraud on a larger scale which increases the believability of their schemes. Generative AI reduces the time and effort criminals must expend to deceive their targets. Generative AI takes what it has learned from examples input by a user and […]
FMFCU has been informed of a new twist to FMFCU Imposter Calls: Using FaceTime. Members are first receiving a text that their account or debit card has been compromised. When the fraudster then calls pretending to be an FMFCU representative, the member is provided with a Security Access Code (SAC). Then, the fraudster requests to […]