We can help youWe can help youAll the information you need against cyberattacks
matricula-
Learn to decode the traps of cybercriminals
Familiar with the most common forms of fraud and scams? Our Cyber Translator will help you identify them.Go to Cyber TranslatorGo to Cyber Translator
matricula-
We're here for you
Your security is our commitment
For us, your security is our priority. That's why we have methods and tools to increase your protection, such as two-factor verification when shopping online or secure access to our app, such as fingerprint identification or facial recognition.
At Banco Sabadell, we want you to stay up-to-date with all the latest news on fraud and scams and on the best practices to make your digital banking safer.
Protect yourself from the most frequent online fraud and scams
Have you received a phone call purporting to be from your bank? Have you received a suspicious text message asking for personal data? Do you think someone might have stolen your online banking passwords? We give you a run-down of the most common frauds and how to protect your bank accounts against cyberattacks.
matricula-
Phishing attacks use identity theft by means of fraudulent emails, text messages, phone calls, forms, or websites to trick people into sharing sensitive data.
Be careful: Banco Sabadell will never call you to initiate a transaction nor ask you for your banking codes or personal data. Beware of phone calls claiming to be us. Get in touch with us directly if you think you've been scammed.
Beware of text messages that contain links. Even if the sender of the message seems trustworthy, look closely at the URL and don't click on it. If you do, don't provide any sensitive information on the landing page.
Making your purchases online and protecting your accounts is very simple if you keep a number of tips in mind. Shop on authenticated websites, compare opinions about e-commerce, do not trust sites that offer their products well below the market price, etc.
Key steps so as not to become a victim of new scams in the digital world
Scamming techniques on the Internet are modernising, with new methods and channels. The scam of fake employment, investment opportunities or identity theft by WhatsApp are some of the most common new frauds.
matricula-
Cybercriminals offer jobs that consist of simple tasks such as giving likes on social networks or receiving and sending transfers. Don't trust these recruiters and don't share information. Being contacted with an attractive and unexpected offer is suspicious.
Scammers offer investment opportunities with high returns with a very low initial investment and no risk. If you receive an investment proposal by e-mail, on social networks or by phone, be wary of it.
Scammers pretend to be a family member or friend by urgently requesting a sum of money. Do not trust unknown numbers, or messages that do not give concrete data about the person on the other end.
Password managementDo not use predictable passwords or passwords related to personal data, try to contain at least 8 digits and change them periodically.Security of your devicesKeep your operating system, apps and antivirus up to date. Use only certified sites, such as Google Play or the App Store, for your downloads.
Keep an eye on your securityIf you think someone has accessed your online banking, contact us. Don't log in on public computers and always use email in safe mode.Browse responsiblyMake sure that the website you are browsing starts with "https" and shows a padlock icon. Check that the address is spelled correctly.
Password managementDo not use predictable passwords or passwords related to personal data, try to contain at least 8 digits and change them periodically.Security of your devicesKeep your operating system, apps and antivirus up to date. Use only certified sites, such as Google Play or the App Store, for your downloads.Keep an eye on your securityIf you think someone has accessed your online banking, contact us. Don't log in on public computers and always use email in safe mode.Browse responsiblyMake sure that the website you are browsing starts with "https" and shows a padlock icon. Check that the address is spelled correctly.
Would you like to learn more about cybersecurity? Discover this Glossary of online security concepts to get up to speed
matricula-
Antivirus
Antivirus programs are computer programs whose purpose is to analyse devices and servers in search of malicious programs that can compromise the security of your PC. They have to be updated daily to find all the new viruses that appear on the network and thus protect us as much as possible.
Two-factor authentication
Two-factor authentication is one way to protect your information online. When you log in to a website or app, in addition to entering your password, you must also enter a code that is sent to your mobile phone. This means that, even if someone gets their hands on your password, they won't be able to access your information without the code. The code is one-time use and you only receive it on your phone, which makes it extremely secure. Two-factor authentication is a great way to protect yourself against cybercrime and keep your information secure.
Biometrics
Biometrics is the automated recognition of individuals by means of unique physical characteristics, such as fingerprint, face or the identifying data of the iris. Electronic devices that apply biometrics are called biometric readers, and they can recognise people from their digital signature, which is a set of data that encodes their unique physical characteristics. Biometrics is a highly reliable and advanced technology that is used to safeguard people's identity and privacy.
Firewall
Security software that acts as a gatekeeper between your device and the network. It is used to control the flow of information in and out of your device, and only let through messages that comply with protection standards. Therefore, the firewall makes sure that no dangerous messages can enter or leave your device, and protects you from possible attacks or intrusions.
Social engineering
Any type of psychological manipulation by fraudsters to get us to provide them with our personal information, such as passwords or bank details. Cybercriminals take advantage of our trust or curiosity and send us fake messages or emails that look legitimate. To avoid falling into these traps, we need to be extremely vigilant about what we open and what we share on the Internet.
Malware
Malware is a malicious program that aims to infiltrate electronic devices, such as computers, tablets, or mobile phones, to access users' personal information or take control of devices.
Phishing
A cybercrime technique that involves sending fake messages that mimic the look and tone of a legitimate entity, such as a bank, business, or public institution, in order to trick recipients into revealing sensitive data such as personal data, passwords, card numbers, or access codes.
SIM swapping
SIM swapping is a cyberattack technique that duplicates SIM card data (the chip that identifies a mobile phone and its user) on another SIM card that is in the hands of a fraudster. By doing so, the hacker can receive the messages and calls made to the legitimate user, and take advantage of services that require text message verification, such as banking, social networks or emails.
Smishing
Smishing is a variable of phishing that uses text messages (SMS) as a way to trick victims into revealing personal or financial information, or install malicious applications on their phones.
Smishing messages are usually urgent or alarming in tone, and purport to come from legitimate entities, such as banks, government agencies, or messaging services.
The goal of smishing is to induce the victim to click on a link, call a phone number, or download an attachment, which can lead to fraudulent websites, fake phone lines, or malicious programs that steal or compromise user information. To avoid smishing, it is important not to respond to or open suspicious text messages, and to verify the authenticity of the senders before providing any personal details.
Spoofing
Spoofing is a technique used by fraudsters to impersonate entities, companies or individuals with a view to accessing private data. Spoofing attacks can be performed on websites, emails, phone calls, text messages, IP addresses, and servers.
Spoofing is particularly dangerous because it can trick victims into performing actions that compromise their online security, such as providing sensitive data, downloading malicious files, or making financial transactions. For example, a scammer could call a victim pretending to be their bank and ask them for access codes or even to carry out financial transactions.
Identity theft
Identity theft consists of impersonating another person or entity such as a company, an organisation or a financial institution. Through messages, emails, or phone calls, the objective of identity theft is to trick victims into revealing sensitive information, such as passwords, credit card numbers, bank details, and even financial transactions.
To avoid identity theft, it is of utmost importance to verify the veracity of the messages and calls received, not click on links or open suspicious files or to provide data or carry out financial transactions that you did not intend to do.
Trojan
This is malicious software that disguises itself as a legitimate program or file to infect your computer and cause damage or steal information.
Vishing
It is a scam and deception technique that consists of making phone calls in which they pretend to be a legitimate source, such as a company, an organisation or a financial institution. The purpose of vishing is to get victims to hand over sensitive information, such as passwords, credit card numbers, bank details or even to carry out financial transactions such as transfers to the fraudsters' accounts. The calls often appear authentic and use techniques of persuasion, pressure, or threat to convince victims. To prevent vishing, it is important not to respond to suspicious calls or messages, hang up immediately if fraudulent intent is detected, and verify the identity of the sender with other sources.
Password manager
It is an app that stores passwords in an encrypted database, protected by a master password. Managers often generate strong passwords, with sufficient length and combining letters, numbers, and strange characters to create meaningless words and thus increase their strength. This allows you to dodge attacks and avoid using predictable patterns.