Home State Bank Logo

FDIC-Insured - Backed by the full faith and credit of the U.S. Government

FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Stay Informed

We strive to provide our customers with the most up to date information we can, to help prevent anyone from being a victim of fraud. While we can't guarantee this will never happen, we will do our best to keep our customers informed. Please always remember Home State Bank will never call you asking for personal information such as account numbers, social security numbers, etc.

  Glossary of Terms

There have been a few new words and phrases being thrown around lately in terms of fraud. Without knowing what these terms mean, it can be more confusing than it needs to be. Let us help explain a few of terms we've been learning about here at Home State Bank.

Social Engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing and spear phishing, are examples.

Phishing (pronounced fishing) is a hacking technique that is the digital equivalent of “casting a net.” Phishing campaigns don’t target victims individually—they’re sent to hundreds, sometimes thousands, of people. Emails claiming to be from popular social web sites, banks, auction sites, or IT administrators are commonly used to lure the unsuspecting public.

Spear Phishing is highly targeted and targets a single individual. Hackers do this by pretending to know you. It’s personal.

Smishing is a form of phishing that uses mobile phones as the attack platform. This form of attack has become increasingly popular due to the fact that people are more likely to trust a message that comes in through a messaging app on their phone than from a message delivered via email.

Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information.

Whaling is a cyberattack that involves impersonating a high-ranking executive to steal money or sensitive information from an organization. It is also known as "whale phishing"

Quishing is short for "QR Code Phishing" involves obtaining sensitive information or install malware by directing people to malicious websites or fake payment websites. 

Phishbait is an email crafted to attract prospective phishing victims to open an email and follow a malicious link.

Doxing is the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.

Juice Jacking refers to the threat of malicious access gained to your phone or other USB devices when plugged into a public charging kiosk - such as at an airport or sporting event.

Malware is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Scareware is malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.

Passkey is a digital credential, tied to a user account and a website or application.  Passkeys allow users to authenticate without having to enter a username or password, or provide any additional authentication factor.

Spoofing is where a person or program disguises their identity by faking information, such as an email address, phone number, or IP address, to appear as a trusted source. The goal is to gain a victim's trust to steal sensitive information, money, or spread malware. It can take many forms, including but not limted to, fake websites, emails, phone calls, and even faked GPS signals.

Multi-Factor Authentication (MFA) is used to ensure that digital users are who they say they are by requiring that they provide at least two pieces of evidence to prove their identity. When you sign into an account for the first time on a new device or application (like a web browser) you need more than just the username and password. You need a second thing - what we call a second "factor" - to prove who you are.

Artifical Intelligence (AI) is a technology that allows you to generate, classify, and perform tasks like image analysis and speech recognition. AI encompasses a range of technologies, including machine learning, that allow computers to perform tasks requiring human cognitive functions, such as understanding language, recognizing objects, making recommendations, and controlling autonomous vehicles.

  Fraud Alerts

Updated January 20, 2026

Hang up on unexpected calls saying you owe back taxes.  Those are scams!

We’re seeing a big wave of reports about phone scams claiming you owe back taxes. But it’s not the IRS calling, it’s a scammer using a company name like “Tax Resolution Oversight Department.” If someone calls you out of the blue offering to help you fix a tax issue, hang up. Here’s how to spot the scam.

It starts with an unexpected call from the “Tax Mediation and Resolution Agency,” or another official-sounding (but fake) government agency. They’ll say you haven’t paid your taxes and offer to connect you with a “tax resolution officer,” who can do a “red flag check” on your credit and help you apply for an “IRS liability reduction program.” But those aren’t real programs and that’s your sign to end the call. Some scammers leave a voicemail saying, “This may be our only attempt to reach you” hoping you’ll call back right away. But it’s all part of the story to steal personal information like your Social Security number — or in some cases, charge you an illegal upfront fee for tax debt relief that doesn’t actually help.

Even if you owe back taxes, know this: the IRS’s first contact with you will always come by mail, not by phone. Here’s how to avoid an IRS impersonator and get real help:

  • Never give an unexpected caller personal or financial information. It’s probably a scammer hoping to drain your bank accounts or steal your identity.
  • Check it out through IRS.gov. Contact the IRS directly for trustworthy information about your tax situation. Need to speak with someone? Only use a phone number found on the IRS’s website. Never one a scammer gives you.

--Information provided by Federal Trade Commission Consumer Advice

Help kids protect their devices

Online safety starts with protecting your kids’ devices from hackers and scammers.

Here are some steps to keep kids safer while they’re on a phone, tablet, or laptop. Consider taking these steps on your kids’ behalf and, as they get older, teaching them how to secure their devices and build good online habits.

  • Set automatic updates on phones, tablets, and laptops to protect your kids' apps, web browsers, and operating systems.
  • Using strong passwords. Make sure your kids' accounts and devices are protected by unique passwords. Consider helping teenagers set up and use a password manager, or the device's password generator - and remind them not to leave devices unattended in public places.
  • Use parental controls to help reinforce good online habits and create safer spaces for kids to learn and play online. And, to have a better handle on what kids might be spending online, consider using parental controls to disable in-app purchases or require a password for all purchases on phones or tablets.

Learn more information about protecting kids online while enhancing their safety, privacy, and healthy development at ftc.gov/KidsOnline.

--Information provided by Federal Trade Commission Consumer Advice

Microsoft Was the Most Impersonated Brand in Q4 2025

Microsoft was the most commonly impersonated brand in phishing attacks during the fourth quarter of 2025, according to researchers at Guardio. Microsoft was followed by Facebook, Roblox, McAfee, Steam, AT&T, Amazon, Google, Yahoo, and Coinbase.

“Scammers ramped up brand impersonation attacks throughout Q4 2025, timing their campaigns around when people are busiest online, shopping for deals, renewing subscriptions, or looking for jobs,” Guardio says.

“They targeted Microsoft, Facebook, Roblox, and McAfee by launching fake storefronts during Black Friday, sending delivery scams throughout December's package delivery rush, and running job scams as January job hunting picks up.”

Microsoft and Facebook are generally among the most commonly impersonated brands throughout the year, due to their massive userbases. Some of the other brands are more commonly targeted near the end of the year, during the holiday and tax seasons.

“For example, gaming platforms like Steam see heavy traffic during year-end holiday sales,” the researchers explain. “Phone and web service companies (AT&T, Google, Yahoo) get more attention in December when people check their accounts and renew subscriptions. Amazon gets targeted because of holiday shopping, while Coinbase gets hit when people review their crypto investments and prepare for tax season.”

Users should maintain a healthy sense of suspicion and be on the lookout for social engineering in order to avoid falling for these attacks.

“Staying safe requires consistent vigilance,” Guardio says. “Verify sender authenticity before clicking links, checking for domain misspellings or suspicious extensions. Navigate to official websites independently rather than using links in messages. Enable two-factor authentication on all accounts. Most importantly, pause before acting on urgent messages. Scammers count on people acting fast without thinking.”

Protecting Older Adults from Costly Scams

Criminals are more sophisticated than ever with how they target older adults, and many of the most heartbreaking scams start with a fake emergency involving a grandchild. These scams work because they play on emotions and instinct. Fraudsters count on grandparents’ desire to help their families, and they use urgency and fear to cloud judgment.

Know the Red Flags and Educate Relatives

One of the most common scams involves a phone call from someone pretending to be a grandchild – or claiming to be with law enforcement or a hospital calling on the grandchild’s behalf. The message is typically urgent, saying someone is hurt, arrested or stranded and needs money right away. These calls often come with instructions to stay on the phone, not tell anyone else, and send money fast.

Scammers will do everything they can to make the story seem real. Some use fake caller ID to make it look like the call is coming from a police department or medical office. Others may use tools to impersonate a grandchild’s voice.

Let elderly relatives know that any request for secrecy or urgency is a red flag. Remind them to hang up and call the number they know to verify before acting. It’s the safest way to confirm whether a call is real.

Use a Family Password to Stay Ahead

One smart way to guard against scams is to establish a family password – a unique word only trusted family members know. Pick something random, such as “butterscotch,” and use it regularly when calling or texting with grandparents. That way, if a scammer ever calls pretending to be a grandchild, your loved one knows to ask for the password. If the caller doesn’t know it, the call should end immediately.

It’s not always easy to spot a scam in the moment, especially when emotions are high. But by preparing ahead of time and setting some ground rules, you can help keep the people you care about safe.

--Information provided by Iowa Bankers Association: Money Cents newsletter

  Tips to Help Safeguard Your Passwords:

We strive to provide our customers with the most up to date information we can, to help prevent anyone from being a victim of fraud. While we can't guarantee this will never happen, we will do our best to keep our customers informed. Please always remember Home State Bank will never call you asking for personal information such as account numbers, social security numbers, etc.

ESET’s Phil Muncaster's offers the following advice to help safeguard your passwords:

  • ESET’s Phil Muncaster's offers the following advice to help safeguard your passwords:
  • “Use only strong and unique passwords or passphrases on all your online accounts, especially your banking, email and social media accounts
  • “Avoid reusing your login credentials across multiple accounts and making other common password mistakes.
  • “Use a password manager, which will store strong, unique passwords for every site and account, making log-ins simple and secure
  • “Change your password immediately if a provider tells you your data may have been breached
  • “Only use HTTPS sites for logging in
  • “Don’t click on links or open attachments in unsolicited emails
  • “Only download apps from official app stores
  • “Invest in security software from a reputable provider for all your devices
  • “Ensure all operating systems and applications are on the latest version
  • “Never log-on to an account if you’re on public Wi-Fi; if you do have to use such a network, use a VPN”
  Tips for Online Shopping

With more and more people doing their shopping online, the U.S. Department of Homeland Security has issued some general tips to keep shoppers safe.

  • Software Updates  

    Whether shopping from your laptop or tablet, make sure your operating system (OS) and antivirus software is installed and up to date.

  • Password Protection  

    Make sure you don’t use the same password for multiple accounts. When possible, use multi-factor authentication.

  • Avoid Public Wi-Fi 

    Public Wi-Fi networks are not secure and should never be used to conduct online shopping or banking transactions.

  • Know Your Vendor 

    Stick to doing business with established companies you know. Legitimate vendors us Secure Socket Layer (SSL) to protect your information.

  Tips to Avoid Becoming a Victim of Identity Theft

With more and more people doing their shopping online, the U.S. Department of Homeland Security has issued some general tips to keep shoppers safe.

  1. Keep passwords secure and always shred documents that contain any sensitive information.
  2. Do not carry your social security card with you.
  3. Sign the back of your debit and/or credit cards.
  4. Never provide a caller with your personal information such as your date of birth or your social security number. This information is not a requirement for placing an order at an e-commerce web site.
  5. Take advantage of electronic banking services, such as E-StatementsOnline BankingMobile Banking. By using these services, you can avoid sensitive information being left in your mailbox.
  6. Know who you are dealing with before providing and confirming any personal information to mail order, telephone or internet merchants.
  7. Review your bank statements each month and know your billing cycles. If you know you have a bill due and you haven't seen the bill, call the company to investigate.
  8. Review your credit report annually to see if anything seems unusual, for example, like an account you didn't open or charges you didn't make. You are entitled to one free credit report a year.
  My Identity Has Been Stolen. Now What Do I Do?!

If you have been the victim of identify theft, here are some steps to help you get your life back on track:

1. Place a fraud alert on your credit report.
  • When you place an alert on your credit, this will prevent any other account from being opened.
  • You can request a report to see if any charges seem suspicious.
2. Close the accounts you think could be affected.
  • Contact someone in the fraud or security department of your financial institution.
  • Follow up in writing with copies of any supporting documents.
  • If any debits exist on your accounts, or a new account has been opened, ask the financial institution for the correct paperwork to dispute them.
3. File a complaint with the Federal Trade Commission (FTC)
  • When you file with the FTC, you are providing information to help law enforcement officials track down thieves.
4. File a report with the local police department
  • Filing a report, along with a complaint to the FTC, can give you certain protections to ensure your identity can be protected and restored.
 Ways to Protect Your ID

Under the Gramm-Leach-Bliley Act (GLBA) and Privacy Laws we are required to ensure the confidentiality of a consumer's information. Here are ways a consumer can protect their ID's from theft:

  • Monitor credit annually

  • Use a P.O. Box

  • Opt-out of junk mail / internal marketing lists / offers of credit

  • Enroll in the "DO NOT CALL" registry with FTC (Federal Trade Commission); it's FREE!

Questions?

If you have any questions about any of the services we offer, please call us at 877-474-5511 or 712-933-5511Email us, or stop in to see us during normal business hours.

Questions?

If you have any questions about any of the services we offer, please call us at 

877-474-5511 or 712-933-5511Email us, or stop in to see us during normal business hours.