Each year more and more Americans are victims of fraud. Home State Bank is dedicated to assisting its customers in protecting their private information.
We strive to provide our customers with the most up to date information we can, to help prevent anyone from being a victim of fraud. While we can't guarantee this will never happen, we will do our best to keep our customers informed. Please always remember Home State Bank will never call you asking for personal information such as account numbers, social security numbers, etc.
Glossary of Terms |
There have been a few new words and phrases being thrown around lately in terms of fraud. Without knowing what these terms mean, it can be more confusing than it needs to be. Let us help explain a few of terms we've been learning about here at Home State Bank.
Social Engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing and spear phishing, are examples.
Phishing (pronounced fishing) is a hacking technique that is the digital equivalent of “casting a net.” Phishing campaigns don’t target victims individually—they’re sent to hundreds, sometimes thousands, of people. Emails claiming to be from popular social web sites, banks, auction sites, or IT administrators are commonly used to lure the unsuspecting public.
Spear Phishing is highly targeted and targets a single individual. Hackers do this by pretending to know you. It’s personal.
Smishing is a form of phishing that uses mobile phones as the attack platform. This form of attack has become increasingly popular due to the fact that people are more likely to trust a message that comes in through a messaging app on their phone than from a message delivered via email.
Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information.
Whaling is a cyberattack that involves impersonating a high-ranking executive to steal money or sensitive information from an organization. It is also known as "whale phishing"
Quishing is short for "QR Code Phishing" involves obtaining sensitive information or install malware by directing people to malicious websites or fake payment websites.
Phishbait is an email crafted to attract prospective phishing victims to open an email and follow a malicious link.
Doxing is the action or process of searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.
Juice Jacking refers to the threat of malicious access gained to your phone or other USB devices when plugged into a public charging kiosk - such as at an airport or sporting event.
Malware is software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Scareware is malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
Passkey is a digital credential, tied to a user account and a website or application. Passkeys allow users to authenticate without having to enter a username or password, or provide any additional authentication factor.
Multi-Factor Authentication (MFA) is used to ensure that digital users are who they say they are by requiring that they provide at least two pieces of evidence to prove their identity. When you sign into an account for the first time on a new device or application (like a web browser) you need more than just the username and password. You need a second thing - what we call a second "factor" - to prove who you are.
Artifical Intelligence (AI) is a technology that allows you to generate, classify, and perform tasks like image analysis and speech recognition. AI encompasses a range of technologies, including machine learning, that allow computers to perform tasks requiring human cognitive functions, such as understanding language, recognizing objects, making recommendations, and controlling autonomous vehicles.
|
Updated October 3, 2025
Criminals are more sophisticated than ever with how they target older adults, and many of the most heartbreaking scams start with a fake emergency involving a grandchild. These scams work because they play on emotions and instinct. Fraudsters count on grandparents’ desire to help their families, and they use urgency and fear to cloud judgment.
One of the most common scams involves a phone call from someone pretending to be a grandchild – or claiming to be with law enforcement or a hospital calling on the grandchild’s behalf. The message is typically urgent, saying someone is hurt, arrested or stranded and needs money right away. These calls often come with instructions to stay on the phone, not tell anyone else, and send money fast.
Scammers will do everything they can to make the story seem real. Some use fake caller ID to make it look like the call is coming from a police department or medical office. Others may use tools to impersonate a grandchild’s voice.
Let elderly relatives know that any request for secrecy or urgency is a red flag. Remind them to hang up and call the number they know to verify before acting. It’s the safest way to confirm whether a call is real.
One smart way to guard against scams is to establish a family password – a unique word only trusted family members know. Pick something random, such as “butterscotch,” and use it regularly when calling or texting with grandparents. That way, if a scammer ever calls pretending to be a grandchild, your loved one knows to ask for the password. If the caller doesn’t know it, the call should end immediately.
It’s not always easy to spot a scam in the moment, especially when emotions are high. But by preparing ahead of time and setting some ground rules, you can help keep the people you care about safe.
--Information provided by Iowa Bankers Association: Money Cents newsletter
The FBI and the American Bankers Association (ABA) have issued a joint advisory warning of the growing threat posed by AI-generated deepfake scams.
“Criminals may pose as loved ones, government officials, law enforcement personnel, or even celebrities, often using fear and urgency to convince victims to send money or share sensitive information,” the advisory says. “According to the FBI, more than 4.2 million fraud reports have been filed since 2020, resulting in over $50.5 billion in losses, with a growing portion stemming from deepfake scams.”
FBI Criminal Investigative Division Assistant Director Jose A. Perez stated, “The FBI continues to see a troubling rise in fraud reports involving deepfake media. Educating the public about this emerging threat is key to preventing these scams and minimizing their impact. We encourage consumers to stay informed and share what they learn with friends and family so they can spot deepfakes before they do any harm.”
The advisory outlines the following red flags associated with deepfake images and videos:
“Blurry or distorted facial features
Unnatural blinking or facial movements
Audio-video mismatches
Flat or robotic voice tones
Odd lighting or shadows.”
It’s worth noting that some deepfakes won’t have any of these indicators, so users should also be wary of the circumstances surrounding suspicious requests. The advisory adds that users should:
“Stop and think before responding to urgent or emotional requests
Verify identities using trusted sources and reverse search tools
Create codewords with loved ones to confirm authenticity
Limit your digital footprint to reduce exposure
Report scams to the FBI at IC3.gov, your bank, and local law enforcement”
--Information provided by KnowBe4 Blog
If you feel like you get more than your share of unwanted calls, you're not alone. To slow down these persistent calls - some of which lead straight to scams - take a few simple steps.
Register your phone number for free in the National Do Not Call Registry. Registering will likely cut down how many unwanted calls you get. Unfortunately, it won’t stop calls from scammers to your home and mobile phone — and there are still organizations and groups allowed to call you.
Hang up on robocalls. Getting a lot of recorded messages trying to sell you something? Odds are the calls are not legal. Don’t press any numbers or call back. Instead, hang up and report them at DoNotCall.gov.
Learn more about how to stop unwanted calls at ftc.gov/calls.
--Information provided by BankOnIT Information Security Brief
Would you donate to a cause if the fundraiser lied about how the money would be spent? Probably not. But that’s what the FTC says Kars-R-Us.com, Inc. (“Kars”) did when it collected vehicle donations on behalf of a supposed breast cancer charity.
In a settlement announced today, the FTC says Kars raked in millions of dollars soliciting donations through TV, radio, and online ads, in English and Spanish. It claimed proceeds would go to United Breast Cancer Foundation (UBCF) to “save lives” by offering free or low-cost breast cancer screenings. But of the $45.5 million Kars raised for UBCF between 2017 and 2022, UBCF spent less than 1% to pay for breast cancer screenings.
Spot an ad for a charity you want to donate to? Here’s how to find out whether it’s legit and will support programs you care about:
--Information from Federal Trade Commision Consumer Advice
Tips to Help Safeguard Your Passwords: |
We strive to provide our customers with the most up to date information we can, to help prevent anyone from being a victim of fraud. While we can't guarantee this will never happen, we will do our best to keep our customers informed. Please always remember Home State Bank will never call you asking for personal information such as account numbers, social security numbers, etc.
ESET’s Phil Muncaster's offers the following advice to help safeguard your passwords:
--Information from KnowBe4 CyberHeist Newsletter & Blog
Tips for Online Shopping |
With more and more people doing their shopping online, the U.S. Department of Homeland Security has issued some general tips to keep shoppers safe.
Whether shopping from your laptop or tablet, make sure your operating system (OS) and antivirus software is installed and up to date.
Make sure you don’t use the same password for multiple accounts. When possible, use multi-factor authentication.
Public Wi-Fi networks are not secure and should never be used to conduct online shopping or banking transactions.
Stick to doing business with established companies you know. Legitimate vendors us Secure Socket Layer (SSL) to protect your information.
Tips to Avoid Becoming a Victim of Identity Theft |
With more and more people doing their shopping online, the U.S. Department of Homeland Security has issued some general tips to keep shoppers safe.
My Identity Has Been Stolen. Now What Do I Do?! |
If you have been the victim of identify theft, here are some steps to help you get your life back on track:
Ways to Protect Your ID |
Under the Gramm-Leach-Bliley Act (GLBA) and Privacy Laws we are required to ensure the confidentiality of a consumer's information. Here are ways a consumer can protect their ID's from theft:
Monitor credit annually
Use a P.O. Box
Opt-out of junk mail / internal marketing lists / offers of credit
Enroll in the "DO NOT CALL" registry with FTC (Federal Trade Commission); it's FREE!
Register online: www.donotcall.gov
888-382-1222 / TTY 866-290-4236
If you have any questions about any of the services we offer, please call us at 877-474-5511 or 712-933-5511, Email us, or stop in to see us during normal business hours.
If you have any questions about any of the services we offer, please call us at
877-474-5511 or 712-933-5511, Email us, or stop in to see us during normal business hours.