We use cookies to make your browsing experience better. Agree and share a cookie with us!
To avoid potential fraud, payment cards and authorization data should always be kept in a safe place and inaccessible to third parties.
In addition to physical card theft, there are different methods that criminals use to get their hands on data necessary to carry out card fraud. This may include card skimming at ATMs and phishing, and then using this data to create fake cards or use it for card-not-present fraud (fraud carried out through online transactions, telephone or mail, without having to present the physical card itself).
Fraudsters then use this information to obtain funds from the victims’ accounts or buy goods in their name. Very often the data is stolen in one country and used elsewhere, which makes it harder to trace. People are often unaware that their card data has been stolen until it is too late.
How to keep your data safe:
If the card is lost or its data has been stolen
PIN - unique four-digit numerical code issued by the bank to the cardholder.
Card number, expiration date and security code
Card number - a 16-digit number on the front or back of the card, on the basis of which the card issuer can identify the account related to the card.
Expiration date - printed on the front or back of the card. The card can be used until the end of the calendar month marked as the expiration date.
Security code - a three-digit additional code, also known as CVV, CVC, CSC. VISA payment cards have the security code on the back of the card.
Using and protecting digital wallets
When the personal data has been compromised, fraud may also take place when customers are adding payment cards to a digital wallet and customer's personal data is compromised.
Such personal data may include card number, expiration date, CVC/CVV code, or OTP 6-digit code sent to the customer's phone number in the form of an SMS and which is valid for only 30 minutes.
The existence and sending of the OTP code to the client is a deliberately created security element that protects the client, their card and the funds belonging to them from unwanted digitization of the card, even if the card itself or its data are actually already in the possession of fraudsters.
Therefore, payment cards and authorization data should always be stored in a safe place and in a manner inaccessible to third parties.
In addition, for security reasons, the first or any of the subsequent actions with the digital wallet activated with the newly created tokens (the digital unique identifier of the card number linked to the specific device or merchant) must also be confirmed with the PIN code of the payment card.
Skimming
Skimming is making an illegal copy of the information on the card using fake card readers (skimmers) and keypad covers or hidden video cameras to store the PIN of the card. Using stolen data, fraudsters try to copy the victim's bank card.
How to protect yourself
Do not use any other magstripe readers, when you are not sure to whom the magstripe reading device belongs to.
Phishing
A scheme involving an email or a phone call made on behalf of a bank or other well-known company where the person is asked to disclose their card details and verification codes (Smart-ID and/or PIN calculator).
How to protect yourself
Online store scams
Fraudsters often use fake websites and pretend to be legitimate sellers. Newer scams use social media platforms. Fraudsters open the store for a short time, selling counterfeit trademarks. After a certain number of transactions, the seller's website disappears.
Warning signs
How to protect yourself
Disputing card transactions
Submit an application challenging a card transaction if:
To contest transactions, call the Luminor customer support +371 67 17 1880, submit a report in the Reports section of the Internet bank, fill out the application from the sample Claim for a card transaction/complaint or fill out the application on the luminor.lv website in the Application forms, Cards section, choosing the appropriate application form.