Cautions of Online Fraud Wise Usage of Electronic Payment Digital Financial Management Further Readings

Cautions of Online Fraud

With the increasing maturity of financial technology and the widespread use of smartphones, people are actively engaged in various online consumption and financial activities, such as banking, investing, and shopping. As e-commerce and online investment activities continue to grow, scammers have found ways to engage in fraudulent activities. These include social media scams, phishing scams, and impersonation of investment advisers promoting “ramp and dump” schemes on social media. The forms of fraud are constantly evolving, and the risk of falling victim to scams is increasing. While technology advancement has made financial management and consumption more convenient, it is important for individuals to be aware of the associated risks and remain vigilant against common online scams.

    • Romance Scam

      Scammers often claim to be professionals from Europe, America, or working in Southeast Asia, and they search for targets on social media. After getting to know the victims, they initiate a pursuit and quickly establish an online romantic relationship without ever meeting in person. The scammers then use various excuses, such as needing to pay significant medical expenses or requiring urgent cash flow, to deceive the victims into giving them money. Additionally, some scammers establish ambiguous relationships with the victims and use fake investment platforms to entice them into participating in investments. Initially, the victims may earn a small return, but they suffer significant losses when more funds are invested.

    • Online Shopping Fraud

      Online platforms for shopping and selling second-hand items have become popular due to their convenience. However, based on police statistics from the past five years, there has been a consistent rise in online shopping fraud cases. Scammers may impersonate sellers to attract unsuspecting victims by imposing purchase limits, providing discounts, or offering to purchase items on behalf of customers from other regions. After receiving payment from customers, scammers typically vanish and sever all communication. Alternatively, they may assume the role of buyers and fabricate false payment records, such as counterfeit deposit receipts or invalid cheques, to deceive sellers into releasing the goods. Once they obtain the items, they disappear and sever all contact.

    • Online Employment Fraud

      Scammers use various online social media platforms or instant messaging apps to post job advertisements to attract job seekers. These recruitment ads often promoting enticing features such as high salaries, same-day payment, or work-from-home opportunities. They deliberately have low requirements in terms of age, education, and work experience for applicants. However, these job postings intentionally omit crucial details such as the actual job position, responsibilities, company name or address. Scammers employ various excuses to deceive victims to make payments, such as fees or deposits, under the pretense of securing job opportunities. Once the scammer succeeds in obtaining the payment, they sever all contact.

    • WhatsApp Hijacking

      Scammers employ deceptive tactics to hijack victims’ instant messaging apps, such as WhatsApp accounts and contact lists. Typically, scammers will impersonate the victims’ friends or family members and send messages requesting the victims to share the verification code of their WhatsApp account. They then use the victims’ phone number to log in and take over their WhatsApp account. Impersonating the victims, the scammers contact their friends and family, urging them to buy game point cards and share the serial numbers with the scammers.

    • Phishing SMS/Whatsapp Messages

      Phising is a type of online fraud where scammers pose as banks, government departments or commercial organisations by sending fake SMS/WhatsApp messages. They entice individuals to click on fraudulent links that direct them to counterfeit websites. The aim is to deceive people into providing personal digital keys such as phone numbers, bank account or credit card information, and login passwords. If scammers obtain this information, they can impersonate you and gain unathorised access to your online banking or other digital financial service accounts, resulting in financial loss.

    • Stock Trading Scams On Social Media

      On social media, scammers have created numerous stock trading groups or “stock classrooms” with the intention of running “ramp and dump” schemes, rather than engaging in genuine discussions with investors. These groups make false claims about offering exclusive tips and insider information supposedly sourced from experts. In order to attract more followers, some scammers even impersonate public figures such as financial experts and Key Opinion Leaders (KOLs) to create and manage these stock trading groups.

    Reference:
    IFEC - Beware of Online Scams

    • Don’t be Greedy

      Whether it is an investment scam or a romance scam, individuals who fall victim to these scams often find themselves confused and vulnerable to the persuasive tactics of scammers. Phrases like “easy profits, high returns, low risk” are commonly used as bait in investment scams, luring unsuspecting individuals with false promises. However, it is important to recognise that there are no guaranteed profits or high returns in any investments. Scammers manipulate victims by creating a sense of urgency, pressing them to act quickly. When faced with requests involving money or personal information and feeling unsure how to respond, it is crucial to remain calm. Seek help from trusted people around you, as they may provide valuable insights and offer a clearer perspective. It is better to err on the side of caution and seek guidance than fall prey to scammer tactics driven by greed.

    • Exercise Caution and Verify

      It is important to remain vigilant against scammers who may impersonate individuals you trust and contact you through phone calls, emails, or social media messages, requesting money or personal information. Always take the necessary steps to verify the person’s identity before taking any action. When accessing banking websites, emails, mobile apps, etc., be mindful of any suspicious visuals, hyperlinks, or attachments that may request sensitive personal information. It is advisable to follow official channels, exercise caution, verify information, and consult with trusted individuals to ensure protection against scams.

    • Safeguard Your Passwords

      Passwords are important pieces of information that authenticate our identities, making them enticing targets for scammers and hackers seeking unauthorised access to our bank accounts, investment accounts, or social media profiles. To protect yourself, it is crucial to create strong and unique passwords, and change them regularly. It is advisable to use different passwords for each account and avoid storing them on easily accessible devices or locations. Safeguarding passwords is essential to reduce the risk of unauthorised access to your accounts.

    Reference:
    IFEC - Don’t Believe the Scammers

    • Victims of online scams come from different age groups, educational backgrounds, and occupations. Try to analyse the various reasons behind falling victim to scams.
    • If someone fall victim to online scams, what are the consequences they may face?
    • If you or your family or friends unfortunately fall victim to a scam, how would you handle it? What attitude would you maintain?
  • Please click here for more information.

Wise Usage of Electronic Payment

Payment methods are gradually moving away from a cash-dominated model in today’s modern society, as an electronic payment revolution is sweeping across the city. This shift encompasses various aspects of daily life, including consumer payments, online shopping, bill payments, fund transfers, and investments. With the availability of smartphones, smartwatches and tablets, transactions have become simplified and more convenient than ever before. While enjoying the perks of electronic payments, it is crucial remain vigilant about the potential security risks and personal privacy issues that associate with electronic transactions. It is also important to strike a balance and prioritise security to ensure that convenience does not come at the expense of our personal information.

    • Credit Card

      Credit cards are widely used as a primary payment for general consumption as they offer interest-free repayment periods and the convenience of cashless transactions. By ensuring that the balance is fully repaid by the due date, cardholders can avoid high interest and fees. However, if cardholders use cash advance to obtain cash from credit card, they have to pay interest and fees. It is important to note that credit card transactions are subject to terms and charges, so it is crucial to have a good understanding of the terms and conditions before using the service.

    • Debit Card

      Debit cards operates differently from credit cards in terms of payment. When a debit card is used for a purchase, the corresponding amount is immediately deducted from the linked account, such as a savings account. It is necessary to ensure that there are sufficient funds in the linked account to complete the transaction successfully. The common types of debit card spending, including using an ATM card for EPS payments and using a bank-issued debit card for direct purchases.

    • Stored Value Facilities

      Stored Value Facilities (SVF) refer to facilities which can store monetary value and can be classified into physical ones (e.g. Octopus Card) and non-physical ones (e.g. e-wallets). Similar to debit cards, SVF can be used for purchases as long as there are sufficient stored values available. SVF can be reloaded by making cash deposits or transferring funds. SVF can also link to a deposit account or credit card for direct debits during purchases.

    • Mobile Payments

      Mobile payments are gaining popularity due to the rise of mobile devices such as smartphones and smartwatches. One of the most common type of mobile payments involves Near Field Communication (NFC) technology. NFC enables smartphones or smartwatches to communicate and exchange data packets with proximity card readers over very short distances. Apple Pay and Android Pay are the examples of mobile payments using NFC technology. Contactless payment offered by these mobile payments eliminate the need for physical credit cards or debit cards. This streamlined process enhances convenience and efficiency, speeding up the payment process for seamless experience.

    • Faster Payment System (FPS)

      Introduced by the Hong Kong Monetary Authority, the FPS is a payment platform on which banks and SVF operators in Hong Kong are connected. It allows the public to make person-to-person (P2P) or person-to-merchant (P2M) fund transfers using online banking, mobile banking, or e-wallets. The FPS allows users to initiate transactions by simply using the payees’ mobile number, email address or QR code, providing convenience and accessibility anytime and anywhere. In addition to Hong Kong dollars, the FPS also supports transactions in Chinese yuan (Renminbi).

    • Be Vigilant for Cyber Security

      Avoid using unfamiliar or insecure Wi-Fi networks in public places, and remember to disable Wi-Fi, Bluetooth or NFC functions on your device when not in use. Regularly update the operating system to ensure the security of your computer or mobile device used for online transactions. After completing an online transaction, always log out of the website or system and clear the data stored in the internet browser’s cache, cookies and browsing history.

    • Set Secure Passwords

      Create strong passwords by using a combination of at least eight characters including a mix of letters and numbers. Avoid using the same password for multiple accounts and change your passwords regularly. Never share your password with anyone. Be cautious of phishing attempts or fraudulent emails or text messages requesting your login information. Banks and SVF operators never solicit personal information or ask for account passwords from their customers via email, phone calls or text messages.

    • Always Protect Your Personal Mobile Devices

      By enabling automatic locking, installing reputable antivirus, anti-spyware, and anti-malware software, and configuring personal firewalls, you can maximise the protection of your computer or mobile device. Only download mobile apps from official app stores. Keep your device’s operating systems, apps, software, and browsers updated.

    • Knowing Your Payment Tools

      Before using any mobile payment apps, it is important to thoroughly review their terms and conditions. Pay attention to details such as fees, privacy policies, and user rights and responsibilities. Different mobile payment apps operate using different mechanisms. Some may directly link to your bank or credit card account, while others may require preloading funds into the app.

    • Avoid Disclosing Confidential Information

      Mobile payment tools may request access to data stored on your phone, such as contact information, location or photos. Service providers should seek your consent before accessing such data. Before granting access, you should consider your needs, circumstances and necessity of granting access before making a decision. When installing any software or apps on your computers or mobile devices, you should carefully consider security and privacy implications.

    • Pay Attention to Payment Details

      When shopping online, it is crucial to assess the security of the website, particularly the login and payment pages. Look for indicators such as a padlock symbol in your internet browser’s address bar and ensure that the web address starts with “https”, indicating a secure connection. Consider printing or taking screenshots of transaction records. Avoid transferring funds, making direct deposits, or sharing bank or credit card information through email. Instead, use secure online payment methods that offer encryption and robust security measure. For example, using FPS or SVF to make direct payments to merchants.

    • Regularly Check Your Transaction Records

      Making it a habit to regularly check your transaction records. Log in to your bank or credit card accounts or SVF periodically, or as prompted, and carefully review all transactions. By checking your transaction records frequently, you can promptly identify and address any unauthorised transactions that may have occurred.

    References:
    IFEC - Mobile Phones to Replace Cash
    IFEC - Security Tips for Online Trading

    • What are the advantages and conveniences of electronic payments? How do electronic payments benefit personal consumption and financial management?
    • The convenience of electronic payment methods may contribute to an increase in online shopping activity. What strategies should teenagers adopt to avoid excessive spending?
    • Is electronic payment suitable for all scenarios? In which situations is it more advisable to use cash or other payment methods?
  • Please click here for more information.

Digital Financial Management

Technological advancement has created a stage for the development of “fintech”, which significantly enhances the operational efficiency and service levels of financial institutions through innovative technologies. The four major areas of fintech are artificial intelligence (AI), blockchain, cloud computing, and big data. As long as individuals have internet connectivity, financial management can become a simple task at their fingertips with fintech. However, since decisions can be made with a simple touch or swipe, and submitting information takes just a blink of an eye, it is even more important for individuals to remain vigilant in order to safeguard their personal privacy and rights. While embracing the digitisation of financial management, it is crucial to maximise security awareness at the meantime.

    • Artificial intelligence (AI)

      AI is capable of mimicking human intelligence and improving itself through “deep learning”. Deep learning is a subset of machine learning that simulates how the human brain learns, processes, and analyses massive amounts of data and information, ultimately generating and providing decision-making solutions. Taking robo-advisers as an example, their ability to select stocks or build investment portfolios often relies on investment theories and models. Another example is AI’s real-time calculation of network defence mechanisms, enabling it to prevent, detect, and respond promptly to attacks and threats, making it more efficient than other online systems.

    • Blockchain

      Blockchain is a technology that supports various cryptocurrency transactions by providing a decentralised ledger and verifying transactions. Bitcoin is the most well-known application of blockchain technology. Through blockchain, every transaction conducted on the Bitcoin network is recorded anonymously in a publicly accessible ledger. Each new Bitcoin transaction is added to the blockchain. Different industries are eager to explore this emerging technology, including finance, energy, media and entertainment, and retail. In the finance industry, for example, traditional financial systems can utilise blockchain services to manage online payments, accounts, and market transactions, enhancing the efficiency of batch processing and manual reconciliation in financial transactions.

    • Cloud Computing

      Cloud computing connects users to cloud platforms where they can apply for, and access rented computing services over the internet. Central servers handle all communications between client devices and servers for data exchange. This architecture typically includes security and privacy protection features to ensure the safety of relevant information when users only pay for their actual usage. An example of a cloud computing provider is Google’s Gmail, where users can access Google-hosted documents and applications from any device over the internet.

    • Big Data

      Big data refers to a large volume of data collected from different sources and channels. Nowadays, businesses can gather first-hand data such as browsing behaviour through tracking technologies on websites and applications, as well as through the utilisation of IoT devices. This data is then analysed, for example, using AI algorithms to differentiate users based on their varying purchasing power. Based on their different purchasing capabilities, appropriate information and services can be provided to users. Due to the enormous scale of big data, an increasing number of companies are opting to collect and store data using cloud services, establishing a big data environment, and applying the results of data analysis to support business decision-making and planning.

    References:
    IFEC - Robo-advisers: Understanding the Investment Intelligence of A.I.
    IFEC - Basic Concept - Blockchain

    • Mobile Payment

      Mobile payments are gaining popularity due to the rise of mobile devices such as smartphones and smartwatches. One of the most common type of mobile payments involves Near Field Communication (NFC) technology. NFC enables smartphones or smartwatches to communicate and exchange data packets with proximity card readers over very short distances. Apple Pay and Android Pay are the examples of mobile payments using NFC technology. Contactless payment offered by these mobile payments eliminate the need for physical credit cards or debit cards. This streamlined process enhances convenience and efficiency, speeding up the payment process for seamless experience.

    • Faster Payment System (FPS)

      Introduced by the Hong Kong Monetary Authority, the FPS is a payment platform on which banks and SVF operators in Hong Kong are connected. It allows the public to make person-to-person (P2P) or person-to-merchant (P2M) fund transfers using online banking, mobile banking, or e-wallets. The FPS allows users to initiate transactions by simply using the payees’ mobile number, email address or QR code, providing convenience and accessibility anytime and anywhere. In addition to Hong Kong dollars, the FPS also supports transactions in Chinese yuan (Renminbi).

    • Virtual Assets

      Virtual assets, also known as crypto assets, are digital forms of value that lack a physical presence. They can be used for trading, transfers, payments, and investments. Their value is derived from market demand and investor confidence, as they lack intrinsic value and do not have the support of governments, banks, or physical assets. As a result, virtual asset prices exhibit volatility, making them high-risk products. Moreover, virtual assets carry additional risks related to trading platforms, wallet security, and potential involvement in criminal activities. Investing in virtual assets should only considered by individuals who have a thorough understanding of this asset class and can tolerate the potential significant losses that may occur.

    • Virtual Banks

      The major characteristic of a virtual bank is the digitisation of banking services, meaning there are no physical branches, and operations are primarily conducted through financial technology and the internet. Customers can access banking services anytime and anywhere. Virtual banks mainly serve retail customers, including small and medium-sized enterprises (SMEs), with a focus on retail banking services. In the initial stages of operation, a virtual bank may only provide basic banking services such as account opening, deposits, and loans. As virtual banks continue to evolve, they may expand their offerings to include other services and products. Each virtual bank adopts different business strategies, focus on specific development directions, and offer unique features. It is important for customers to carefully assess whether the services provided by a virtual bank align with their individual needs and preferences.

    • Robo-advisers

      Robo-advisers generally refer to online platforms that use algorithms and data-driven strategies to provide financial advice. They collect information about clients’ age, financial goals, risk tolerance, investment horizon, and financial situation through online questionnaires. After analysing this data, they provide personalised investment recommendations that suits the clients’ risk level and financial objectives. In comparison to traditional human financial advisers, robo-advisers generally charge lower fees and have lower investment thresholds. They also provide round-the-clock financial advisory services, accessible as long as clients have internet connectivity.

    • Equity Crowdfunding

      Equity crowdfunding is a common form of crowdfunding that enables investors to invest in projects or businesses, typically startups, through online platform. In exchange for their investment, investors receive equity shares in the company. Investors can browse equity crowdfunding platforms through internet or mobile apps to access summarised information of crowdfunding projects or companies.

    • Peer-to-Peer Lending (P2P lending)

      P2P lending refers to a type of small-scale financing where online platforms or mobile apps act as intermediaries, connecting investors (lenders) with borrowers. These platforms leverage technology to streamline operations and reduce overheads, allowing them to offer loans with lower lending spreads compared to traditional financial institutions. P2P lending platforms offer various types of loans, including commercial loans and consumer loans.

    References:
    IFEC - Fintech and What You Need to Know
    IFEC - "New Virtual Asset Trading Platform Regulatory Regime at a Glance

    • Keep Your Personal Digital Keys Safe

      In the digital world, your account login and personal information are your personal digital keys. They are as important as the keys to your home. Examples of personal digital keys include online banking account number, login credentials, social media accounts, etc. Once these data fall into the hands of malicious individuals, they can impersonate you and gain unauthorised access to your online banking or other electronic financial service accounts, resulting in financial loss. It is important to avoid logging into online banking through unknown Wi-Fi networks or public computers; protect your computer and mobile devices; keep your operating systems, online banking apps, and browsers up to date; install and regularly update security software to defend against malware; and be cautious of suspicious files, websites, or opening unknown hyperlinks or attachments.

    • Take Confidentiality Measures Seriously

      Cybercriminals employ extensive tactics to infiltrate computers and mobile devices to steal login credentials for online accounts and manipulate them for their own gain. Therefore, you should be cautious of social engineering traps such as phishing emails or text messages, avoid disclosing online account information and confidential data to others, and exercise cautions when posting personal information on social media. Regularly scan your computers and mobile devices for viruses, detect and promptly remove any malicious software. Set up strong passwords that are unique and unrelated to personal information, and include a mix of uppercase and lowercase letters, numbers, and symbols to increase the difficulty of password cracking. Regularly change passwords and avoid reusing the same password for different accounts. By implementing these defensive measures, you can mitigate the risk of unauthorised access to your personal data.

    References:
    HKMA - Personal Digital Keys
    IFEC - Keeping Your Personal Details and Passwords Safe

    • How can digital financial management help us in effectively establishing and achieving financial goals, including savings, investments, and retirement plans?
    • How can teenagers prepare themselves to adapt to the rapid development of digital financial management?
    • How can we assist relatives and friends in becoming familiar with the digital landscape and enjoying the convenience of digital financial management?
  • Please click here for more information.