Security

GENERAL
SECURITY RECOMMENDATIONS

  • Ensure that your computer or mobile device is always updated with the latest patches for the operating system and applications you use.
  • Install and regularly update your antivirus software.
  • Create a strong password for your account.
  • Make sure your passwords are complex. Use strong and unique phrases as passwords.
  • A strong password must meet at least the following criteria:
    • Contain at least 8 characters;
    • Include at least one uppercase letter, a number, and a special character ($ & # @ !…);
    • Not be based on trivial character sets (e.g., ABCDEF), personal information such as names, birthdates, or children’s names.
  • Feel free to use password managers, specialized applications that allow the secure storage of all your passwords in encrypted form. Wherever possible, use two-factor authentication.
  • Never disclose your credentials (user account and password) via email or based on a phone call.
  • Regularly back up all important data.
  • Never leave your laptop or computer with an open session (logged in and unlocked). Whenever you step away from the computer, it is necessary to lock it (Ctrl+Alt+Del or Win+L).
  • Never leave your computer unsecured in unsafe locations – lock it!
  • Always keep your devices with you during travel.
  • Do not insert portable storage media (e.g., USB drives) into your computer if you suspect their origin (a USB device found on the ground, promotional items, etc.).
  • Perform regular backups of your device and the data on it.
  • Enable data encryption and create strong passwords for access to your phone and the applications you use to protect yourself in case of loss or theft.
  • Turn off Bluetooth and wireless connections when you are not using them.
  • Download mobile applications exclusively from official app stores (like Google Play or App Store).
Security

INTERNET SAFETY

Be cautious online – the information you share can be intercepted by third parties and misused. Avoid unverified websites and do not leave sensitive information to protect yourself from cybercrime.

How to recognize malicious websites and scams:

  • A website that redirects you or has many pop-up ads and fake buttons is a red flag.
  • Do not ignore warnings from antivirus software or browsers about dangerous sites.
  • If you notice signs of malware, close the site immediately. Common scams:

Easy earnings:

  • Offers on social networks promising unrealistic returns.
  • Fake giveaways: They ask for card details or SMS codes.
  • Malicious emails: Notifications about account inflows or inheritances requesting your information.
  • Fake delivery notifications: They ask for an additional payment to confirm.

Recommendations for safe internet use:

  • Only use trusted sites for entering personal and sensitive information.
  • Ensure the URL starts with https:// for a secure connection.
  • If your social media account is hacked, quickly restore access and change your password.

Be aware:

  • Of internet threats and use devices responsibly to mitigate them.
  • Rights to use the internet come with responsibility for potential consequences.
  • Downloaded content can carry viruses.
  • Publishing personal information can compromise your privacy.
  • Think carefully before posting anything on social media!

Important to know:

PaySpot will never ask its clients to provide login credentials for the app, sensitive card details, SMS activation codes, or transaction verification codes. PaySpot communicates with clients exclusively through official channels.

PREREQUISITES FOR SAFE ONLINE PAYMENTS

  • Install and regularly update antivirus software.
  • Use secure WiFi.
  • Avoid using shared or open WiFi networks that do not require a password. For online purchases, use your home internet or your mobile operator’s internet.
  • Pay with a credit card.
  • When paying online, always use a credit card that includes a security system like sending an SMS code or some other form of additional verification. It is best to use credit cards designated exclusively for online payments. Never send a picture of your card to make a payment.
  • Avoid visiting suspicious websites.
  • Pay attention to websites that seem original but differ by a few letters or characters. Visit transparencyreport.google.com/safe-browsing/search and type the address of the website you want to check. If a threat is identified, the site will warn you.
  • Always use the latest version of your internet browser.
Security

FRAUD PREVENTION

PHISHING

A scam where fraudsters impersonate trusted entities (banks, merchants, government institutions) via electronic communication to persuade the victim to disclose personal information.

Phishing operations:

  • The fraudster sends an email that appears to be from a financial institution, asking the victim to update their information.
  • The victim clicks on a link in the message that leads to a fake website, very similar to the official site.
  • On the fake site, the victim enters their username and password.
  • The fraudster collects the data and uses it to access the victim’s account.
  • Funds are transferred to a third-party account, from which the fraudster withdraws them.

Phishing does not only target electronic payment data – fraudsters may seek information about payment cards, PINs, ID cards, passports, and other confidential data by imitating trusted institutions.

Preventive measures against phishing:

  • Never reveal your password.
  • Do not click on unknown links from email messages – be suspicious.
  • Compare the address in the email with the real address of the institution.
  • Do not open unknown attachments if you are suspicious of the content or the sender.
  • Do not leave personal data like passwords, card numbers, or PINs.
  • Remember: financial institutions never ask for this information via email!

IDENTITY THEFT

A fraudster falsely impersonates you to withdraw money, open accounts, apply for loans, or even commit serious crimes like extortion or human trafficking.

How fraudsters access data:

  • Purchasing data from hackers.
  • Shoulder surfing – watching as you enter your PIN.
  • Eavesdropping on phone calls.
  • Spamming – sending fake offers via email.
  • Dumpster diving – finding discarded documents or equipment.
  • Phishing – false messages in the name of trusted institutions.
  • Hacking – stealing data from computers or databases.

How to protect yourself:

  • Do not share personal information with unknown companies or individuals.
  • Use strong passwords and always log out securely.
  • Ensure no one can see your PIN at the ATM.
  • Report the loss of a card to the bank and block it immediately.
  • Report missing documents to the police.

Credit card abuse:
Credit card abuse involves theft or fraud using the physical card or related data, such as the card number, CVC/CVV code, and expiry date. These details are used for unauthorized transactions, most often online.

Signs of card abuse:

  • The card is stolen or lost.
  • You receive an SMS for a transaction you did not make.
  • You notice unauthorised charges on your account.
  • You suspect someone has learned your PIN or card details.
  • Abuses often occur shortly after a card is lost – immediately notify your bank.

Recommendations:
Card and PIN:

  • Do not keep your PIN and card together.
  • Shield the keypad while entering your PIN.
  • Use biometrics (fingerprint or facial scan) for your mobile wallet.

Online payments:

  • Pay only on sites with https:// or a padlock symbol.
  • Use specific cards for online payments and keep only the necessary funds in the account.
  • Secure sites require two-factor authentication (one-time code via SMS or app).

Minimize risk:

  • Link your card to your phone and make payments using your mobile device.
  • Use contactless options at ATMs and in stores. Keep your card with you at all times.

TIPS REGARDING SCAM MESSAGES AND FAKE OFFERS

  • Data often requested in scams:
    • Username, password, phone number, activation code from SMS.
    • Card number, expiration date, CVV.
    • Requests to send a photo of the card or personal documents – this is a definite sign of a scam.
  • Dangers of suspicious messages:
    • Opening attachments or links can infect your device with viruses and enable data theft.
  • Fake messages from “financial institutions”:
    • Genuine institutions use only their official email domains.
Security

HOW TO PROTECT
YOUR MOBILE DEVICES

Recommendations for the security of your mobile device:

  • Regularly back up your device and its data.
  • Enable data encryption and create strong passwords for accessing your phone and the apps you use to protect yourself in case of loss or theft.
  • Install malware and virus protection software on your device.
  • Turn off Bluetooth and wireless connections when not in use.
  • Pay attention to the permissions you allow new apps to access on your phone when installing them. Install only the apps that are truly necessary for you.
  • Regularly clear your mobile phone’s cache and web browser history.
  • Download apps only from official app stores (like Google Play or App Store).
  • Regularly remove any app you have not used for a long period.
  • Avoid connecting to public, open, and unsecured WiFi networks without pressing need.
  • Regularly update your device to receive the latest patches from the manufacturer.

IF YOU BELIEVE YOU ARE A VICTIM OF FRAUD AND HAVE SENT MONEY FROM A PAYSPOT DOO NOVI SAD
ELECTRONIC MONEY INSTITUTION REPRESENTATIVE LOCATION, PLEASE CONTACT OUR CUSTOMER SERVICE CENTER AT:

381(0)21 310 3000

office@payspot.co.rs

#BeFraudSmart