- Who We Serve
- What We Do
- About Us
- Insights & Research
- Who We Serve
- What We Do
- About Us
- Insights & Research
Learn more about ongoing security scams.
Contact Cyber Security
Scammers may try to use the brand of a well-known institution such as a bank to steal personal and financial information from users. This information can include account balances and credit scores. Learn more about the types of scams to look out for and how to protect your information.
Scammers are reaching out to users on personal messaging applications, such as WhatsApp or Telegram, falsely claiming to represent financial institutions and offering deceptive cryptocurrency investment advice.
Be cautious of scammers who call or email pretending to be your bank or other financial services companies. They claim to assist you with a fraudulent activity but may attempt to access your sensitive account information.
Scams perpetrated through the phone (also known as vishing) are on the rise. Don’t provide any information or computer access to incoming callers until properly verified. Click here for tips on how to spot this type of scam and how to protect yourself.
Have you received a letter claiming that you won a drawing for $49,260? This letter is a scam and is not from Northern Trust. Click here for more information on what to look for and how to avoid fraud attempts.
Have you seen a pop-up window while attempting to login to your Northern Trust accounts? This pop-up claims your information may have been compromised in a breach and offers you a free credit report and credit score. This offer is a scam and is not from Northern Trust or any other financial institution. Do not click on the link and do not enter any credit card information.
Northern Trust is aware of and monitoring new security vulnerabilities (referred to as 'Spectre" and "Meltdown") recently reported by Google Project Zero. These "bugs" have been identified in modern processors manufactured by Intel and other technology companies. Learn how you can reduce the risk to your computers and devices posed by these and other security flaws.