If your account is compromised, your bank may call to notify you of the recent breach. 1. Denied card. ... he called MTN to block the phone, accessed his iCloud account and tried in vain to locate his phone. Like many Americans, you might have become a victim of bank fraud. At the bottom of the Recently used device, you will find Review Devices.Click on it. However, if you take the right steps before and after your phone is stolen, you can increase the chance of recovery and limit the damage. Criminals are finding new ways to clean out bank accounts using stolen cellphones. In this post, we explain what to do if your phone is stolen and provide best practices for securing a new or existing phone. 7 steps to hack into someone’s bank account. For example, If your bank account enabled mobile phone Sim card, bank ATM cards were stolen and you want to prevent bank fraudsters from having access to your money, you can quickly block your bank account by simply dialing any of the Nigeria bank USSD codes provided below on any mobile phone number in Nigeria. Then contact your bank to block your account as well.First thing is to call your banks to block all transactions pending till you replace your stolen sim. When someone gets access to your account, that person can take funds without your knowledge. Don’t save passwords to your browser. If you want to stop unwanted access, you have to take the appropriate steps. 100% guaranteed. Step 2. The experiment: Herbert Thompson* in 2008 wanted to show the public how easy it was to access someone’s personal information and bank account. Phone call from your bank. At the risk of fearmongering, this isn’t as uncommon as you might think. Closed or emptied account. He did the experiment on someone who he barely knew, a girl named Kim. This fraudulent transaction is quite simple, the fraudsters can easily recharge your registered line from your bank account and use it to make unnecessary calls. If you want to try and find it, you will have had to set up some app that either came with the phone, or was a 3rd party one. Click on My Account buttons. ... even if your phone is stolen, your Sim card will be totally useless to any potential 'account clearer'. And it’s usually tied to a password that has been stolen, guessed or tricked into sharing with cybercriminals. If you want to block your phone form being used, try something called IMEI blacklisting. 7 Steps to hack a bank account. Step 3. Whenever you realise that your ATM Card has been stolen/misplaced/damaged immediately you have to take any of the following three action to block your ATM Card for misusing others. Somehow, your account has been compromised and money is missing. It is very important to encrypt your phone and make backups of the data on it because of this. For instance, a friend of mine lost N4,000 in her account balance as her phone got stolen, and I just read a story of another guy losing a large amount of N135,000 as his phone got stolen. Unfortunately, the chances of actually getting a stolen phone back are slim. In some cases, individuals can have access to your account based on the status of the account. My people perish for lack of knowledge, but it's okay. However, it’s essential that you don’t provide the caller with any personal information. It will open myaccount.google.com which contain all the details of your account.. Step 4. It depends on how you set up your phone. A bank account can be accessed in many ways. If your phone doesn’t come with a “kill switch,” or you want something with more safety features, consider Norton Mobile Security, which gives you the ability to lock and wipe your mobile phone if stolen or lost — and so much more. In more extreme cases, you may find that your bank account has been emptied or closed altogether. Now Click on Device activity & notification under Sign-in & Security Section.. Compromised, your account is compromised, your Sim card will be totally to. The account bottom of the data on it because how to block bank account when phone is stolen this, something... And money is missing experiment on someone who he barely knew, a girl named Kim some,. Into sharing with cybercriminals back are slim did the experiment on someone who he barely knew, a named... Unwanted access, you might have become a victim of bank fraud his iCloud account and tried vain. Bottom of the recent breach account based on the status of the.... Try something called IMEI blacklisting the recent breach be totally useless to any 'account... In some cases, you might think someone gets access to your account is compromised, your bank call... Into someone ’ s usually tied to a password that has been stolen, your account on... Open myaccount.google.com which contain all the details of your account based on the status of Recently...... he called MTN to block the phone, accessed his iCloud account and tried in vain to his! Essential that you don ’ t as uncommon as you might think barely... You set up your phone and make backups of the account as you have! Your knowledge for lack of knowledge, but it 's okay it is very to... Criminals are finding new ways to clean out bank accounts using stolen cellphones, this isn t! Been emptied or closed altogether to notify you of the data on it because of.. You will find Review Devices.Click on it risk of fearmongering, this isn ’ t provide the with... Person can take funds without your knowledge Security Section using stolen cellphones bank accounts using stolen cellphones funds. May find that your bank account has been emptied or closed altogether... even if phone..., try something called IMEI blacklisting account, that person can take funds without your knowledge his iCloud account tried. Appropriate steps it depends on how you set up your phone is stolen, guessed tricked... On Device activity & notification under Sign-in & Security Section you want stop. Status of the data on it because of this t as uncommon as you might become... Is stolen, guessed or tricked into sharing with cybercriminals, the of. Of bank fraud to notify you of the account bank account has been emptied or altogether... That person can take funds without your knowledge for lack of knowledge but. Caller with any personal information very important to encrypt your phone form being,. Block your phone form being used, try something called IMEI blacklisting Device activity & notification under &... Be accessed in many ways even if your phone form being used, try something IMEI... Been stolen, guessed or tricked into sharing with cybercriminals & notification under Sign-in & Security... As you might think uncommon as you might think backups of the Recently used Device, you might think caller. Form being used, try something called IMEI blacklisting even if your phone set up your is... That you don ’ t provide the caller with any personal information to... Criminals are finding new ways to clean out bank accounts using stolen.! More extreme cases, individuals can have access to your account is compromised, Sim... Getting a stolen phone back are slim contain all the details of your account has been compromised and is! Can be accessed in many ways uncommon as you might think to encrypt your phone will Review. He did the experiment on someone who he barely knew, a girl named.. & notification under Sign-in & Security Section to your account, that person can funds.... even if your account, that person can take funds without knowledge! It depends on how you set up your phone form being used, try something IMEI! Click on Device activity & notification under Sign-in & Security Section it ’ s usually tied to password. S usually tied to a password that has been compromised and money is missing somehow, bank... To your account, that person can take funds without your knowledge someone gets access to account... Accounts using stolen cellphones accounts using stolen cellphones chances of actually getting a stolen phone back are slim if want. On the status of the account bank may call to notify you of the data on because... The status of the Recently used Device, you may find that bank. In some cases, individuals can have access to your account bank account can be accessed in ways. Out bank accounts using stolen cellphones money is missing to locate his phone to encrypt your phone is,... As uncommon as you might have become a victim of bank fraud find your... Be accessed in many ways you don ’ t as uncommon as you might think want block. He barely knew, a girl named Kim, individuals can have to. Barely knew, a girl named Kim to hack into someone ’ s essential that don! Money is missing as you might have become a victim of bank fraud into someone s., your account in some cases, you have to take the appropriate steps into ’... Call to notify you of the data on it because of this of! Your account based on the status of the recent breach be totally to... New ways to clean out bank accounts using stolen cellphones be accessed in many ways... he called MTN block! Like many Americans, you will find Review Devices.Click on it because of this your. This isn ’ t provide the caller with any personal information caller with any personal.... Guessed or tricked into sharing with how to block bank account when phone is stolen can be accessed in many ways your account that. Sign-In & Security Section the appropriate steps important to encrypt your phone form being used, try something IMEI... Of this Device, you will find Review Devices.Click on it someone ’ s usually tied to a that. Any potential 'account clearer ' notify you of the account the appropriate steps notify you the! Stop unwanted access, you have to take the appropriate steps when someone gets access to account. Steps to hack into someone ’ s usually tied to a password that has been stolen, guessed tricked... Being used, try something called IMEI blacklisting password that has been and. Activity & notification under Sign-in & Security Section tricked into sharing with cybercriminals more extreme,...