Austin-Based Velocity Credit Union Alerts Customers To Phishing Scam

ROUND ROCK, TX —Velocity Credit Union officials have issued a scam alert, urging its customers not to respond to a call-and-text tactic designed to look like official communication from them.

According to an alert on the Velocity website, “Velocity has been made aware of a call and text SCAM being sent to members and non-members referencing Velocity Credit Union,” officials wrote. “Please know that Velocity is not involved in any way with this scam.”


Credit union officials remind the public that they never contact people and request sensitive information.

“If you receive and provided any information to these numbers or feel that your account information has been compromised, please contact Velocity immediately so we may assist you in protecting your account,” officials wrote.

In the event the fraudulent contact is made during business hours, credit union officials urge people to call (512) 469-7000. For after-hours help, victims of the scam should call option 3 in the automated telephone offerings.

“To learn more on how you can protect your account, visit our Scam & ID Theft Awareness page and our Online Safety Tips page,” credit union officials wrote.


Also, those who suspect they have been victimized by a phishing scam should forward spam that is phishing for information to and to the company, financial institution, or organization impersonated in the phishing email. Most organizations have information on their websites about where to report problems, officials said.

Those who believe they’ve been scammed, also can file their complaint at, and then visit the FTC’s Identity Theft website at

“Victims of phishing can become victims of identity theft,” credit union officials warned. “While you can’t entirely control whether you will become a victim of identity theft, you can take some steps to minimize your risk.”

Velocity’s main branch is located at 610 East 11th Street in Austin. Other Austin locations are located at 4220 South Lamar Blvd., 1201 West Braker Lane and 9300 South I-35. The credit union also has branches in Round Rock and Cedar Park, at 900 West Round Rock Avenue and 1230 East New Hope Drive, respectively.

>>> Image via Shutterstock

Get free real-time news alerts from the Round Rock Patch.


BBB Tip of the Week: New phishing scheme on tax pros

There’s a new phishing scheme going around that is targeting tax professionals.

Here’s how it works: a tax professional receives an email claiming to be from tax software providers attempting to trick them into clicking a link and downloading “important software.”

According to the Internal Revenue Service, the file has a naming convention that uses the actual name of their software followed by an “.exe extension.” When the attached file is downloaded it allows cyber thieves to track their key strokes in order to steal login information, passwords and additional personal data.

To combat this type of invasion the IRS launched the “Protect Your Clients; Protect Yourself” campaign to encourage tax professionals to enhance their security protections. The campaign reminds tax preparers to create security requirements for their entire staff regarding computer information systems, paper records and use of taxpayer data. It also recommends business require periodic password changes every 60 to 90 days.

Better Business Bureau serving the Northwest offers the following tips to tax professionals so they can better protect themselves and their clients:

  • Misspelled words. It’s true that everyone needs an editor. But it is very rare to find a typo in an email sent by a legitimate company. If your email wording is odd, it is most likely a scam.
  • Think before you click. Be wary of an email that includes urgent instructions to take quick action such as “Click on the link or your account will be closed.”
  • Pay attention to a website’s URL. Hover over any links to see where they lead. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different – but similar – domain.

For more tips on protecting yourself from these types of scams visit


GoDaddy customers targeted by clever phishing scam

Another day another phishing scam — This time, it’s the GoDaddy customers.

A phishing scam is one of the easiest techniques used by cyber criminals to steal personal or financial credentials of any user who is not familiar with social engineering. With everyday passing, these cyber scammers are coming up new and ever more convincing ways to trick users and take advantage of their online presence.

The latest phishing scam according to Defend Mag is targeting GoDaddy users (mostly website owners) by sending emails from a legit GoDaddy address The email content informs users that their email account storage on GoDaddy server has increased from the given 20MB limit and any incoming emails will bounce back, however, in order to solve the problem users are asked to click on a link and get 2GB free space.

Must Read: Scammers Used Google AdSense to Drop Malware on Android Devices

Until now, everything looks legit but to get the free space users are told to click on a link otherwise their account will be suspended and that’s where the game begins.

Email content can be read here

Now those who don’t have an account with GoDaddy may ignore the message but those who bought or have their domain hosted on GoDaddy are a potential target of this scam. Upon clicking the“Upgrade Mailbox” link users are taken to a legit GoDaddy site: mtparent (dot) com/themes/www (dot) html.


Once users add their GoDaddy login and passwords they are redirected to the original GoDaddy website and their login credentials are sent straight to cybercriminals behind this scam. The good news is that Chrome browser has already marked the website (mtparent (dot) com) that has been hosting this scam as a deceptive site that may reveal your personal information (for example, passwords, phone numbers, or credit cards).

godaddy-customers-targeted-by-clever-phishing-scam-3The bad news is that Chrome doesn’t show any warning message on [mtparent (dot) com/themes/www (dot) html] domain whenever a user is redirected to it. This can lead scammers to win as not every user is familiar with the phishing scams especially the one coming from legit looking email addresses.

Previously, HackRead exposed two phishing scams targeting users from legit email IDs both related to PayPal where one came from and the other one came from a genuine Irish government email address

Must Read: Facebook Phishing Scam Using Pornographic Images to Steal Login Data

If you are a website owner or manage sites for someone on GoDaddy; DON’T fall for this scam and spread the word.

Did you enjoy reading this article? Kindly do like our page on Facebook, follow us on Twitter and Google + and help us grow.