manasquan-logo

You are leaving Manasquan Bank's website and going to a third party website. The site you are about to enter may have a privacy policy different from Manasquan Bank. Never disclose any financial information on a third party site. We are not responsible for the privacy and security policies or practices of sites outside of manasquan.bank.  Manasquan Bank and its affiliates are not responsible for the products, services and content on any third party website.  

skip to main content
Manasquan Bank

Don’t Be Fooled by “Vishing” Scams

How Fraudsters Use Caller ID Spoofing to Gain Your Trust

At Manasquan Bank, safeguarding your financial information is one of our highest priorities. Unfortunately, as technology evolves, so do the tactics scammers use to target consumers. One growing form of fraud is known as vishing — short for voice phishing.

Don’t Be Fooled: Understanding Deepfakes and How to Protect Yourself

Technology continues to evolve — and so do the tactics scammers use to deceive consumers. One of the fastest-growing threats today involves deepfakes: highly realistic fake videos, images, and voice recordings created using artificial intelligence (AI).

At Manasquan Bank, we want to help you stay informed and protected against emerging forms of fraud.

Be Cautious with “Summarize with AI” Features on Websites

Artificial intelligence tools are becoming more common online, and many websites now offer features such as “Summarize with AI” to help visitors quickly review content. While these tools can be convenient, cybersecurity researchers have found that some websites may attempt to influence how AI assistants recommend businesses, products, or services.

In some cases, this could make certain companies appear more trustworthy or highly recommended than they actually are.

Be Careful Opening Unexpected Microsoft Office Documents

Cybersecurity researchers recently discovered a sophisticated attack that uses malicious Microsoft Office documents to install malware on computers. In this campaign, attackers sent emails with documents that looked legitimate but contained hidden code designed to infect the device as soon as the file was opened.

While the initial activity was seen in parts of Europe, the technique could potentially be used anywhere because it targets widely used software like Microsoft Office.