A retail Forex broker Z.com has recently warned investors against phishing attacks. How can a client understand if phishing websites target Forex Broker?
15 December, AtoZForex – The Financial Conduct Authority (FCA) regulated broker Z.com has warned investors against websites that are not connected or affiliated with the company. These websites attempt to fraudulently get client data which is also known as ‘phishing’.
Z.com is the brand operated by one of the biggest retail forex brokers in Japan, GMO Click Holdings. The GMO CLICK Group aims to provide low trading costs and in-house-developed, high-quality trading platform technology to its clients.
Phishing websites target Forex Broker
Phishing is a type of a scam when the attacker tries to obtain data like login credentials or account information by acting as a legitimate entity. According to the company, the most secure way for clients to access Z.com Trade account services is to start from the website of the company. The website’s URL is http://trade.z.com/uk/.
Since Z.com is a regulated forex broker it runs its operations within a secure environment, with https:// being protected. Hence, clients can check the security certificate if they are not certain. This can be done by clicking on the green text next, GMO-Z.com Trade UK Limited , to the lock icon in the browser address bar.
Some of the account funding services of Z.com may bring clients to a URL that is a subdomain of https://trade.z.com/uk. For instance, for the Visa or MasterCard funding services. These pages are secure URLs that strat with https://. They also have a verifiable security certificate that you can see by clicking on the green lock or https:// text.
In case someone came across a website, has doubts whether it is run by Z.com Trade or https:// is not secured, the company recommends not to submit any personal details on that website. Additionally, clients can get in touch with Client Services Team who will be able to provide further assistance.
Think we missed something? Let us know in the comments section below.