How to protect myself from scams?

We strongly advise you to not share any personal and financial data with unfamiliar people who call or email, or contact you by social media.
Once cryptocurrency is sent to the wallet that belongs to scammers, there is no way back.

Paybis.com is not an investment company and we never call our customers. If someone reaches out pretending to be us, please report it to security@paybis.com

Here are some tips to help you avoid being scammed:

  • Never provide a stranger with remote access to your computer.
  • Never trust people offering big returns for a small commission fee
  • Never trust people telling you there is bitcoin on your account, and you need to pay a small commission to unlock it.
  • Never respond to unsolicited messages and calls that ask for personal or financial details — just press delete or hang up.
  • Always verify the legitimacy of contacts by finding them through an independent source such as a phone book, past bill, or online search.
  • Do not click on hyperlinks in text/social media messages or emails, even if they appear to come from a trusted source.
  • Always check an e-mail or website URL to make sure that there are no extra words.
  • Keep the security on your network and devices up-to-date and have a good firewall to protect your data.
  • Check the reviews of the company you are about to work with on the internet. Make sure that people do not complain about being scammed and money loss.
  • Type “company name + reviews”, or “company name + scam”
  • Check the age of the website by typing the URL address here.
  • Check the company's license number on the internet.
  • If you are not familiar with a cryptocurrency, please learn more and understand how it works.
  • Always consider the possibility that an online approach could be a scam.
  • Remember that all cryptocurrency transactions and irreversible, and there is no way to get the money back.

How scammers/fraudsters contact you:

  • Calling you or coming to your door 
  • Contacting you via social media, preferably Skype and Telegram
  • Setting up websites that look real 
  • Impersonating government and bank employees via messages, calls, or e-mails
  • Collecting information about you from social pages, so when they make contact, they are more convincing 
  • Dating sites