Get started

About Genome

Genome’s approach to secure money transfers and data protection

Security of Genome’s services and clients’ data

Additional services

Genome's security measures

We implement all the tools and follow relevant regulations to protect our clients' data from breaches, unauthorized transactions, cybersecurity threats, and fraud. That said, clients should also know how to ensure the security of their data when using Genome's services.

On this page, we provide essential financial fraud prevention advice to help our clients protect their personal information before and during the use of Genome's payment methods and services.

Think you can spot a scam

Think you can spot a scam? Test your knowledge of fraud prevention

Do you know how to recognize a scam when you see one? Take our quick fraud prevention test to see how sharp your fraud-detection skills really are - and learn how to stay one step ahead of the scammers.

Take the test
Regular usage of Genome’s services

Regular usage of Genome’s services

Genome is an Electronic Money Institution licensed and supervised by the Bank of Lithuania. We operate entirely online, and our clients can access Genome’s web version via their computers, laptops, phones, and tablets, or download the Genome app on their phones or tablets.

To protect our clients' data at every step, Genome complies with all major regulations and standards, including:

  • General Data Protection Regulation (GDPR)
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Payment Services Directive 2 (PSD2)
  • ISO/IEC 27001:2022 and ISO/IEC 27701:2019, certified by TÜV NORD CERT

Our compliance efforts confirm our commitment to information security, privacy, and operational resilience, in line with the EU's Digital Operational Resilience Act (DORA).

Best security practices

Follow these security best practices to protect your Genome account and personal data at all times

The internet connection must be secure when you access my.genome.eu via the browser or the app. Please refrain from using public Wi-Fi, as it may use unencrypted networks and be prone to hacking attacks.

Ensure that the personal computers, laptops, smartphones, tablets, and other devices that you use to log in to Genome are duly protected with antivirus or other security software.

Please install all the latest available versions of operating systems and software on your devices. Note that all devices should be protected by passwords and, if possible, additional authentication methods (such as biometrics, smart cards, tokens, etc.). It is necessary to prevent their use by other people without the owner's knowledge.

When you sign in to my.genome.eu for the first time, please come up with a strong password that contains upper- and lowercase letters, numbers, and special symbols. It must consist of at least 8 characters. The longer it is – the better. Make sure the password is unique and not used for any other apps, programs, or websites.

Don't share your password with anybody else.

Don't store your password in written form or on your computer, where it can be easily accessed by other people. Instead, memorize it or use a reliable password manager to store it.

Before signing up, it is mandatory that you read through Genome's Terms of Use and Privacy Notice. If you have any questions regarding these, feel free to contact us at support@genome.eu.

Don't fill out your password or other sensitive financial data in the presence of someone else or in public.

Don't leave your Genome app or Genome's website page my.genome.eu unattended when using them.

Genome enables two-factor authentication for all its clients in addition to a password, which comes in the form of mobile app confirmation, OTP, or biometrics. This security measure is in place to prevent malicious third-party logins and other unauthorized actions inside Genome.

Make constant checkups of payments, as Genome's clients have access to the information on incoming and outgoing transfers at all times. Genome's notification center also notifies clients of all completed operations.

After signing up, our clients start a verification process to open a personal or business wallet. During this process, you need to fill out personal and business information and provide some documents to confirm your identity, source of funds, and other data.

We need said procedures in place to eliminate the risks of potential fraudsters and malicious actors using our platform. All the data is collected and processed in a safe manner, as we comply with GDPR, PCI DSS, and PSD2. We ask our clients to carefully fill out all the required information to avoid mistakes and delays in account opening.

Also, during the process, clients undergo video identity verification with the help of Onfido, an AI-powered digital identity solution. Please make sure that you are alone and that nothing obstructs your face during the video identification.

Sending money safely with Genome

You can send money using your personal or business wallet, with each transfer protected by two-factor authentication, ensuring that you authorize transfers. Below are the key safety measures that help ensure secure money transfers.

Trusted recipients only

Trusted recipients only

Only send money to people or businesses you know and trust. Always double-check the recipient’s details before confirming a transfer.

Monitor transfers regularly

Monitor transfers regularly

Keep an eye on your outgoing transfers. Set transfer limits to help protect your account. If something appears suspicious, such as an unfamiliar payment, please contact us immediately.

Approve with caution

Approve with caution

Only approve payments you’ve made yourself. Be extra careful with unexpected or urgent transfer requests - they could be scams.

Enable instant alerts

Enable instant alerts

Turn on real-time transaction alerts in Genome. You’ll get instant updates, allowing you to spot any suspicious activity right away.

Order and use your Genome cards securely

You can order virtual and physical Visa cards for personal and corporate purposes. To keep your cards and transactions secure, follow the recommendations below.

Tips for secure card usage

Be cautious at ATMs

• Always cover your PIN when entering it at ATMs or POS terminals. Use a different ATM if someone appears to be watching you.

• Don't forget to take your card and cash from the ATM.

• If the ATM retains your card, block it immediately using the Genome portal or mobile app and notify us.

• If you’re unable to block the card yourself, call us at +370 5 214 1409 or use any other available contact method.

Shop on secure websites

• Use your card only on trusted, reputable, and secure websites or mobile apps.

• Always ensure the site uses HTTPS and shows a padlock icon in the browser bar.

• Prefer websites that support full authentication (e.g., Verified by Visa, Mastercard SecureCode).

Review terms before paying

• Check the merchant's terms and conditions, privacy policy, refund policy, and contact details before making a payment.

• Pay attention to transaction currency, conversion rules, taxes, and delivery costs.

• Don't proceed with the transaction if you don't agree with the terms.

Be careful with recurring charges

• When signing up for recurring services, review how to cancel the subscription and stop future charges.

• Be cautious with "free trials" that require your card details—read the terms carefully.

Monitor card activity

• Regularly check your Genome card transaction history.

• Confirm that all transactions match your receipts and are accurate.

• Report any unauthorized, suspicious, or unfamiliar activity to us immediately.

• Contact us immediately if your card or card data is lost, stolen, misused, or otherwise compromised.

Notice suspicious activity? Report it now

If you notice suspicious activity or unauthorized transactions, block your account or card immediately via the Genome app or web platform. Then, contact fraud@genome.eu or support@genome.eu for help.

The most common fraud schemes to watch out for

To help you stay protected, we advise reviewing the most common fraud schemes listed below.

ATM skimming

ATM skimming

What it is

It occurs when a fraudster attaches a device to an ATM that reads the magnetic stripe of banking cards and PIN codes. In such a case, scammers will replicate the card using the information they obtained to steal money.

How to protect yourself

To avoid such a scheme, make sure to always check that there is no additional keypad on top of the ATM's keypad, no card skimmer installed in the card slot of the ATM, and no additional camera directed at the ATM that can skim or capture your PIN and other card details.

Card-not-present fraud

Card-not-present fraud

What it is

This fraud type refers to criminal activity when a fraudster uses compromised or stolen banking cards. Usually, scammers try to make online purchases or money transfers to their accounts or other operations that do not require the physical presence of the actual card owner.

How to protect yourself

Clients must be cautious and can prevent their card/card data from being stolen. They need to ensure that they don't leave their cards unattended in public places and don't share their card data with anyone. Two-factor authentication must be in place for all card-not-present transactions. Also, it is essential to regularly monitor your transaction history to detect suspicious operations that a card owner doesn't recall. Follow the notifications regarding card transactions. If your card got lost/stolen, or you suspect that someone has obtained your card data, you need to immediately contact the support team and block your card.

Phishing

Phishing

What it is

In this case, malicious actors try to defraud personal information to access personal and financial accounts or steal financial data using deceptive tactics. Fraudsters that use phishing usually assume someone else's identity or operate under the guise of popular websites, especially e-commerce ones.

How to protect yourself

During phishing, scammers operate via emails - they may try to fish out personal information by asking a person to reply or implement a "click on a link" email spam so a person will download malware. There are also two other types of phishing - smishing (SMS phishing) and vishing (voice phishing). With the former, fraudsters contact their targets via text messages and messenger apps, and with the latter - via phone calls and voice messages.

To avoid this type of fraud, you need to ignore all emails, messages, and calls from unknown sources. Be careful when opening emails, texts, or receiving phone calls - don't rush into things. Do not open attachments and links from unknown sources or sources you do not recognize. Do not enter your Genome card details on webpages you are redirected to following such links, even if they look like the Genome website. Never share personal or financial details, passwords, or other credentials via email, phone, or messages. Install antimalware and antivirus software on your devices.

Wire transfer fraud

Wire transfer fraud

What it is

It occurs when a fraudster tricks someone into wiring money into their account. It is also known as authorized push payment fraud. Scammers often pose as bank employees and tax officials to trick people. A person also may receive a letter with a fake payment request that looks legitimate, even to the business email.

How to protect yourself

One of the basic rules for dealing with such scams is to refrain from sending funds to anyone you don't know and cannot confirm their identity. If the request comes from someone you know, verify their identity. And, as in the case of phishing schemes, do not share personal, financial information, or account credentials with a person requesting a wire transfer.

Account takeover

Account takeover

What it is

This fraudulent scheme occurs when a fraudster gains access to user accounts of individuals and companies to steal sensitive data or money. Often, this happens when stolen credentials are used. Thieves change the login, password, and contact information to lock the owner out of their account. When it comes to bank account takeover, in most cases, malicious actors transfer money to other accounts, make fraudulent payments, and try opening a credit line in the victim's name.

How to protect yourself

The account takeovers can be prevented if the account user takes safety precautions regarding passwords and credentials. To do so, a person must use strong passwords that contain upper and lower case letters, numbers, and special symbols. Each password must be unique for every account, and you should change them regularly - once every 1 to 3 months. Don't share your credentials with anyone or store them inside your computer, phone, or other device. If you have become a victim of an account takeover, you need to notify the support team immediately.

Romance scams

Romance scams

What it is

In such fraud cases, malicious actors target people who seek socialization and romantic relationships. They primarily communicate with their victims via social media and messages and assume another person’s identity. The fraudsters’ goal is to instill a sense of trust into a person they communicate with, so they can manipulate the individual into sending them money.

How to protect yourself

How you can recognize potential romance scammers: they will be very lively, engaging in conversation with their target at any chance. They will actively appeal to their target’s interests and beliefs to establish a more profound sense of connection between them. They are very likely to profess their “romantic feelings” towards the fraud victim early on during messaging. Once a scammer feels that they have gained the victim’s trust, they will ask for a funds transfer. When doing so, they will usually lie that they urgently need money because of an emergency.

Loan fraud

Loan fraud

What it is

This type of fraud occurs when malicious actors assume the identity of a loan firm to illegally obtain funds. The scammers try to trick individuals and companies into getting a loan of any kind and will offer lucrative deals and rush their victims into the process. Typically, they will ask for a payment in advance before the deal is even concluded. Once fraudsters receive the money transfer, they vanish.

How to protect yourself

To avoid loan fraud, individuals and businesses must ignore emails and messages from companies that offer loans and duly check the authenticity of a business they want to lend money from - it must have all the necessary licenses and registrations, a legitimate name, address, website, and other data. You need to carefully read through the terms and conditions, as well as documents, before signing them.

Emotional manipulation and fake promises fraud

Emotional manipulation and fake promises fraud

What it is

This fraudulent scheme shares many similarities with phishing scams. A person will receive a text/email/phone call about winning a lottery or a prize, even though they didn't participate in any giveaways. Using this pretense, scammers will either send a link or request personal information. If the individual clicks a link, they risk downloading malware. And if they give away personal information, the malicious actors will use it to log into a person's accounts and steal data and funds.

Fraudsters will email someone, claiming that this person has inherited a lot of money or other prized possessions from a distant relative. Scammers then will require a “small fee” for their services, for instance, to cover notary expenses, etc. Once an individual pays the said “fee,” malicious actors disappear, and a person, predictably, does not inherit anything.

How to protect yourself

If you get notified that you have won anything - be skeptical and do not click on any links or attached files. It is also crucial that you don't provide any information or financial data.

Such fraudulent emails create a highly unlikely scenario, so most people are likely to ignore them altogether. If you receive an email notifying you about an inheritance, be skeptical. Do not click any links, download any attachments, or share any information with scammers.

Investment scams

Investment scams

What it is

In the case of this fraud type, malicious entities contact their victims and offer to invest in stocks, property, cryptocurrency, etc., to fish out their funds. This scam is more elaborate, as fraudsters will usually create websites and presentations about how much money a person can get by investing. Of course, the information on these websites and presentations is fake and blown out of proportion to make the investment deal more lucrative. Scammers will try to call and text their targets as often as possible and aggressively market their investment product. Their goal is to pressure people into making money transfers, after which the fraudsters disappear.

How to protect yourself

To protect yourself from such a scheme, ignore companies that find you first and offer investment opportunities - they may be potential scammers. It’s also easy to recognize fraudsters among investment firms if they aggressively push their product and promise that an individual will get rich in a short period of time. At first, these malicious actors may ask for a small contribution but then start pushing clients to invest more and more.

Remember that a legitimate company that provides investment services must be licensed by the supervisory authority of the country in which it is registered. Before dealing with any investment company, a person must first check the jurisdiction it is registered in and verify if the investment company has the permits to provide such services inside the person’s country of residence.

Notice suspicious activity?

If you notice suspicious activity or unauthorized transactions, block your account or card immediately via the Genome app or web platform. Then, contact fraud@genome.eu or support@genome.eu for help.