Your safety is our absolute priority.

Keeping funds safe

Payment by physical and online card

Account management through the application

Physical card security

  • Loss or theft of the card
    If your card is lost or stolen, another person can use it to:
    1. Contactless payment (without PIN for small amounts).
    2. Online shopping (if data is exposed).
    3. ATM withdrawal if there is access to the PIN
    Many cases occur because the card is kept in unsafe places or used carelessly in public places.

  • Skimming (card copying)
    Fraudsters can place invisible devices on ATMs or POS terminals to copy your card details.
    They can take:
    1. Card number
    2. Expiration date
    3. PIN (if captured by camera or hidden device)
    This could lead to the creation of a copy of your card and unauthorized use.

  • PIN Observation (Shoulder Surfing)
    In public places, someone may see your PIN as you type it.
    This is one of the simplest and most common ways of compromising security.

  • Unauthorized use
    Cards can be used without your knowledge for:
    1. Contactless payment
    2. Online payment
    3. Automatic subscriptions
    In many cases, customers only realize it after checking their transaction history.

  • Store the card like cash.
    You should treat the card the same as physical money:
    1. Always keep it with you and under control.
    2. Do not leave it in public places (restaurants, cars, etc.)
    3. Do not give it to anyone else, even if they claim to be staff.
    A lost card is an immediate danger.

  • Protect your PIN
    The PIN is the key to your card:
    1. Never share it with anyone
    2. Don’t save it on your phone, notes or photos
    3. Cover the keyboard when you type.
    Also:
    1. Use a unique PIN
    2. Do not use simple combinations (1111, 1234, date of birth, etc.)
    3. Change it periodically

  • Use only safe equipment
    1. Choose ATMs inside banks or secure facilities.
    2. Check for suspicious devices (moving parts, hidden cameras)
    3. Avoid ATMs in isolated areas.
    If something looks unusual, don’t use it.

  • Monitor activity in real time
    1. Regularly check transactions in the app
    2. Enable notifications for every payment
    The sooner you identify a problem, the easier it can be stopped.

If your card is lost, stolen or you suspect unauthorized use:

  • Block it immediately from the Pago app
  • Set limits to a minimum (1 lek) to stop transactions
  • Contact the support team
  • Request a new card

Rapid response is crucial to avoid financial losses.

Online Security & Digital Payments

The most common scams

Online scams are designed to convince you to act quickly and without thinking. In most cases, scammers don’t “hack” the system — they try to convince you to give them your information yourself .

Phishing is one of the most common forms of fraud. You receive an email or SMS that appears to come from a trusted institution (such as a payment gateway, bank, or a well-known company).

The goal of scammers is:

  • Make you click a fake link
  • Take you to a page that looks official
    Convince you to enter your details (email, password, card details, etc.)

In practice, this often happens like this:
“Your account will be blocked, click here to verify” — and the link takes you to a page that looks like the real thing.

Warning signs:

  • Urgent messages that prompt you to act immediately
  • Unknown or shortened links
  • Spelling errors or unprofessional formatting
  • Email address that is not official

Golden rule:
Don’t click links from suspicious messages — always log in to the official website yourself

Vishing is phone fraud. Scammers call you pretending to be:

  • Pago employees
  • Bank
  • Technical support

Their goal is to convince you to give:

  • OTP (verification codes)
  • PIN
  • Password
  • Card details

They often use scenarios like:

  • “We have detected a suspicious transaction”
  • “We need to verify your account”
  • “We are helping you avoid a scam”

They create pressure and urgency so you don’t have to think.
Warning : Pago will never ask you for this information over the phone.

These are pages that copy the design of real pages (like Pago or bank logins) to deceive you.

They look almost identical, but they are designed for one purpose:
They steal your credentials.
Customers often fall prey because:

  • They enter from a link sent by SMS/email
  • They don’t check the website address.

Always check:

  • URL (must be exactly pago.al)
  • HTTPS (lock symbol)
  • Errors in text, design or functionality

Practical advice:
Type the address into your browser yourself — don’t access from links.

Fraudsters use platforms like Facebook, Instagram, or WhatsApp to build trust.
Typical examples:

  • Offers “too good to be true”
  • Investments that promise guaranteed profits
  • Messages requesting “account verification”
  • Profiles that imitate official companies

In many cases:

  • The profile looks real.
  • It has a similar logo and name
  • But it’s not official.


Do not share any personal information through messages.

These scams occur when you make purchases on unsafe or fake sites.

The most common forms:

  • Online stores that don’t really exist
  • Products that are never delivered
  • Products that are completely different from the description

Warning signs:

  • Very low prices (much cheaper than the market)
  • Lack of information about the company
  • No real contacts or physical address
  • Advance payment only


Always verify the seller before payment.

How to protect yourself online?

Use secure credentials

Use strong and unique passwords for each platform.
If you use the same password everywhere, a compromise could affect all your accounts.

Enable 2FA

Two-step verification adds a layer of security.
Even if someone gets your password, they can’t log in without the additional code.

Avoid public WiFi

Public networks are most at risk for:
1. Intervention
2. Data theft
Do not make payments or log in to these networks.

Don’t click suspicious links.

Many scams start with a click.
Safest practice:
1. Write the address yourself
2. Verify the source

Think before you act.

Fraudsters rely on emotional response:
1.Fear
2. Emergency
3. Panic
If something seems unusual, stop, check, don’t act immediately.
Never share your data and always verify before acting.

How we protect you – PAY

Advanced data encryption

Real-time anti-fraud systems

24/7 transaction monitoring

Strong Authentication (SCA – PSD2)

Auditing and tracking of activities

Risk analysis for each transaction

Instant actions in the app

This is one of the most important elements, immediate control by the client.

1

Block the card

  • Log in to the app
  • Click Pago Card at the bottom right.
  • Click Block.

2

Limit card usage (ATM & Online)

  • Log in to the app
  • Click Pago Card at the bottom right.
  • Click Configure.
  • Disable:

    ATM Withdrawals to stop ATM withdrawals
    Online Payments to stop online purchases

This stops the use of the card without completely blocking it and gives you immediate control over its security.

3

Stop online shopping immediately.

  • Log in to the app
  • Click Pay Card
  • Click Limits.
  • Place 1 lek on all limits

This stops any online transactions.

4

Change password

  • Log in to the app
  • Go to Settings
  • Click Security.
  • Click Change Password

What to do in case of fraud

Block the card immediately.

Set limits to 1 lek

Change password

Check transactions

Contact Pago

MAIN RULE

Pago will never ask you to:

  • PIN
  • OTP
  • Password

If someone asks you for these, it is a scam.

Pago is registered in Albania as a trademark of Rubicon Sh.a.

We are licensed (No. 52, dated 22.01.2022) by the Supervisory Council of the Bank of Albania as an electronic money financial institution.

© All rights reserved Rubicon 2025