What is Trojan ?
Trojan is a program which often looks like a legitimate program such as a game or utility. It travels with another program which you may download from a website or receive as an attachment in an e-mail. When executed, Trojan scan gathers information about our computer (files, passwords, etc.) without our knowledge and transmits this information back to the fraudster who has sent the trojan.
At times, this virus is designed specifically to capture credit card related data and build a mini- database at a pre-decided location for misuse by fraudsters.
In extreme cases, Trojan can also give the fraudster complete access to our computer without our knowledge. Once this type of Trojan has been installed on our computer, the attacker can access and use our computer as if they were the real owner!
A sample of the pop-up appearing on the infected screen is given below.
What is Spyware?
Spyware gathers personal information from our computer or information related to our activity on the Internet and sends the information without our knowledge to fraudsters.
How does a Trojan or Spyware program get on the computer?
Trojans and spyware are often hidden inside other computer programs. Trojans and spyware are commonly hidden inside softwares such as:
- Screen savers
- Time and date updaters
- Custom cursors (mouse pointers)
- Weather updaters
- Browser toolbars
- Internet games
- Online word documents
- Excel based documents
What is Malware?
Malware is primarily designed to infiltrate systems and the access information stored on them for criminal, commercial or destructive purposes.
Malware varies greatly in both, form and functionality. Some malware is used to steal information such as credit card numbers, identities or sensitive business information from the computer it infects. Other malware may take over our computer and use it for attacking other systems. Alternatively, the malware may just be malicious, with a sole purpose to destroy or corrupt information on your computer
How does Malware spread?
Malware is often present in e-mail attachments, or/and can be automatically downloaded and installed on your computer, when you click on links within e-mails.
Malware can be inadvertently downloaded from websites, or automatically downloaded while visiting some websites.
A fairly new tactic to spread malware is through the use of cleverly disguised pop- up adverts that appear as legitimate looking "Windows" alerts or messages.
Social Networking Sites
Malware is increasingly spreading through social networking sites by installing dubious 3rd party add-on applications or by web links in messages. There is a false sense of security when using these sites, so you must remain vigilant at all times.
Malware located in legitimate looking software is one of the most common ways it is spread. Peer to Peer software and cracked or pirate software (e.g. 'warez'), often facilitate the spread of malware.
Malware can be easily spread through the shared use of computer storage media such as DVDs, CDs and USB drives.
Malware has been known to spread through mobile devices such as cell phones. As devices become more and more like mini computers, the threat of malware on these devices will increase.
How to protect your computer from malware?
- Use a Firewall- Install and activate a personal firewall on your computer.
- Ensure your anti-virus and spyware detection software is updated regularly; daily if possible.
- Know what you are installing before you click 'install'.
- Do not enter your passwords, card details and codes in pop-up windows that may appear for no reason in the midst of your activity on any website or social websites.
- Log off from the session immediately on completing your activity.
- Ensure to do your online shopping on known and reputed websites only.
- Do not install any software that comes as an attachment via e-mail/web promotion.
- Run spyware checks on your computer frequently. A weekly scan is highly recommended.
- Never buy software in response to unexpected pop-up messages or e-mails
- Never click links in messages from unknown or untrusted contacts, and avoid clicking on message links sent from trusted contacts unless you are certain where it will lead you
- Never install unauthorized, unlicensed or unapproved software on your computer
- Do not insert untrusted computer media into your computer
- Be alert of unsolicited text or other message requests for software installs or links to unknown or untrusted locations
ICICI Bank has strong measures to ensure the security and safety of your account. By staying alert to potential security threats and keeping in mind the suggestions listed above, you can enjoy a safe and secure banking experience.