Quick Payment Service:: Security Tips

Phishing:

Fraudulent emails are used by criminals to lure you to fake websites, which resemble original websites of financial institutions, and ask you to divulge personal information such as credit card number, PIN number or Security Authentication Key.

The most common type of phishing e-mail claims to be a security message requesting you to validate your personal details or security questions. However, the details you confirm are then sent to the criminals.

CrediMax would never request such personal information from you, our customer, in such an e-mail.

How to protect yourself

Pharming:

Similar in nature to e-mail phishing, pharming seeks to obtain personal or private (usually financial related) information through domain spoofing. Rather than being spammed with malicious and mischievous e-mail requests for you to visit spoof websites which appear legitimate, pharming 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere. Your browser however will show you are at the correct website, which makes pharming a bit more serious and more difficult to detect. Phishing attempts to scam people one at a time with an e-mail while pharming allows the scammers to target large groups of people at one time through domain spoofing.

How to protect yourself

Vishing:

Vishing is an attempt of a fraudster to take confidential details from you over a phone call. Details like user ID, login & transaction password, Card PIN, CVV or any personal parameters such as date of birth, email address. Fraudsters claim to represent banks and attempt to trick customers into providing their personal and financial details over the phone. These details will then be used to conduct fraudulent activities on your account without your permission leading to financial loss.

Tips to protect yourself

Key Loggers and Trojans:

Key loggers are software programs that capture a computer user's keystrokes. Such systems are used by hackers to obtain passwords or encryption keys and thus bypassing other security measures.

A Trojan is a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.

How to protect yourself