Where customers are asked to input their personal information, mistaking it to be the company's genuine website.
Normally a spam e-mail containing a hyperlink to a log-on page, which requests personal information. The page appears to be an official website but is actually a spoof website.
A malicious code attached or embedded in software that is planted in a customer's PC by a fraudster to access the customer's personal information. A form of Trojan is "key-logger" which monitor and record the keystrokes when a person types on the keyboard (e.g. user ID and PIN). This information can be passed back to an unauthorized person.
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
We have introduced the latest security measures for website's identity verification. If you are using following browsers to access the website:
Google Chrome version 88 or above
Internet Explorer 11 or above