Why do I need Banking Protection?

Online banking services have become commonplace in today's connected world. It's true that banks invest heavily into securing your data. However, cyber criminals nowadays have various means to gain access to your sensitive banking information if you do not stay vigilant. The manner in which cyber criminals retrieve your information can go unnoticed, and as a victim of cyber crime, you may not even notice until it is too late.

When Banking Protection is activated on your computer, this feature offers a preventative layer to some of the techniques cyber criminals use to infiltrate your personal banking data. Some of the most common techniques they use are highlighted here.

Spoofed websites

Cyber criminals may use spoofed websites that appear to be similar to a real banking website. The point is to trick you into believing that their "bogus" site is a legitimate banking website. You subsequently get lured into logging into using your valid username and password, thus giving the cyber criminals access to your personal banking data.

Keyloggers

A keylogger program covertly monitors and logs your keystrokes and sends this information to the perpetrator. If this happens, it is probable that your computer has already been compromised by a keylogger program, which is considered as riskware. In this case, riskware already resides on your computer. We recommend running a scan regularly to avoid such a situation from arising.

Spam and phishing emails

Phishing emails are fraudulent emails that appear to be sent from legitimate enterprises. The email content usually directs you to spoofed websites, or the emails get you to unknowingly disclose private information that the perpetrator can then use to access your personal banking data.

For more information about the Banking protection feature, please see What is Banking Protection?

Pricing & Product Info

For product info and pricing please go to the F-Secure SAFE product page

Version history
Revision #:
9 of 9
Last update:
Monday
Updated by:
 
Labels (4)