I. What is the phishing?

Phishing is a fraudulent practice in which perpetrators attempt to send legitimate-looking emails/messages to collect the recipient's personal or financial information (such as usernames, passwords, account numbers, etc.). Phishing can come in the form of email, instant messaging, and may direct users to enter personal information on a phishing site that closely resembles the official site. In general, such emails may appear to be sent from your bank or financial institution, your business partners, social network sites, or from people in your email address book.

II. What are the common malwares?

1. Computer Virus

Computer virus is a small software program that spreads from one computer to another computer and interrupts computer operation. Computer virus can damage files stored in the hard disk or interrupt normal operation of the computer. Computer viruses are usually transmitted as email attachments, files sent on instant messengers, or from files downloaded via FTP (File Transfer Protocol). Therefore, unless a strange email is the one you expect as you have confirmed, please do not open its appendix.

2. Computer Worm

Computer worm is a program that can automatically copy, independently implement and spread throughout the whole Internet. The difference between the computer virus and computer worm lies in that the worm does not rely on existing program while the security threat from the worm is equal to that from the virus. Computer worm may be automatically installed when you inadvertently open the appendix of your email or message, including executable script.

3. Spyware

Spyware is a technology that can collect information of the individual or organization in unknown basis. It is a malware installed on the computer that collects user's information secretly and forwards to advertisers or other organizations or individuals with Interest. Spyware many change the computer setting, make connection speed slow, modify the homepage of the computer, cut off connection to the internet or make other program invalid.

4. Trojan

Trojan is a software program and malicious or harmful codes that is collected in the programming or data that seem harmless. It can launch attack on the hard disk: from making trouble on the user (such as popup window) to damaging the hard disk (such as destroying file allocation table). Trojan can set up backdoor by itself and allow hacker to enter the system.

III. What are common security protection measures?

1. System updates and patches

The operating system is composed of various components with multiple purposes while these components may have some loopholes to the extent to damaging your computer and even the entire network. Therefore, it's extremely important to install the latest security patches of operating system and browser. In addition to installation at the factory, it also needs regular download and installation of system patches newly issued by the operating system maker during normal use. There is no operating system needing no patches.

2. Antivirus Software

Antivirus software is a kind of computer program used to inspect, prevent and take measures to cancel or delete malicious software program like computer virus and worm. You shall regularly update the virus reservoir of anti-virus software to prevent the latest viruses. Most anti-virus software can be set as automatic updating.

3. Anti-Spyware

Anti-spyware helps to prevent popup windows, slow performance and safety threats from spyware and other harmful software. You should keep your anti-spyware most updated to prevent the latest spyware. Much of the harmful software, including spyware, is difficult to eliminate. Even if you attempt to uninstall such programming software, it can re-emerge after restarting your computer.

4. Anti-Spam email

You should treat with care some information that attempts to steal your personal or financial information when reading information on your email or browser. Some popular fraud examples include false email or website of the fake famous institutions, fraudulent lottery email or website. If spam has been sent to your mailbox, you should delete it immediately instead of opening it. You should also use spam filter to identify and differentiate the legal advertising email and the email with network phishing threat.

5. Firewall

Firewall is a set of special equipment deployed at the network gateway or special program on personal computer, which could impede unauthorized user from connecting to the Internet. For the personal computer, personal firewall may impede malicious software from passing over the security loophole scanning and attacking the vulnerability of the personal computer.

The above security tips are for your reference only. The Bank will not be responsible for the accuracy and completeness of such security tips.