IntroductionThe more we use modern technologies, the bigger are the relevant threats. Cyber criminals (hackers) generate multiple type malware (viruses) allowing unauthorized access to various electronic devices. It is important for IT users to realize the cyber threats to adequately react to an incident. Computer VirusThe computer virus is a malware mainly used by hackers for profit or damaging a potential victim. Among multiple type malware the ones below are the most widespread:
Symptoms of an Infected ComputerA computer may reveal several symptoms, by which you realize that it has been infected:
PC and the InternetToday, working without the computer and the Internet is virtually impossible. They make nearly all kinds of information easily available. However searching and speedy processing of the information, carry cyber threats, which may cause loss or damage of some important information stored in your hardware. Below there is some advice relevant to safely use your PC and the Internet:
Safety of the Mobile PhoneThe mobile phone makes it possible to affect nearly all kinds of banking-financial operations (remittances, bills, online shopping etc.) and that's what the hackers are most interested. By employing various methods, they try to penetrate into your mobile phone to get important, personal and sensitive information. What do you need to know to avert hacking threats? Below, there are minimal requirements relevant for the secure protection of the information stored in your mobile phone:
1. Use the antivirusIn order to get access to the personal information stored in your mobile phone, the hackers use viruses or virus-containing applications. For the sake of prevention, install the antivirus and update it regularly.2. Always install the software and system updatesInstallation of updates restricts the hacker’s ability to make use of the software and system weaknesses and ensures high level protection. 3. Do not download/install applications from unreliable sourcesThe applications downloaded from the unreliable sources, as well as the suspicious links and ads are highly likely to contain viruses allowing the hacker to get access to your mobile phone. While installing an application, open only the relevant links.4. Keep BlueTooth off but if it is on, switch off “Visibility”The switched on BlueTooth makes it possible for an outside device to penetrate your mobile phone within range of several meters. Therefore, switch on BlueTooth on if required and then turn it off. You can find the “Visibility” button in the BlueTooth menu; when it is off, the BlueTooth connection becomes invisible to outside devices.5. To open the mobile screen, use the password or fingerprintIn case of physical access to your mobile phone, a person will find it difficult to get your personal information, if opening the mobile phone screen is possible by the password or your fingerprint only.6. While using mobile banking, do not connect to the public or unknown WiFi;
For „android“ mobile phones: https://play.google.com/store/apps/details?id=com.mobius.mobilebank.cartuFor ios mobile phones: https://apps.apple.com/us/app/cartu-bank-mobile/id1255174973 Password PolicyFor PC, social media, Internet bank etc. website authorization use a complex password to make your personal information safe. Below, there is a list of minimal requirements for selection of a complex password:1. At least two Latin letters ('A'..'Z','a'..'z');2. At least one figure ('0'..'9');3. At least one symbol different from the Latin letters and figures, e.g. ! , @ ,# ,$ , % ,^ , & ,* ,( etc.)4. At least eight positions. You can generate a complex password on special Internet websites. By specifying relevant parameters, you can generate the relevant complexity password. FishingFishing is a type of the Internet fraud. By supplying false information, such as the quasi-official emails or creating a false Internet or Facebook pages very similar to legal ones, the hacker steals the personal information of its victim. Nowadays, fishing is regarded the most popular and efficient way of illicit obtainment of information.Mail Fishing is the most widespread type of fishing. The hacker sends an email to its victim, which may look much like a legitimate one. However, the message may not be virus free or contain a link clicking which infects PC or mobile phone of the victim. As a result, the hacker gets control over the device and obtain the personal, financial (passwords, card data, photos etc.) information.In case of Web Fishing, by a false Internet site (the Internet bank, shopping or utilities site), the hacker tries to mislead the user and gets its account name, user, password or card details. Ways of PreventionIn order to prevent fishing, the recommendations below should be followed:
Thank you for using our service.
Copyright © 2025 Cartu Bank
Created by Proservice