Computer viruses can cause serious damage to your computer's performance. The following measures minimise the risk of your computer getting affected.
One of the best ways to protect yourself against fraud is to monitor your account online. Here are some tips to help you monitor your accounts.
Citi India has a presence in several social networking sites that help us keep in touch with our customers and clients, including the following:
With more and more people joining social networks, there has been increased danger of social engineering, a form of identity theft where thieves gather personal information from available sections of social networking sites.
By taking the following precautions, you can guard yourself against social networking fraud.
Many new phones offer a "pattern lock" - a personalised shape or pattern that is drawn on the screen to grant access, and this is often faster and of lesser hassle than entering a password. Alternatively a PIN code offers a numeric alternative to a standard password and can also save time. Obviously a password that is easy to guess is less secure - so avoid "1234", "password" and other common phrases.
A screen lock is useful but won't stop someone from removing your SIM card and using it on another phone. To prevent this from happening, set up a SIM card lock in the form of a PIN number that will need to be entered when a phone is turned on in order to connect to a network.
With both of these security measures in place, you can at least be safe in the knowledge that if a phone is stolen it will be of very little use to the average thief.
The first thing to remember is to always switch off a wireless connection when it's not in use. Apart from helping you save on battery power, it ensures that malicious parties can't connect to a device without your knowledge. It's also worth taking a browse through a phone's network security settings as it might be configured to automatically connect to a network when in range.
Wireless hotspots and unknown networks are by far the biggest risk when it comes to utilising this connectivity - assuming of course, that any more commonly accessed wireless router in the home or office is sufficiently protected by a pass code.
A relatively common threat that pervades unknown wireless networks and hotspots is called the "evil twin" attack. Here a malicious party might be offering access to a wireless connection that looks very much like a legitimate hotspot from a large company. If a user were to inadvertently connect to this "hotspot", they may find requests for passwords, login details and other information that can then be recorded and used to access their accounts at a later stage. Any requests for information that don't seem entirely legitimate and typical should be ignored.
To prevent this from happening it's a good idea to set default Bluetooth configuration to "non-discoverable" mode by default. This means that users around you who are searching for potential targets won't see your device pop up on their list.
It goes without saying that any unknown requests that come via a Bluetooth connection, such as a request to "pair" with a device or respond to a message from an unknown source should be ignored or declined.
Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone® is a trademark of Apple Inc. Android™ is a trademark of Google Inc.
It's also important to exercise caution with respected applications such as popular web browsers, as it's often far too easy to simply accept qualification messages that pop up when you're online. Agreeing to save user details and passwords when logging into websites for future access may be convenient, but makes it very easy for those accessing an unprotected phone to do the same. This is particularly important when it comes to online banks and merchants, as these sites often have bank account details saved automatically under your username and would make it easy for others to make unwanted purchases or transactions.
In addition users should pay attention to any potential security warnings that may be displayed when viewing websites, particularly if accessing them through unknown wireless networks, and not just dismiss these without thought. Web pages that involve the entry of sensitive data such as a username, password or account details should always use encrypted protocols to protect this information. This can be confirmed by the presence of an "s" at the end of "http" at the start of a webpage URL (https://) or a visible padlock icon on the status bar of a browser to confirm that the connection is encrypted. It's a good idea to get into the habit of looking for these when using any websites that have requested for personal details.
Since rooting allows a user's access to system-level resources, it also opens up for potential infection by malware. Part of the reason why this critical data is inaccessible is to protect it from such threats, and while you may benefit from more flexibility in the short term, writers of malicious code can also benefit from full access to your device if it becomes infected.
Furthermore, it's possible to lock a device remotely, requiring password access on the handset or a specific unlock request to enable it. If a phone has simply been misplaced in the home, an audible alert request can be sent to the device to signal its location, and it's even possible to erase sensitive data remotely if you're sure it has found its way into the wrong hands.
Products & Services: Banking | Citigold Wealth Management | Investments | Insurance | Credit Card | Online Banking Services | Internet Banking | Mobile Banking Services | Banking SMS Alerts | Prepaid Recharge | Online Banking Security | Online Bill Payments | Statement on E-mail | SMS / E-mail Alerts | Online Tax Remittance | Online EMI Payment | Credit Card Apply | Credit Card Application