Terms related to electronic banking security-
An adware program is the one that spreads advertising through banners, pop-ups, etc. while running. This advertising subsidizes the application. Sometimes, this program includes a tracking code that collects information about your browsing habits, working as spy programs or spyware. This has generated some controversy because, in some cases, it is transferred to third parties without user consent.
Antivirus / Antimalware
Programs used to prevent detect possible virus infections or any type of malicious programs, and repair the damage they have caused.
In computer security, a backdoor refers to deficiencies in the security of an application or system that allows third parties to enter in violation of system security, usually for illegal purposes. For example, if a computer connected to a secure network is also connected to an unsecured wireless network, it could make this an insecure connection a backdoor to the secure network.
These are emails which request that the message is forwarded to other people so that they in turn forward it. It is one of the possible sources of problems with email, since may contain false information, carry viruses, etc.
Set of technologies that allow control of the information transmitted over Internet services. Content filtering is used to block viruses sent by email, to control Internet access for minors, etc.
Crackers are people who use existing tools to compromise system, computer or network security to steal, defraud or cause damage.
The concept crime ware includes all those computer programs designed for economic gain by committing all types of online crime. Phishing, spam, adware, among others are considered crime ware.
Use virus types which upon user entering online branch site address, it automatically forwards it to false site where they get access to confidential user data.
Digital information associated with a particular operation made on the Internet, which along with certificates guarantees participant identity in a transaction.
Program that uses the security weaknesses of another system to attack and disrupt its functioning, defraud or harm a system, computer or network.
Person with very specialized knowledge seeking vulnerabilities in systems, computers or networks and how they can manage to exploit them, violating existing security controls to cause damage, disrupt a system, steal information or execute a fraud.
Email with false information on the occurrence of new viruses, attacks, risks, urban legends and other totally false topics that cause fear and ask the recipient to forward the message to all his contacts; thus it manages to capture email addresses of users to whom messages containing viruses, spam, phishing will be later sent.
Program or device that records combinations of keystrokes pressed by users and stores them to obtain confidential information, like passwords, email message content, etc. The key logger can be a system that is distributed as viruses or a device that connects between keyboard and computer, used frequently in public computers such as Internet cafes.
The Malware (acronym in English of: "Malicious Software") includes all "malicious" programs (Trojans, viruses, worms, etc.) that seek to obtain certain benefit, causing some kind of damage to computer system or user.
Firewall installed as a program on a machine that strictly controls the accesses to it. Often used in home computers with direct Internet connection.
BCR offers the following and only security devices to make us of its virtual/online branch Bancobcr.com: Dynamic Key printed card or virtual and Digital Certificate.
Computer notice that without affecting information contained in a system leaves it unable to serve. Denial can be achieved by machine saturating or blocking.
It is a variant of phishing, which uses messages to mobile phones, rather than email, to attack. The remaining procedure is similar to phishing: the scammer impersonates the identity of a trust entity to request user to provide his data via another SMS or accessing a fake website identical to that of the entity in question.
Techniques that attempt to attack the security of computer systems by tricking users and administrators. Most social engineering techniques are similar to scams.
Type of phishing in which, instead of doing a mass e-mailing, the email is sent with a greater degree of customization to specific recipients, getting more credible messages than those of traditional phishing.
Spyware or Spy Program:
It is a type of program aimed at collecting system user information in which it is installed. The data collected is often related to the userīs browsing habits and used for advertising purposes. Although the installation of spyware can be done with the consent of the user, in many cases, it is installed without authorization, when installing another program supposedly harmless, or by a virus or Trojan, distributed by email.
Type of phishing attack that exploits the multiple tabs that the user opens in the browser. The tap napping process exploits the fact that the Internet users are convinced that pages open in tabs remained unchanged when accessing other Internet services.
Fraud pursuing the same goal as Phishing: obtaining users confidential data, but instead of using email or text messaging as SMShing, uses phone calls, trying to trick users into giving confidential information such as card numbers, PINS, keys and others, which are then used to commit fraud.
For more information, please contact: