Software applications such as Trojan, Key Logger and Screen Logger
Known as Trojan or Trojan horses, these viruses allow remote access to your personal computers. It can be said that they are composed of two different modules in general. While the first module allows hacker to remote access and control over your computers, the second module creates a back door which enables a connection between your computer and the hacker.
Software applications such as Trojans cannot be downloaded unless you authorize them. Documents including .ini or .exe extensions may harbour these little Trojan viruses. Remember to check your system with up-to-date antivirus software, especially before installing the freeware. You should continuously update your antivirus software from its official site and protect your computer with a firewall program.
Basically, Key-logger can be defined as a small scaled application which regularly transfers information to another person without the main user’s notice. Hackers may use one of the known key logger applications or create a key-logger themselves and send these small applications to other computers. After key-logger is installed automatically in another remote computer, it generally starts to work secretly and it regularly transmits the registered data to the hackers as it is programmed. Commonly it logs all of the keyboard types to its buffer memory and transmits these data.
Both Screen Logger and key-logger basically have the same principle. However, screen logger programs store not only transferred data and keyboard types but also your screen shots. Upon clicking a spot on your screen, screen logger takes a photo of whole of or a part of this scene (generally a small square centered by the mouse) and it transfers a current photo to a temporary address on the Internet.
E-mails promising high profits
The main purpose of these e-mails is to obtain your bank and identity information by offering mediation to the e-mail receiver in return of high profits. In the meantime, you may be asked for an advance payment in order to transfer the money offered as a brokerage or as award into your account. In case you send this amount, perpetrators of fraud will be sure of validity of your account number and account information while they keep your information to use in other fraudulent acts. Please do not send personal information to third parties.
Perpetrators of fraud copy a website and begin to broadcast via a similar web address. In order to increase number of visitors to these fake sites, they send e-mails to the addresses which they obtain from different sources by promising quite attractive advantages or causing the users to panic, and also they give paid advertisements on search engines. While these e-mails or advertisements seem to include a link to the original website, the customers are directed involuntarily to the fake sites.
Our bank only sends informative e-mails to our customers. Our bank never sends e-mails including direct links to our Internet Branch, nor request password and personal information.
Remember that our Bank developed and made compulsory the “Greeting Message’’ application so that you can recognize fake sites. Fake sites are not capable of reaching your greeting messages, which are kept only in our Bank records. Thus greeting message lets you know easily whether you are really in a safe area or not. You can change your greeting message at any time from our Internet Branch.
Our bank sends only informative e-mails. Never click on the e-mails asking you to enter your password!
Our bank sends only informative e-mails. In other words, we do not send e-mails requesting your password or personal information. Additionally, our e-mails do not include a link where you can enter this kind of information.
If you receive an e-mail unlike our previous e-mails, this is a suspicious situation.
If you receive threatening or disturbing e-mails, you can be sure that these e-mails are not sent by our bank. Contact immediately our Call Center by calling 0 850 724 0 724 in case you receive these e-mails.