A way to make data unreadable to everyone except the recipient of a message. Encryption is often used to make the transmission of credit card numbers secure for those who are shopping on the Internet.
The mechanical devices that make up a computer system, such as the central processing unit, monitor, keyboard, and mouse, as well as other equipment like printers and speakers.
The first page on a website, which introduces the site.
ISP (Internet Service Provider)
A company that sells direct access to the internet, most often through dialing a local phone number.
IdentityTheft( ID Theft)
A criminal activity where a thief appropriates vital information such as your name, birth date, account number, or credit card number without your knowledge.
Hardware device or a software program that records each keystroke made on a particular computer. Marketed as a way for parents to monitor their children's activities on a computer, keystroke loggers are sometimes downloaded unwittingly by users. The keystroke logger then records the keystrokes and periodically uploads the information over the Internet. See also Spyware , Trojan horse.
A word, phrase, or image highlighted in a document to get someone from one place to another, typically on the Internet, but also within a document.
The main program that runs on a computer. An operating system allows other software to run and prevents unauthorized users from accessing the system. Major operating systems include UNIX , Windows and Linux.
A software update meant to fix problems with a computer program. This can range from fixing bugs, to replacing graphics, to improving the usability or performance of a previous version.
The criminal process of electronically gathering and selling the personal and financial information for multiple users through the use of phishing. See also Phishing.
An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not. The fake messages generally include a link to phony, or spoofed, websites , where victims are asked to provide sensitive personal information. The information goes to criminals, rather than the legitimate business. See also Spoofing.
Pop-up ads (Pop-ups)
Unsolicited advertising that appears as a " pop-up" window on a computer screen. Sometimes these can be created to look like a financial institution's request for personal information.
The policy under which a company operating a website handles personal information collected about visitors to the site.
Secure Socket Layer (SSL)
SSL technology encodes information that is sent over the Internet between your computer and your Bank's website, helping to ensure that the information remains confidential.
A software program that corrects known bugs or problems, or adds new features to a software program already installed on your computer.
A computer program that enables computer hardware to work.
A software install that is performed to enhance or repair a previously installed computer program.
Unsolicited "junk" email sent to large numbers of people to promote products or service.
An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not (phishing'). The fake messages generally include a link to phony, or spoofed, websites, where victims are asked to provide sensitive personal information. The information goes to criminals, rather than the legitimate business. See also Phishing.
A program that is loaded onto your computer without your knowledge. These programs gather information from your computer activities and send them to an unknown source. These programs are especially dangerous when capturing financial information that can be used to commit fraud.
An apparently legitimate software that carries an unwanted payload that is typically used by hackers to gain unauthorized access to your computer. See also Spyware.
A program that is loaded onto your computer without your knowledge. Viruses can make copies of themselves, quickly using up all available memory. Some viruses can transmit themselves across networks.
Typically, a malicious program that reproduces itself over a network and uses up computer resources or shuts down the system.
Explore the power of simpler and smarter banking. Bank online with over 300+ services
Bank on the go with our Mobile Banking services. Download app or use SMS
Pockets by ICICI Bank
VISA powered Universal payment wallet. Download today
Bank 24/7 through a widespread network of over 5,275 branches and 13,846 ATMs