hardware and software do I need to access ING Internet Banking?
use a Laptop to access ING Internet Banking?
browser should I use?
128-bit Secure Socket Layer?
the difference between 40-bit encryption and 128-bit encryption?
I tell if a web page is secured?
your role in enhancing security of your online banking experience?
my information transmitted safely over the Internet?
a Digital Certificate and how does it help to ensure security?
other people view my personal information when I am using the Internet?
should I do if my Internet Explorer frequently hangs?
is a 'Java Script Error' on my computer. What should I do?
should I do if I see 'This program has performed an illegal operation' on my
do I clear my browser cache?
experiencing slow response when accessing ING Internet Banking. What is wrong?
email transmissions secured?
can I recognise a scam e-mail?
is a worm?
is a firewall and how does it protect my information?
We recommend following minimum configuration.
CPU Speed : 500Mhz or Higher
RAM : 64Mb Or Higher
Operating System : Window 98,NT,2000,XP
Internet Connection : 28.8 KBPs or Higher
Browser : Microsoft? Internet Explorer 5.XX and above / Netscape? 7.XX and
Yes, as long as the notebook/laptop meets the recommended system requirement.
We recommend that you use:
Internet Explorer Version 5.5 and above / Netscape Navigator Version 7.1 and
SSL stands for "Secure Socket Layer". It is a protocol designed to enable
applications to transmit information back and forth securely. Applications that
use this protocol inherently know how to share encryption keys with other
applications, as well as how to encrypt and decrypt data.. SSL has been
universally accepted on the World Wide Web for authenticated and encrypted
communication between the customer's computer and servers.
Some applications that are configured to run SSL include web browsers like
Internet Explorer and Netscape, email programs like GroupWise, Outlook, and
Outlook Express, FTP (file transfer protocol) programs, etc. These programs are
automatically able to receive SSL connections.
40-bit and 128-bit refer to the size of the key used to encrypt information. To
use the lock and key analogy, the greater the number of keys, the more
difficult it is to find the correct key to fit into the lock that protects the
information. Therefore, the larger the size of the encryption level, the more
difficult it is to find the right key to unlock the information.
WThere are two general indications of a secured web page:
1) Check the web page URL
Normally, when browsing the web, the URLs (web page addresses) begin with the
letters "http". However, over a secure connection the address displayed should
begin with "https" - note the "s" at the end.
Try it! - Visit our home page
(http://www.ingvysyabank.com). Note the URL begins with the "http"
meaning this page is not secure. Click the link in the upper-left hand corner
to "Log in". Notice the change in the URL? It now begins with "https", meaning
the user name and password typed in will be encrypted before sent to our
2) Check for the "Lock" icon at the bottom right hand corner of the browser
with the padlock symbol
Click (or double-click) on it in your Web Browser to see details of the site's
security. This is important to know because some fraudulent web sites are built
with a bar at the bottom of the web page to imitate the lock icon of your
- Always ensure your PC is updated with latest anti-virus and operating system
- Install personal firewall and anti-spy ware to protect your PC from internet
- Always change your online banking passwords periodically, say every month.
- Review credit card & bank statements regularly and report any irregularities
to the bank.
- You report any suspicious or fraudulent e-mail/sites to the bank immediately.
- Always read the online security tips provided by the bank from time to time.
Web browsers use standard security protocols like SSL, and S-HTTP to enable
private information to be transmitted safely over the Internet. When you visit
a Web site with the SSL protocol implemented, a secure connection is created
between your computer and the Web site server you are visiting. Once this
connection is established, you can transmit any amount of information to the
Web server safely. In contrast, the S-HTTP is designed to transmit individual
Digital certificates are issued by certification authorities CA to authenticate
a Web site or elements of Web sites. The certificate identifies the originator
of the site, or element, and verifies that it has not been tampered with. When
your Web browser is presented with a certificate, it will check to see if a
legitimate certification authority issued the certificate. If there is a match,
your session will continue. Otherwise, your browser will issue a warning and
your safest action is to cancel your activity.
If a secure session is established and the information is encrypted during
transmission, then others will not be able to view your information. However,
you should be aware that some Web browsers will store information on your
computer even after you are finished with your online activities, this is
called caching. So it is highly recommended that after visiting any secure site
to conduct financial transactions like balance query, online trading etc. you
must close your browser. & delete the cached files.
If you encounter problems while accessing Internet Banking using Internet
Explorer, you may need to upgrade your browser or update it with the most
recent fixes from Microsoft to keep it running smoothly. Keeping your browser
updated is also likely to protect your computer better as the latest fixes and
patches will also address known security weaknesses.
This usually happens when a transaction is attempted before the Java applet is
completely loaded into your PC. To reload the applet, click on the toolbar,
re-select the transaction and wait for the loading to be completed before you
proceed. If this does not help, please try clearing the browser's cache before
you log in again.
This is commonly known as GPF (General Protection Fault). You'll have to
restart your browser. If the problem persists, please consult your PC vendor.
To clear your browser cache:
The slow response your are experiencing could be due to the following:
Email sent over the Internet is generally not secure unless it is encrypted. In
reality, most email programs currently do not have this capability. To send us
an email securely, we recommend that you do so by using the secure email
function provided by some online services like Online Banking.
Without using additional measures such as a digital signature, it is easy for
fraudsters to imitate e-mails. But that doesn't mean you can't recognize
scam/spam e-mails. Cyber-criminals often place alarming, enticing or exciting
subjects in their e-mails with the hope of tempting you to respond impulsively
and divulge the requested information. So, always take your time to read the
e-mail carefully. In case of doubt, it is better not to respond. If you do
choose to respond, always first check that the mail is genuine by contacting
the company that is the apparent sender by telephone, for instance.
Phishing is a form of online Identity Theft that uses spoofed emails,
fraudulent websites and crime ware of various types to trick consumers to
divulging personal financial data such as credit card numbers and passwords,
There are two types of phishing attacks
computer worm is a self-replicating
computer program, similar to a
computer virus. A virus attaches itself to, and becomes part of another
executable program; however, a worm is self-contained & uses a network to send
copies of itself to other systems and it does so without any intervention. In
general, worms harm the network and consume bandwidth & make network slow ,
whereas viruses infect or corrupt files on a targeted computer. Viruses
generally do not affect network performance, as their malicious activities are
mostly confined within the target computer itself.
Firewall is a security system designed to prevent unauthorized
access to or from a private
network to public network Firewalls are frequently used to prevent
Internet users from accessing private networks connected to the
intranets. All messages entering or leaving the intranet pass & are
verified by the firewall.