-
Featured
Ransomware-Game
Further information -
Featured
Course overview
Further information -
Points to remember when logging in
When logging into your e-banking facility, you have to enter sensitive and private details (for instance your password). This is how to do so in a secure manner.
-
Mobile payments and contactless payments
Payments via smartphone or contactless cards are becoming ever more popular. To shop with no need for cash or codes is convenient – yet it also involves risks.
-
Online banks
They offer certain advantages when compared to classic financial institutions. Online banks have one big drawback though: It is often not very easy to contact them.
-
Privacy and data protection on the Internet
An ever increasing number of data is stored on the Internet nowadays – whether you are aware of it or not. But how secure are your personal data?
-
Account hacked! What to do?
Every bank customer’s nightmare: Criminals gain access to your account and clear it out. If this has already happened, the main thing is damage limitation – and to learn from this.
-
Featured
Am I e-banking securely?
Further information -
Featured
Am I using my mobile banking facility securely?
Further information -
Deleting browser history
These instructions will explain how to delete your stored browser data (browser history, browser cache).
News
Beware of HTML phishing
There is currently a particularly treacherous type of phishing doing the rounds – HTML Phishing. Unlike classic phishing attacks, the faked login-page employed is embedded directly into an HTML attachment.
Large-scale telephone fraud
Criminals have been very busy making fraudulent telephone calls in Switzerland over the past few weeks. Often, such telephone calls seem deceptively real. You can however protect yourself against them.
Free webinar: How to recognise and avoid fraud
Investment fraud is strongly on the rise, increasingly also affecting private investors. In our 20-minute webinar (in German language), you will find out more about the modus operandi of perpetrators, about the psychological mechanisms they employ and how typical attacks – from Social Media contacts through to alleged payouts – are structured.