We use own and third party cookies to enhance our services, customise and analyse your browsing and to offer advertising.
If you continue to browse you accept their use and installation. You can change the configuration or obtain more information in our Cookies Policy.
Viruses and other malware are programs which install themselves on the computer without the users’ knowledge and for malicious purposes, such as destroying or stealing information or causing dysfunctions in the system or network it is connected to.
A virus, in addition to affecting the machine, propagates to other computers the original system it is related with or connected to, using different ways which have evolved over time. Years ago, viruses propagated chiefly via diskettes. With the arrival of networks, the internet and e-mail, viruses have found an ideal means of propagating although data media are still used. New viruses appear on the internet on a daily basis yet they are not all equally dangerous.
To avoid your computer becoming affected:
Only browse known sites for which you have references and appear trustworthy. Certain viruses and malware hide themselves in untrustworthy internet pages.
Do not use files or programs whose origin is unknown
Do not open e-mail messages of unknown origin.
Be careful with e-mail messages from acquaintances which have a nonsense or unexpected subject line. Before opening these messages, contact the supposed sender and make sure that that person has really sent the message as it may be a virus-generated message.
Have a recognised antivirus program and keep its virus detection tables permanently updated. It is not sufficient just to have the latest version of the antivirus program, to be effective it must be updated.
Do not directly open attached files in e-mail messages. It is safer to save them first on the computer and open then outside the e-mail program.
Phishing is an attempt to steal access codes or other confidential information to access bank accounts.
One of the most common frauds on the internet consists of creating false pages /and or portals and falsifying the origin of email messages. These two techniques are combined to fraudulently capture access codes to third party services and applications or other confidential information such as account or card numbers (including the expiry date), so as to access the information or perform operations in your name.
The way access codes are stolen in this manner is to create an internet address and page whose name is practically identical to the company or portal whose identity they wish to steal. The name differs from the original in just a few characters, often only one. At the fraudulent address pages have been created which are identical or highly similar to the true ones.
The victims of this type of fraud receive e-mails which supposedly come from the real company (in this case the e-mail address of the sender is identical), inviting the victim to go to the fraudulent pages on a false pretext, here they are asked for their identification, password or other access data. If this information is entered on these pages, it will have been stolen and can be used to access the real website and perform functions and operations, which is possible using the stolen information. Some variations of this technique include requesting the same information via SMS messages, fax or by telephone.
How can phishing be prevented?
Remember that Banco Sabadell will never ask you for your banking details or access codes via a link. For any doubts, contact us. If you use the electronic form, select the "Security" option as the reason for your communication.
Banco de Sabadell, S.A., Pl. Sant Roc, 20 08201-Sabadell, registered with the Mercantile Register in Barcelona, tome 20.093, folio 1, Page B-1561, Fiscal Identification Number (NIF) A08000143. A financial institution under the supervision of the Bank of Spain and registered in the Registro administrativo especial with number 0081.E-mail:firstname.lastname@example.org Banco de Sabadell, S.A., . All rights reserved.