Plugins (add-ons) are small software applications present on the Internet that offer certain features, such as displaying images, reading music, running videos in formats not recognised by the basic browser or which enhance browser capacity. But that is not all they can do!
Why should you be wary of plug-ins?
The claims made by certain sites, advertisements, etc., on the Web as regards the functionalities and qualities of plug-ins, such as a higher browser speed, higher-quality images, etc., are often false. Once installed, these plug-ins may perform various operations on your computer, without your knowledge, that make it possible, for example, to:
- collect information (username and password) without your approval;
- damage the data on your computer (file deletion);
- monitor your surfing (new search page, new start-up page);
- install new applications;
- enable remote takeover;
- misappropriate your assets when you connect to www.ing.lu.
Given these risks, we recommend that you do not download a plug-in without being sure of its purpose and without having taken the precaution of verifying its origin.
The Internet banking applications offered by ING Luxembourg do not require any plug-ins.
ING Luxembourg does not certify or guarantee any computer applications developed by third parties (apart, of course, from those that it specifically states to be trustworthy). ING Luxembourg does not guarantee in any way whatsoever the proper or secure operation of its own systems if plug-ins or any other software applications not developed or guaranteed by ING Luxembourg are used. It declines all direct or indirect liability in such cases, unless there has been gross negligence or wilful misconduct on its part.
How do you check what plug-ins have been installed (Internet Explorer)?
There is no simple way to uninstall a plug-in, particularly if it is malicious. Their complete eradication often requires numerous operations, explained step-by-step on the sites of antivirus solution providers. It is not unusual for a reinstallation of your operating system to be required. Users with XP SP2 operating system version can, however, deactivate them using the "Tools/Add-on administration" menu.
Did you know?
To protect yourself from the harmful effects of these plug-ins, you should:
- not surf the Internet using an "Administrator" account;
- configure your browser to prohibit "ActiveX" and "Applet Java" or at least to allow them only at your request;
- keep your antivirus software updated;
- install security updates;
- avoid dangerous sites (sites dealing with software piracy, etc.).
We have explained to you what phishing is – now we need to help you make sure you never fall into the trap!
Today, we receive more e-mails than ever which demand our attention, meaning we are more vulnerable to phishing attacks. But what exactly is phishing?