Close image

We use cookies to give you the best experience on our website - see our cookie policy.

Trojans

Fraudsters are using software called Trojans that lodge themselves deep inside our computers. Trojans are emails that look innocent, but may contain links or attachments that can install harmful programs on to your computer when you click on them.

These programs are usually downloaded invisibly when you open an e-mail that looks innocent. Even if the e-mail is discarded, the program will still run in the background.

How do trojans work?

Trojans are designed to do things like keystroke logging. They take screen shots of sites you visit or search your computer for personal information. The program then sends your personal information to someone else. It could enable fraudsters to get hold of your personal information without your knowledge or permission.

Keep your computer safe

Be careful. Never open e-mails with attachments or files from people unknown to you. Emails may appear innocent, but they can contain harmful attachments. When you open an attachment, a harmful program may be secretly downloaded on to your computer.

Click carefully. You may not know an attachment or link is unsafe until it”s too late. Don”t guess – know what you are opening before you click. Immediately delete emails with unknown attachments or links.

Protect yourself and your computer by having up-to-date anti-virus software, operating systems and firewalls.

Make regular checks of your bank and credit card statements for unfamiliar transactions, and other sites that hold your personal details.