Savings A/c
Pay Bills
Deposits
Personal Loans
Cards
Mobile Recharge
Online Security

Online Security




What hardware and software do I need to access ICICI Bank b2 a/c?

We recommend the following:

Computer with 500MHz processor or higher 64 MB RAM or higher Internet connection of 28.8 kbps or higher The following operating systems: Windows 98, NT, 2000, XP The following browsers: Microsoft® Internet Explorer 5.XX and above Netscape® 7.XX and above Firefox Ver 1.5

Top




Can I use a Laptop to access ICICI Bank b2?

Yes, as long as the laptop meets the recommended system requirements.

Top




What browser should I use?

We recommend that you use:
Internet Explorer Version 5.5 and above

Top




How can I tell if a web page is secured?

There are two general indications of a secure web page:

  • Check the web page URL
  • Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end.

    Try it! - Visit our home page (https://www.b2.icicibank.com). Note the URL begins with the "http" meaning this page is not secure. Click the link in the upper-left hand corner to "Log in". Notice the change in the URL? It now begins with "https", meaning the user name and password typed in will be encrypted before sent to our server.

  • Check for the "Lock" icon

    Web browsers display a "lock" icon somewhere in the window of the browser (NOT in the web page display area). For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:

    Click (or double-click) on it in your Web Browser to see details of the site's security.

    This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser!

Top




What should I do if my Internet Explorer frequently hangs?

If you encounter problems while accessing b2 using Internet Explorer, you may need to upgrade your browser or update it with the most recent fixes from Microsoft to keep it running smoothly. Keeping your browser updated is also likely to protect your computer better as the latest fixes and patches will also address known security weaknesses.

Top




What should I do if I see 'This program has performed an illegal operation' on my PC?

This is commonly known as GPF (General Protection Fault). You'll have to restart your browser. If the problem persists, please consult your PC vendor.

Top




How do I clear my browser cache?

  • Internet Explorer
    • Go to "Tools"
    • Go to "Internet Options"
    • Select "General"
    • Click on "Delete Files" at "Temporary Internet files"
  • Netscape
    • Go to "Netscape" or "Edit"
    • Go to "Preferences"
    • Select or double-click on "Advanced"
    • Select "Cache"
    • Click on "Clear Memory Cache" and "Clear Disk Cache"

Top




What is 128-bit Secure Socket Layer?

SSL stands for "Secure Sockets Layer". It is a protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol are enabled to give and receive encryption keys with other applications, as well as to encrypt and decrypt data sent between the two. SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between the customer's computer and servers.

Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, email programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections.

To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol.

Top




What is the difference between 40-bit encryption and 128-bit encryption?

40-bit and 128-bit refer to the size of the key used to encrypt information. To use the lock and key analogy, the greater the number of keys, the more difficult it is to find the correct key to fit into the lock that protects the information. Therefore, the larger the size of the encryption level, the more difficult it is to find the right key to unlock the information.

Top




What's your role in enhancing security of my online banking experience?

- Always ensure your PC is updated with latest anti-virus and operating system patches.

- Install personal firewall and anti-spy ware to protect your PC from internet attacks.

- Change your online banking passwords regularly, say every month. Change them at once if you suspect that your security has been compromised.

- Review Credit Card & bank statements regularly and report any irregularities to the bank.

- Report any suspicious or fraudulent e-mail/sites to the bank immediately.

- Follow the online security tips provided by the bank from time to time.

Top




How is my information transmitted safely over the Internet?

Web browsers use standard security protocols like SSL, and S-HTTP to transmit private information safely over the Internet. When you visit a Web site with the SSL protocol, a secure connection is created between your computer and the Web site server you are visiting. Once this connection is established, you can transmit any amount of information to the Web server safely. In contrast, the S-HTTP is designed to transmit individual messages.

Top




What is a Digital Certificate and how does it help to ensure security?

Digital Certificates are issued by certification authorities to authenticate a Web site or elements of Web sites. The certificate identifies the originator of the site, or element, and verifies that it has not been tampered with. When your Web browser is presented with a certificate, it will check to see if a legitimate certification authority has issued the certificate. If there is a match, your session will continue. Otherwise, your browser will issue a warning and you should cancel your activity.

Top




Can other people view my personal information when I am using the Internet?

If a secure session is established and the information is encrypted during transmission, then others will not be able to view your information. However, you should be aware that some Web browsers will store information on your computer even after you are finished conducting your online activities. This is called caching. Therefore, you should close your browser once you are finished using the Internet, particularly if you visit secure sites to conduct financial transactions, check account balances or view any other information that you regard as private and confidential.

Top




There is a 'Java Script Error' on my computer. What should I do?

This usually happens when a transaction is attempted before the Java applet is completely loaded into your PC. To reload the applet, click on the toolbar, re-select the transaction and wait for the loading to be completed before you proceed. If this does not help, please try clearing the browser's cache before you log in again.

Top




I am experiencing slow response when accessing ICICI Bank b2. What could be wrong?

The slow response your are experiencing could be due to the following:

  • You are not using the recommended browser, operating system and hardware.
  • Your Internet Service Provider, Local Area Network or our system has slowed down.

Top




How safe is it to transmit information through emails?

Email sent over the Internet is generally not secure unless it is encrypted. In reality, most email programs currently do not have this capability. To send us an email securely, we recommend that you do so by using the secure email function provided by some online services like Online Banking.

Top




How do I recognise a scam e-mail?

Without using additional measures such as a digital signature, it is easy for fraudsters to imitate e-mails. But that doesn't mean you can't recognise scam e-mails. Cyber-criminals often place alarming, enticing or exciting subjects in their e-mails with the hope of tempting you to respond impulsively and divulge the requested information. So, always take your time to read the e-mail carefully. In case of doubt, it is better not to respond. If you do choose to respond, always first check that the mail is genuine by contacting the company that is the apparent sender by telephone, for instance.

Here are a few phrases to look for to confirm if the e-mail message that you got is a phishing scam
"Dear Valued Customer."
Fradulent e-mail messages are usually sent out in bulk and do not contain your first or last name.

"Verify your account."
Banks will never ask you to send login ID's, password or other personal information through mail.

"If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you will respond immediately without thinking. A variant of this is a message claiming that your immediate response is required because your account might have been compromised.

"Click the link below to gain access to your account."
HTML-formatted messages can contain links or forms that you can fill out just as you'd fill out a form on a website. The links that you are urged to click may contain all or part of a real company's name and are usually "masked," meaning that the link you see does not take you to that address but somewhere different, usually a phony Web site.

Notice in the following example that resting the mouse pointer on the link reveals the real web address, as shown in the box below. The numbers do not appear to belong to a genuine website, which is a red signal.

https://www.abcbank.com/loginscript/user01.jsp

Top




What is phishing?

'Phishing' refers to the practice of fraudsters 'fishing' for your details in order to find out and misuse sensitive personal and financial information. Criminals may, for instance, make identical copies of existing corporate websites, or send scam e-mails to elicit a response from you and trick you into divulging your personal information.

Top




What is a worm?

A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs.

Melissa:

The Melissa Worm, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a computer worm that also functions as a macro virus, hence making it a "multipartite virus".

Code Red:

The Code Red worm was a computer worm released via the Internet on July 13, 2001 affecting computers running Microsoft's Internet Information Server (IIS) web server. The programmers at eEye Digital Security who reported it named it after both the Mountain Dew soft drink and the phrase "Hacked By Chinese!" (See Red Scare) that it propagated. The worm exploited vulnerability in the indexing software distributed with IIS and did several things: * It defaced the affected web site to display:*: "H"

Top




What is a firewall and how does it protect my information?

One of the security mechanisms we use to protect our systems and your information is called a firewall. Our firewalls use a combination of industrial strength computer hardware and software that is designed to securely separate the Internet from our Internal Web servers, computer systems, networks and databases. During your secure online sessions with RBC Web sites, firewalls prevent unauthorized Internet traffic from entering our Web servers, systems and network.

Top