Troubleshooting / Security
What hardware and software do I need to access ING VYSYA Bank Internet Banking?

We recommend following minimum configuration.

  1. CPU Speed : 500Mhz or Higher
  2. RAM : 64Mb Or Higher
  3. CPU Operating System : Window 98,NT,2000,XP
  4. Internet Connection : 28.8 KBPs or Higher
  5. Browser : Microsoft Internet Explorer 5.XX and above / Netscape 7.XX and above
Can I use a Laptop to access ING VYSYA Bank Internet Banking?
Yes, as long as the notebook/laptop meets the recommended system requirement.
What browser should I use?
We recommend that you use:
Internet Explorer Version 5.5 and above / Netscape Navigator Version 7.1 and above
What is 128-bit Secure Socket Layer?
SSL stands for "Secure Socket Layer". It is a protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to share encryption keys with other applications, as well as how to encrypt and decrypt data.. SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between the customer's computer and servers.
Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, email programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections.
What is the difference between 40-bit encryption and 128-bit encryption?
40-bit and 128-bit refer to the size of the key used to encrypt information. To use the lock and key analogy, the greater the number of keys, the more difficult it is to find the correct key to fit into the lock that protects the information. Therefore, the larger the size of the encryption level, the more difficult it is to find the right key to unlock the information.
How can I tell if a web page is secured?
There are two general indications of a secured web page:
  1. Check the web page URL

    Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end.

    Try it! - Visit our home page ( Note the URL begins with the "http" meaning this page is not secure. Click the link in the upper-left hand corner to "Log in". Notice the change in the URL? It now begins with "https", meaning the user name and password typed in will be encrypted before sent to our server.
What's your role in enhancing security of your online banking experience?
  1. Always ensure your PC is updated with latest anti-virus and operating system patches.
  2. Install personal firewall and anti-spy ware to protect your PC from internet attacks.
  3. Always change your online banking passwords periodically say every month.
  4. Review credit card & bank statements regularly and report any irregularities to the bank.
  5. You report any suspicious or fraudulent e-mail/sites to the bank immediately.
  6. Always read the online security tips provided by the bank from time to time
How is my information transmitted safely over the Internet?
Web browsers use standard security protocols like SSL, and S-HTTP to enable private information to be transmitted safely over the Internet. When you visit a Web site with the SSL protocol implemented, a secure connection is created between your computer and the Web site server you are visiting. Once this connection is established, you can transmit any amount of information to the Web server safely. In contrast, the S-HTTP is designed to transmit individual messages.
What is a Digital Certificate and how does it help to ensure security?
Digital certificates are issued by certification authorities CA to authenticate a Web site or elements of Web sites. The certificate identifies the originator of the site, or element, and verifies that it has not been tampered with. When your Web browser is presented with a certificate, it will check to see if a legitimate certification authority issued the certificate. If there is a match, your session will continue. Otherwise, your browser will issue a warning and your safest action is to cancel your activity.
Can other people view my personal information when I am using the Internet?
If a secure session is established and the information is encrypted during transmission, then others will not be able to view your information. However, you should be aware that some Web browsers will store information on your computer even after you are finished with your online activities, this is called caching. So it is highly recommended that after visiting any secure site to conduct financial transactions like balance query, online trading etc. you must close your browser. & delete the cached files
What should I do if my Internet Explorer frequently hangs?
If you encounter problems while accessing Internet Banking using Internet Explorer, you may need to upgrade your browser or update it with the most recent fixes from Microsoft to keep it running smoothly. Keeping your browser updated is also likely to protect your computer better as the latest fixes and patches will also address known security weaknesses.
There is a 'Java Script Error' on my computer. What should I do?
This usually happens when a transaction is attempted before the Java applet is completely loaded into your PC. To reload the applet, click on the toolbar, re-select the transaction and wait for the loading to be completed before you proceed. If this does not help, please try clearing the browser's cache before you log in again.
What should I do if I see 'This program has performed an illegal operation' on my PC?
This is commonly known as GPF (General Protection Fault). You'll have to restart your browser. If the problem persists, please consult your PC vendor.
How do I clear my browser cache?
To clear your browser cache:

For Internet Explorer

  • Go to "Tools"
  • Go to "Internet Options"
  • Select "General"
  • Click on "Delete Files" at "Temporary Internet files"

For Netscape

  • Go to "Netscape" or "Edit"
  • Go to "Preferences"
  • Select or double-click on "Advanced"
  • Select "Cache"
  • Click on "Clear Memory Cache" and "Clear Disk Cache"

I am experiencing slow response when accessing ING VYSYA Bank Internet Banking. What is wrong?
The slow response your are experiencing could be due to the following:
  1. You are not using the recommended browser, operating system and hardware.
  2. Your Internet Service Provider, Local Area Network or our system is facing intermittent slowness.
Are email transmissions secured?
Email sent over the Internet is generally not secure unless it is encrypted. In reality, most email programs currently do not have this capability. To send us an email securely, we recommend that you do so by using the secure email function provided by some online services like Online Banking.
How can I recognize a scam/spam e-mail?
Without using additional measures such as a digital signature, it is easy for fraudsters to imitate e-mails. But that doesn't mean you can't recognize scam/spam e-mails. Cyber-criminals often place alarming, enticing or exciting subjects in their e-mails with the hope of tempting you to respond impulsively and divulge the requested information. So, always take your time to read the e-mail carefully. In case of doubt, it is better not to respond. If you do choose to respond, always first check that the mail is genuine by contacting the company that is the apparent sender by telephone, for instance.
What is phishing?
Phishing is a form of online Identity Theft that uses spoofed emails, fraudulent websites and crime ware of various types to trick consumers to divulging personal financial data such as credit card numbers and passwords, etc

There are two types of phishing attacks:

  1. E-mail-based Phishing attacks
    Where many millions of e-mails are distributed randomly, the e-mail typically includes a hyperlink using a URL, which is often codified so that the destination is not apparent to the user. Once the user has clicked on the hyperlink they are taken to a spoof Web page, which is often a direct copy of a bank's own authentication Web page, and asked to login. The ID information collected is then stored for collection by the criminals.
  2. Trojan-based Phishing attacks
    Where a piece of Trojan software is loaded onto a user's computer by exploiting vulnerability in the operating or browser software. This Trojan software can have many capabilities but typically it identifies when the user attaches to a target bank Web site and then either logs the subsequent keys or takes a screen image. This information is then e-mailed to the criminals.
What is a worm?
A computer worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of another executable program; however, a worm is self-contained & uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth & make network slow , whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself.
What is a firewall and how does it protect my information?
Firewall is a security system designed to prevent unauthorized access to or from a private network to public network Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass & are verified by the firewall.