Transparent account
We will open it for anyone who voluntarily, or based on a statutory obligation, wants to publish information on transactions on the account.

Phishing, Pharming, Vishing – all relating to the misuse of personal data. Using these methods, hackers try to gain sensitive personal information from a bank client (data about a payment card, its number, PIN code, login name and password to any service etc..) through fake e-mails and the installing of untrustworthy applications onto your mobile device which will direct you to fake websites.
Phishing is an attempt to obtain sensitive information from you. The attacker, trying to obtain the data in this way, relies on the inattentiveness of the “victim“. They try to persuade you that an e-mail, SMS message or phone call is from your bank and they need you to verify, update your identity or enter other data (e.g. credit card numbers or access codes). The message contains a link to a fake website.
Phishing can be also part of an application which you have installed on your mobile device. A hidden virus is installed into the computer without the users knowledge and damages the programs, changes settings and may send sensitive data without you knowing it.
Pharming is based on a DNS (Domain Name System) item change. The user will visit a website which is not the original bank website, but instead just a fake one. It is created by hackers to obtain confidential client data. The design of the website is similar or even nearly the same as the design of the official website. The visitor may not realize that he has just opened a fake internet website.
Vishing is a fraudulent approach using a phone call, by which the attacker tries to obtain confidential data from the client (personal data, access password for Internetbanking, payment card numbers, etc.) This method is often used as tracing is harder.
The attacker will send you an SMS with some short information that there was a suspicious transaction found on your account. Part of this SMS messages is also a phone number, from which the attacker will contact you or you should immediately call this number. Subsequently, the attacker will introduce himself as calling from your bank. To gain your confidence, he will ask about about the verification code of the received SMS. The data will later, or even immediately, be used to fraudulently gain access to the funds in your account. The attacker finishes his call with the information that due to the swift action of the bank the suspicious transaction was not executed and your money is safe.
Weigh up who are you providing any information to about yourself, your payment cards and phone numbers. Never provide passwords, SMS key for payment confirmation, nor any complete data about the payment card.
Malicious software (so-called malware) disrupts computers and may perform hidden activities in your devices (e.g. send information from your computer to the attackers). In many cases, people install the software without being aware of it by simply clicking on a link on a website or in an e-mail message.
The purpose of these small applications is to cause problems, remove data and files on your computer. They spread between devices, mostly via the internet or by e-mail. They may be activated by clicking on any link on the Internet, which you think might be picture or a website.
These are unwanted messages (e-mails, SMS) which you receive. These could be different offers for new products and services with many advantages. They are annoying, but they don’t pose a risk to security, if you don’t respond to them.
When working with your e-mail box, use the anti-spam filter. This filter may be provided by the provider of your e-mail box. The majority of fraudulent e-mails can be detected with the correct use of the antispam filter and block such e-mails.