We use cookies to give you the best possible experience on our website. By continuing to browse this site, you give consent for cookies to be used. For more details, please read our Online Terms & Conditions, Privacy Policy, Cookies Policy and Personal Information Collection Statement.
We recommend using a computer web browser or Hang Seng Mobile App to log on for enhanced security. Please visit "Security Information Centre" for more security tips.
Be careful of malware scams. Screen sharing, recording or capture are disabled
Stay alert of special offers on social media or via messages and avoid opening links or downloading apps from these sources. Please don’t enter your account details, passwords or personal info into such fake links or apps as fraudsters may take control of your phone. For security reasons, we have disabled screen sharing and recording functions on all mobile devices in Hang Seng Mobile App. Screen capture function is also disabled on Android devices until further notice. You can save your transaction records via "Save Image" button in Transfer & Pay, or view them in the SMS or email sent from us.
Malware are designed to infiltrate, damage or obtain information from a mobile or computer device without the owner’s consent. These include spywares, computer viruses and Trojan horses.
Spyware is a type of software that is installed on a device, without permission from user. It could monitor and record device user's device user information / internet behaviour by hiding its malicious purpose. It collects and transmits the gathered information (for example, personal credentials including user name, password and credit card numbers, etc.) to unauthorised third parties for own benefits.
Besides, various viruses can pose security threats to the device users. A virus may contain destructive code that can move into multiple programmes, data files or devices on a system and spread through multiple systems in a network, resulting in the malfunction of the devices and loss of the data.
There is one more type of malware called trojan horse. It can masquerade as innocent programme, take control of your device and perform illicit operations unnoticed by the users.
To prevent the invasion of malicious software, please consider taking the below measures:
If you suspect that malicious software has already invaded your device, please consider taking the below measures: