There are many ways for your personal data to become compromised on the Internet, and for your identity to be exploited. Web Privacy and Security features help you protect yourself while surfing the web:
ZoneAlarm Anti-Keylogger is off by default.
Anti-Keylogger works with these supported web browsers:
Even though Anti-Keylogger works to protect you from malicious keyloggers, there are legitimate types of keylogging software. To let those run on your computer, you can temporarily turn off the ZoneAlarm Anti-Keylogger.
Anti-Phishing Chrome Extension protects your privacy from online phishing attacks and provides maximum security with great browsing performance.
ZoneAlarm Anti-Phishing protects your private information from a phishing attack while browsing online, and will secure your personal information from hackers and malicious websites.
The ZoneAlarm Anti-Phishing Chrome extension will scan all websites before letting you insert any personal information. It will alert you whether it is a safe website or a phishing attempt.
The Chrome extension gives you maximum security with optimal browsing performance as it only scans the website before inserting information.
The Chrome Extension is available for:
Identity theft is one of the most serious security threats to individual consumers. ZoneAlarm 2018 software adds identity protection in these ways:
ZoneAlarm offers a third-party service - IDENTITY GUARD Identity Protection Service. This service monitors your credit activity and alerts you of anything suspicious in your credit bureau file. It is available only in the US. If you are interested in IDENTITY GUARD Identity Protection Service, you can activate and manage it right from your ZoneAlarm 2018 software client interface.
ZoneAlarm will protect your sensitive personal information from hackers by verifying that all requests for that information come from legitimate sources. To use myVault, you must first turn on the Identity Lock.
|Access PIN||Personal access code. Maximum - 6 characters long. Access PINs are always encrypted.|
|Address||Thirty characters long, maximum.|
|American Express card||For security reasons, ZoneAlarm 2018 software does not record the last 5 digits of your American Express card number.|
|Bank account||Fourteen characters long, maximum.|
|Credit card||For security reasons, ZoneAlarm 2018 does not record the last 4 digits of your credit card number.|
|Driver's license||Fifteen characters long, maximum.|
|eBay password||Twenty characters long, maximum. eBay password can only be sent to eBay.|
|Email Address||Sixty characters long, maximum.|
|International tax ID||Fifteen characters long, maximum.|
|Mother's maiden name||Thirty characters long, maximum.|
|Name||Thirty characters long, maximum.|
|Passport number||US passport number or other international ID number - thirty characters long, maximum.|
|Password||Any password - twenty characters long, maximum.|
|Phone||Thirteen digits long, maximum. Separators, like parenthesis or dashes, are not permitted.|
|US social security number||Nine digits long, without dashes or spaces.|
|Other||Thirty characters maximum. Use this category to enter items that do not fit into any other category, or exceed the character limits of those.|
When finished with the Identity Protection Settings, click Close.
Once Identity Lock is turned on ("Saving Sensitive Information in myVault" on page 69), ZoneAlarm 2018 software sends the information stored in your myVAULT account only to trusted sites. Some of those sites are authenticated by ZoneAlarm to make sure they are not fraudulent. They are classified as Security Alliance sites. You can add the sites you trust to the Trusted Sites list. You can also add sites that you do not trust, to which ZoneAlarm 2018 software does not send your private data.
By default, each custom site you add has Access and Clear Text Password parameters set to Ask. You can change these settings as necessary.
|Clear Text Password||
When you finish configuring Trusted Sites, click Close.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html for a list of relevant copyrights and third-party licenses.