Enable Java Script

Either your browser does not support JavaScript, or you have JavaScript disabled.
You must have a JavaScript-enabled browser to use this site.

Microsoft Internet Explorer

To turn on JavaScript in Internet Explorer, follow these steps:

  1. On the Tools menu, click Internet Options, and then click the Security tab.
  2. Click the Web content zone that you are using (for example, click Local Intranet),
    and then click Custom Level button.
  3. Locate Active scripting under Scripting settings. Click to select the Enable radio button.
  4. Click OK button on Security Settings and Internet Options windows to save your changes.

To download Internet Explorer 7, click here.


To turn on JavaScript in Firefox, follow these steps:

  1. On the Tools menu, click Options.., and then click the Content tab.
  2. Click to select the Enable JavaScript check box.
  3. Click OK button to save the setting.

To download Firefox 2, click here.


To turn on JavaScript in Safari, follow these steps:

  1. Open Safari
  2. On the Safari menu, click on Preferences.
  3. Click the Security icon.
  4. Click on Enable JavaScript next to the Web Content section if it is not checked
  5. Close the Preferences window
  6. Close and restart Safari.

Opera 9.xx series

To turn on JavaScript in Opera 9.xx series, follow these steps:

  1. Open Opera.
  2. On the Tools menu, click Preferences.
  3. Click Content in the Preferences list.
  4. Check the box next to Enable JavaScript.
  5. Click the JavaScript Options button to open the JavaScript Options box.
  6. Check the boxes that you want to allow.
  7. Click OK.
  8. Click OK.

Google Chrome(v0.4.154.23)

To turn on JavaScript in Google Chrome(v0.4.154.23), follow these steps:

  1. First close any open Chrome windows.
  2. Right click on a blank area of your Desktop.
  3. Select New.
  4. Create a new Shortcut with the following in the "Type the location of the item:" text box:
    • For Windows Vista:
      %userprofile%\Local\Google\Chrome\Application\chrome.exe -enable-javascript
    • For Windows XP:
      "%userprofile%\Local Settings\Application Data\Google\chrome.exe" -enable-javascript
      Note: You'll have to enclose the file path for Windows XP in quotes due to there being spaces in it.





Cyberattack lock and data graphic

Thwarting the Cyberattack

Learn how you can identify evolving cybercrime tactics.​​




​Cybercrime is always evolving.

Today, the threat environment in cybersecurity evolves nearly as quickly as technology itself.

Who is behind these continual computer intrusions? Unfortunately, there are multiple sources; they can range from computer gurus looking for bragging rights, unethical businesses seeking to gain a competitive edge, criminal rings intent on profiting from sensitive, personal information, all the way to espionage rings and terrorists looking to rob our nation of critical information.

Whether we refer to them as cybercriminals or mere hackers, they are highly-skilled computer experts with the dogged determination of gaining unauthorized access to your data. Cyber threats may originate from a variety of sources and for many reasons:

  • "Hacktivists" use the same tools and techniques as a hacker, but do so in order to draw attention to political or social causes. A typical tactic can be the complete disruption of service on government, religious and corporate websites. “Anonymous” is one of the best known hacktivist groups.
  • Cybercriminals are those who act independently or within organized crime rings to steal financial data, personal credentials and credit card information, then either sell the information on what is known as the dark web (or black market) or directly access monetary accounts.
  • Nation-states or foreign entities seek to spy, gain proprietary or classified information, or launch cyberstrikes in order to cause damage to individuals, companies or governments.
  • Malicious insiders are colleagues you may know who are looking for ways to harm their own employer, steal information or make money. A recent SailPoint Market PulseSurvey found that one in five employees would sell their passwords and business-related credentials to someone outside of the organization, many for as little as $100.
  • Bringing cybercriminals to justice can be daunting. The nature of the digital space allows for anonymity that can be challenging for law enforcement; it is difficult to find and arrest an individual identified only by a username. And, even if one is locked up, there is always another cybercriminal ready to step in and build on the foundation already laid.

Cybercrime practitioners are crafty at adapting new technologies and tactics. Phishing, for example, has been around for decades, but cybercriminals now use more targeted approaches, taking advantage of the wealth of information readily available on the web. Without careful inspection, it is difficult for the average person to distinguish a real email from a phishing attempt.

Examples of emerging cybersecurity trends.

Spearphishing & Whaling

Spearphishing attacks are conducted by emails and appear to be from a known individual or familiar business— and often include details pertinent to the recipient. Whaling attacks are similar to spearphishing except the targets are typically high-level executives, celebrities and politicians.

Gaining the information to conduct targeted phishing attacks is not difficult. A basic web search can now glean vast amounts of information about a company, including email addresses, job descriptions, office locations and current projects.

Social media sites, such as LinkedIn™ and Twitter™, hold even more specific information that can be used to spoof email addresses, create fake, intentionally malicious websites and send attachments that mimic the same files one would receive over the course of a normal work day.

Phishing attacks have different goals. Some want users to visit a site and provide information such as passwords and login credentials. Other attacks introduce malware into the network.


Ransomware is a form of malware that, when activated, encrypts or locks all of the files on a computer or network. To regain access to the files, the cybercriminal demands a ransom, typically paid with electronic currency such as bitcoin.

Ransomware is pretty straight-forward: pay the ransom and get the files back. However, cybercriminals see a huge market in this malware and are changing their tactics. In some cases, the cybercriminals are returning only a portion of the files and then demanding a second ransom be paid in order to release the remaining files.

It appears the next generation of ransomware is even more Machiavellian as it enables the software to be installed, the data encrypted even when the computers are offline and then the software targets data stored in the cloud.

Mobile Malware

Mobile devices are ubiquitous both at the workplace and in personal use, and cybercriminals have taken note. Malware designed for Android™ and Apple™ devices is embedded into popular apps or can masquerade as “legitimate” third-party downloads. For example, GM Bot is a new malware attacking Android devices.

Today, the threat environment in cybersecurity evolves nearly as quickly as technology itself. Creating proactive security systems that will protect against the most popular attacks of today and anticipate those of tomorrow is no small task and can only be achieved through constant vigilance, information gathering, and education.

Begin today, and you may thwart the cyberattack of tomorrow. Malware tricks users into entering their login credentials in fake screens, where the credentials are harvested. It can also intercept SMS codes and call backs from targeted financial institutions.

Social Networks

Cybercriminals love social networking sites. There, among the “Shares” and ”Likes,” exists an abundance of unique personal information ripe for exploitation as well as multiple “attack vectors,” the alternative paths the hacker can use to gain access to a victim’s computer or network.

Using the algorithms in popular sites like Facebook™, they’ll plant malicious videos, hoping the user will be interested enough to click on them or use baiting techniques – posts that encourage users to share so they can get a free smartphone, free gift card or a portion of someone’s lottery winnings. They’ll also play off trending topics to promote article links and websites loaded with malware.

These techniques, like phishing, are known as “social engineering” in the context of information security and rely on human curiosity, fear or trickery to elicit a response.

Thwart the next cyberattack

Today, the threat environment in cybersecurity evolves nearly as quickly as technology itself. Creating proactive security systems that will protect against ever-evolving attacks is no small task and can only be achieved through constant vigilance, information gathering and education. Be ever mindful, and you may thwart the next cyberattack.

To learn more, contact your local M&T Bank Relationship Manager or M&T Bank’s Commercial Service Team.​DIS-398*-DIS​|DIS-127*-DIS