Personal Loans

BENEFITS OF PERSONAL LOAN

Personal loans, at the very minimum, impose interest. We've carefully curated a series of personal loan products with more benefits to make your life easy. A personal loan, unlike a credit card, provides borrowers with a onetime cash payment.

Percentage

Low Interest Rates

Best class rates in the market

rupeesign

No Hidden Charges

Trouble Free Loan Closure

document

Minimal Documentation

Get your loan with less paper work

handpointer

Apply Online

Finish up the process in 15 minutes


  • Individuals: Salaried/Self-employed/Professionals
  • Non-individualsTrust is not eligible under the scheme
  • Group of permanent/ confirmed/ permanent employees
  • Age: Maximum age 70 years at the time of final repayment
  • Maximum Loan Amount:Know Your Eligibility

Images/videos on Personal loan process & steps

Responsive Image
Responsive Image
HOME CALCULATOR

This is a preliminary calculation and is not the final offer

Total Amount
Eligible Amount
Monthly Loan EMI (Approx.):


Social Engineering

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Malware

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Ransomware

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Spoofing

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Mobile frauds

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Juice Jacking

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Card Skimming

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Money Mule

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Social engineering is a technique used by criminals to gain access to your information. Social engineering scams can be both online (such as an email message that asks you to open the attachment, which contains malware) and offline (such as a phone call from someone posing as a representative from your credit card company, placing infected USB to install malware).

  • Phishing Attacks

Phishing is carried out by e-mail spoofing or instant messaging and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Generally, phishing E-mails contain Spelling and grammatical errors and the associated link provided in the Email has different names from the actual website.

  • Other Phishing techniques-
  • Tab Nabbing- It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
  • Filter Evasion - Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing e-mails.
  • Vishing - Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a Voice over IP service) was dialled, prompts users to enter their account numbers and PIN. Visher sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.

To avoid Phishing attack, be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about your sensitive information.

Malware is short form for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a standalone computer or a networked pc. So, wherever a malware term is used it means a program which is designed to damage your computer. Strong Anti-Malware solution should be used to prevent spread of Malware.
Your computer may be infected if you recognize any of these malware symptoms:

  • Slow computer performance
  • Erratic computer behaviour
  • Unexplained data loss
  • Frequent computer crashes

This is a form of malware that locks computer files of users to demand ransom for access to those files. Ransomware spreads through phishing, Pirated Software and malicious websites. You can avoid being victim of Ransomware, If you do not click on suspicious links, do not install pirated/illegal software and ensure that your data is backed up on a regular basis.

Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Before clicking on any link/attachment in mail, verify sender detail.

Installing Application from unknown sources, granting mobile applications excessive permission, using open Wi-Fi network and sharing OTP may lead to loss of sensitive information and financial loss. We should not enable remote sharing on mobile applications and suitable anti-malware solution should be used.

Cybercriminals use USB charging ports available at public places to install malware, steal data or even take complete control of your device. This is referred to as Juice Jacking. We should disable data transfer feature on your mobile phone while charging.

A device called card skimmer is used to copy information from Credit Card/Debit Card. This information is used for online purchases or to clone the card for cash withdrawal. We should be careful while using your card at ATMs, public places and sharing card detail online.

Victims of Money Mule are used by fraudsters to transfer illegally obtained money through victim's Account. You should not receive money in your account from unknown sources. If money is received in your account accidently, you should inform your Bank and any reversal should be initiated by The Bank crediting money in your account. You should not return money directly to the person who claims to have accidently deposited in your account, instead "the person" contact his own bank.