Show Hide
LoginApply Online Exchange rates and Charges

Exchange rates and Charges


  • Best Exchange Rate (INR)*

    1 EURO = INR

    1 SEK = INR

    1 NOK = INR

    1 DKK = INR

  • Best Exchange Rate (INR)*

    1 EURO = INR

    1 SEK = INR

    1 NOK = INR

    1 DKK = INR

Contact us

Online security

How do you protect me online?

We are committed to providing our customers with a secure online experience. We strive to utilise state-of-the-art technology to protect your information. We also employ a wide range of security features for our website.

These include:

Secure login

For logging into Money2India Europe you need to use your user ID and password. Our login page is a secure page.
When you log in successfully to our Money2India Europe website, your web browser will establish a 128-bit secure socket layer (SSL) connection between your computer and our web servers.

SSL stands for ‘Secure Socket Layer’. SSL is a protocol used to transmit information securely over the internet. The SSL encrypts sensitive information so it cannot be opened or understood by anyone other than the intended receiver. SSL has been accepted universally as the standard for authenticating and encrypting communication over the web.

The 128-bit SSL gives the most secure encryption available.

You can see whether a web page is secure in two main ways:

  • Check the web page URL: Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https". Note the "s" at the end.
  • Try it! - Visit our home page ( Note the URL begins with ‘http’, meaning this page is not secure. Then click the link at the upper-left hand corner to ‘Log in’. Notice the change in the URL? It now begins with "https"; meaning that the user name and password typed in will be encrypted before being sent to our server.

There is a standard among web browsers to display a "lock" icon somewhere in the window of the browser. For example, Microsoft Internet Explorer displays the lock icon at the lower right-hand side of the browser window:

Click (or double-click) the ‘padlock’ icon of your web browser to see details of the site's security.

This is good to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser. But, you will be able to tell this is a fraudulent site because you won’t be able to click the ‘padlock’.


The Entrust Digital Certificate

Digital certificates are issued by certification authorities to authenticate a website or elements of a website. The certificate verifies that the site is legitimate. Your web browser automatically accesses the certificate to check its legitimacy. If everything is as it should be, you session will carry on as normal. If there is a problem, your browser will issue a warning and your safest action is to close the website.


Number of login attempts

If you are unable to provide the correct user ID and password, you will not be granted access to website. After three unsuccessful login attempts, your user ID will be blocked automatically by our system. To re-enable your user ID, please contact us. Please click here to view contact details.


Timed logout

Our unique security features continue to protect you once you have logged in successfully. To protect your accounts against unauthorised access, our systems are designed to automatically terminate a secure online session if extended inactivity is detected. Hence if you log in and leave your session inactive for an unduly long period, the session will be terminated. If your session terminates automatically, you can log in again to continue your activities.

In addition, after logging in you cannot use the 'Back', 'Forward' and 'Refresh' buttons on your browser. If you click on any of these buttons, your secure session will be logged out automatically. This is done to ensure that no unauthorised entry can be made in your online banking during your absence from your computer system.



This is one of the security mechanisms we use to protect our systems and your information. Our firewalls use a combination of industrial-strength computer hardware and software designed to protect our servers, computer systems, networks and database from harmful information. During your secure online sessions, firewalls prevent unauthorised internet traffic from entering our website.


Constant updates to our systems

In order to effectively counter the latest security threats, we ensure that our systems are constantly updated to maintain the security of your accounts

How can I protect myself online?

Install and update antivirus software

Always ensure that your PC is updated with the latest antivirus software that’s capable of scanning files and emails for viruses. This will prevent your files from being corrupted or lost and also prevent your PC from getting infected with the virus.

Antivirus software protects you from Trojan horses – a ‘bug’ that usually attacks computer systems through email. They are particularly dangerous because they have the potential to allow others to gain remote control of your computer system, without your knowledge or consent.

A variety of antivirus software packages are available on the market today. Many of these products install antivirus updates to your computer automatically, as long as you have the update feature enabled. Installing an antivirus software package is simple and will save you hours of frustration trying to restore an infected computer system.


Use a personal firewall

Any computer or device connected to the internet should be protected by a personal firewall.

Firewalls will help to protect your computer from malicious internet intrusions and attacks by creating a barrier between your computer and the rest of the internet.


Keep your browser and operating system up-to-date with software updates

Some operating systems and software can be configured to automatically check for software updates. If you have this functionality, make sure it’s turned on so that your computer stays as secure as possible.

For more information, or to access current Microsoft Security Updates, please visit Microsoft Security Updates.


Activate a pop-up blocker

A pop-up is a form of online advertising that captures email addresses. Most web browsers let you block pop-ups in the browser security options. Alternatively you can download a pop-up blocker from the web. There are several free versions out there, just run a search in Google for ‘pop-up blocker’.


Scan your computer for spyware regularly

Spyware and adware are programs that monitor your internet activity and potentially relay information to a disreputable source. Free spyware removal programmes are available on the internet.


Change your password regularly and keep it confidential

We recommend that you change your passwords regularly - at least every 30 days or so. To change your passwords, log in and go to the 'My Profile' section, then click on the 'Change Password' option at the left of the screen.

Please note: Never tell anyone your password. ICICI Bank officials will never ask you for your passwords.


Look for the padlock symbol

This can be seen on the bottom bar of your browser, showing you that the site is running in secure mode before you enter sensitive information.


Clear your browser's cache

Clear your browser's cache and history after each session so that your account information is removed, especially if you have used a shared computer to access online banking.


Logging on and off recommendations

Access to the ICICI Money2India Europe facility
Always type the address of our website in the address bar of your browser, or access it from your stored list of favourites – don’t access it through a link.

Log in frequently
Logging in frequently not only helps you keep track of your status information but also enables you to notice and stop any fraudulent activity quickly.

Check for your last log in time
Log in and look at your date and time of last login.

Always log off
Log off after you complete your online banking session using the ‘Logout’ link. Do not rely on just closing your browser.


Be vigilant

Never fill in any form that you have accessed via a link with sensitive data such as user ID, password, PIN or other account-related information.


Things to avoid

  • Avoid downloading programmes from unknown sources. Some sources may have hidden forms of spyware or viruses that could compromise the security of your computer.
  • Do not open attachments received through email unless you know the sender.
  • Never open email attachments that have file extensions like .exe, .pif, or .vbs. Such files are usually dangerous.
  • Do not keep computers online when not in use: either shut the PC off or physically disconnect it from its internet connection.
  • Do not use shared computers. We recommend that you avoid accessing our website from a public / shared computer such as at an internet cafe.

Fraudulent emails

We will never call or email you asking you to confirm your security details. If you receive any of the above claiming to be from ICICI Bank and asking for account information, do not respond to it. Instead please let us know immediately by forwarding the email to or call us.
In case you have already given such sensitive information, please report this immediately to or call us.
You may need to change your password, PIN or log in details.

Counterfeit websites

Online thieves often direct you to fraudulent websites via email and pop-up windows to try and collect your personal information. One way to detect a phoney website is to consider how you arrived there. You may have been directed by a link in a fake email requesting your account information. Try typing (or cutting and pasting) the URL into a new web browser window. If it does not take you to a legitimate web site, or you get an error message, it was probably just a cover for a fake site.


How do I identify a fake email/website?

Be wary of any email or website that:

  • Asks you for sensitive information: Fake emails often claim that your information has been compromised and your account has been de-activated/suspended. They will ask you to confirm the authenticity of your information/ transactions. Delete these emails and contact ICICI Bank.
  • Contains spelling mistakes: Very often, ‘phishing' emails will contain several spelling mistakes and even the links to the counterfeit websites may contain a URL with spelling mistakes in order to take you to a fake website. Whenever you use a link to access a website, be sure to check for the URL of the website and compare it with the original. We recommend that you type the URL yourself whenever you access, or bookmark or store our URL in your ‘Favourites'.
  • Contains prizes or other offers: Some fake emails promise a prize or gift certificate in exchange for completing a survey or answering a few questions. In order to collect the alleged prize, you may be asked to provide your personal information.
  • Contains fraudulent job offers: Some fake emails appear to be sent by companies to offer you a job. These are often work-at-home positions, which are actually schemes that victimize both the job applicant and other customers. Be sure to confirm that the job offer is from a genuine and reputed company.
  • Looks like a genuine website: Spoof websites can be difficult to detect, because even the address bar and padlock symbol that appear in your browser window can be faked. To make sure you are on our site, type in and see if you get to the same place.

Below are some tips for recognising whether you have possibly been a victim of fraud:

  • If you did not receive an expected bill or statement by mail.
  • If unexpected charges occur on your account.
  • If there are charges on your account from unrecognised vendors.
  • If the cheque leaves in your cheque book appear out of sequence.
  • If you get collection calls regarding merchandise or services you did not buy.

How do I protect myself from online fraud?

With a few simple steps you can help protect your account and personal information from fake emails and websites:

  • Delete suspicious emails without opening them. If you do open a suspicious email, do not open or respond to requests for personal information.
  • Do not open any attachments or click on any links it may contain.
  • Never provide sensitive account or personal information over email. If you have entered personal information, report it to us immediately by calling or writing to us using the 'Email us' option on our website.
  • Maintain the secrecy of your PIN numbers and passwords – see our password-related tips.


How do I protect myself from offline fraud?

  • Make photocopies of all your sensitive information and store them in a secure location like a safe deposit locker.
  • Shred financial or personal documents before discarding. Most fraud and identity theft incidences happen as a result of mail theft.
  • Whenever you or your family are away from home, get the incoming post collected by a trusted acquaintance or arrange to get your mails diverted to an alternate address. Do not leave your incoming post lying around in your absence.



Antivirus software

Software that detects and removes computer viruses.




A programme that allows a user to find, view, hear and interact with material on the web. Microsoft Internet Explorer and Firefox are examples of popular browsers.










A way to make data unreadable to everyone except the recipient of a message. Encryption is often used to make the transmission of credit card numbers secure for those who are shopping on the internet.




Hardware or software that enforces security on your computer or system. It's like a locked door preventing dangerous material from getting into the room.







Someone who tries to get access to a computer system without authorisation.


The first page on a website, which introduces the site.


The mechanical devices that make up a computer system, such as the central processing unit, monitor, keyboard and mouse, as well as other equipment like printers and speakers.



ISP (Internet Service Provider)

A company that sells direct access to the internet, either through a broadband connection or dial up.

Identity theft (ID Theft)

A criminal activity where a thief steals vital information such as your name, birth date, account number or credit card number without your knowledge.






Keystroke logger

Hardware device or a software program that records each keystroke made on a particular computer. Marketed as a way for parents to monitor their children's activities on a computer, keystroke loggers are sometimes downloaded unwittingly by users. The keystroke logger then records the keystrokes and periodically uploads the information over the internet. See also ‘Spyware’ and ‘Trojan horse’.




A word, phrase or image highlighted in a document to get someone from one place to another – typically on the internet, but also within a document.



A mule is an unwitting participant in the frauds who is recruited by fraudsters to launder stolen money across the globe.






Operating system

The main programme that runs on a computer. An operating system allows other software to run and prevents unauthorised users from accessing the system. Major operating systems include Vista, XP or MAC OS X.




A software update meant to fix problems with a computer programme. This can range from fixing bugs, to replacing graphics or improving the usability or performance of a previous version.


The criminal process of electronically gathering and selling the personal and financial information of multiple users through the use of phishing (see below).


An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not. The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also ‘spoofing’.

Pop-up ads (Pop-ups)

Unsolicited advertising that appears as a ‘pop-up’ window on a computer screen. Sometimes these can be created to look like a financial institution's request for personal information.

Privacy policy

The policy under which a company operating a website handles the personal information collected from visitors to the site.









Secure Socket Layer (SSL)

SSL technology encodes information that is sent over the internet, helping to ensure that the information remains confidential.

Service Pack

A software programme that corrects known bugs or problems, or adds new features to a software programme already installed on your computer.


Is a method of capturing information contained in the magnetic strip of a card through a skimmer to be stored on an attached computer. This information is then used for online shopping or to make counterfeit credit cards.


A computer programme that enables computer hardware to work.

Software update

Software installed that’s designed to enhance or repair a previously installed computer programme.


Unsolicited junk email sent to large numbers of people to promote products or services.


An online identity theft scam. Typically, criminals send emails that look like they're from legitimate sources, but are not (see also ‘phishing’). The fake messages generally include a link to phoney or spoof websites where victims are asked to provide sensitive personal information. The information goes to criminals rather than the legitimate business. See also ‘phishing’.


A programme that’s loaded onto your computer without your knowledge. These programmes gather information from your computer activities and send them to an unknown source. If these programs often try to capture financial information that can be used to commit fraud.



Trojan horse

An apparently legitimate software that appears to perform a desirable function but instead allows unauthorised access to your computer. See also ‘Spyware’.







A programme that’s loaded onto your computer without your knowledge. Viruses can make copies of themselves, quickly using up all available memory. Some viruses can transmit themselves across networks.


Vishing is a combination of Voice over Internet Protocol (VoIP) and Phishing. Fraudsters feigning to represent real companies, such as a bank, call customers to provide personal details over phone.




Typically, a malicious programme that reproduces itself over a network and uses up computer resources or shuts down the system.