More on the spyware front, should banks assume information is stolen?



Sunbelt blog is reporting on some of the countermeasures that some banks are starting to use to frustrate keyloggers. One trick is to request that your pin – number be entered in reverse or a specific order.



Another approach is mouseclicks on a virtual keyboard. Some of these ways can be defeated by eavesdroppers, others are harder. Are we going to have to make it so difficult to log in online that most users won’t bother?

Okay, enter your password using the next to last character first, the second character next, the last character after that, then the first and then any other characters in between. I think I need some tylenol….

The writer at sunbelt further suggests the following….

More is needed. I have seen my fair share of compromised systems. Authentication is old news. Banks, right now, need to work with the belief that their customers have had their account information and PINs stolen.

I see some problems with this assumption, but it is something to think about.

Related Posts

Blog Traffic Exchange Related Posts
  • Sony DRM Rootkit -- it's worse I did this as updates to an earlier post, but it probably deserves it's own post now. The morning brought us the news of SERIOUS flaws in the Uninstaller ActiveX control for Sony's DRM, then came news of ANOTHER flaw, this one a privilige escalation "attacker can take control of......
  • How to Remove SoftStronghold | Soft Stronghold Removal Guide SoftStronghold is the latest rogue antivirus application in the LONG line of Wini rogues... Softveteran was the most recent (see the softveteran removal guide) but.... SoftCop (see the SoftCop removal guide.) But, the line goes much further back.... Softsoldier (How to remove SoftSoldier), ( TrustFighter TrustFighter Removal Guide, TrustSoldier removal......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Phishing, Smishing and Vishing: Tips to Help Your Customers Avoid These Scams It sounds like the title of a nursery rhyme you've never heard of, but phishing, smishing, and vishing are the most prevalent methods of identity theft likely to affect your customers. Your business relationship could be at risk too in the event that it's your information cache that was stolen......
  • Bank of America Scam Below is the latest scam that is going around, I received this from a lady who wanted to know if it was real or not. I did some research and of course it was not. If you google the following (Joan Own, David Dupont or daviddupont154@aol.com) , you will find......
  • Build Your Savings With Money Market Investing Money market investing was very popular in the late 1980s and was a safe method of saving money and earning a higher rate of interest. The popularity decreased as people began placing more of their earnings into 401k or 403b retirement plans. The offer of employer-matched contributions made these retirement......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site