Thursday, February 18, 2010

New UK Cyber Team to Target Online Banking Fraudsters

QCK.com is reporting that the government in the UK is forming an online banking cyber investigative unit.  Again, at the risk of sounding redundant, the "practice" of "typing" online banking login credentials into a box in a browser is the "cause" of the problem  So we need to "effectively" change the way we authenticate an online banking session.   We must stop the practice of using a browser to authenticate.  Authentication must be done "outside the browser."   It makes complete sense to use "existing cards, PINs and bank rails" to authenticate.



We at HomeATM have long stated that the trusted process used by ATM's to dispense $200 a thousand miles away from it's main branch, at 2:00 AM, can be trusted to secure the online banking session.  1. What you have (your card) and 2. what you know (your PIN)  Our PCI certified PIN Entry Device allows online banking users to swipe their card...and enter their PIN.













Online Banking Authentication Should be Done Using the Same Trusted Process to Access your Account at an ATM


New cyber team to target online banking fraudsters
February 17, 2010 - By Mark Warner


The government is setting up a new "cyber enforcement team" to tackle fraudsters who target consumers' online banking accounts.



Online banking log-on details are regularly stolen by criminals who send emails inviting individuals to register for a free item - such as an iPod - only for the recipient to download "spyware" onto their computer without realising.



This then gives fraudsters access to people's online banking log-on details...Editor's Note:  Not if we stopped typing.  No typing, no access.



Continue Reading







Disqus for ePayment News