<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Banking security and SMS authentication</title>
	<atom:link href="http://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 06 May 2026 07:53:27 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Mike</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1261167</link>
		<dc:creator><![CDATA[Mike]]></dc:creator>
		<pubDate>Thu, 16 Oct 2014 23:58:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1261167</guid>
		<description><![CDATA[I was recommended this web site by way of my cousin. I&#039;m not sure whether this publish is written through him as 
nobody ekse realize such disztinct approximately my trouble.
You&#039;re amazing! Thanks!]]></description>
		<content:encoded><![CDATA[<p>I was recommended this web site by way of my cousin. I&#8217;m not sure whether this publish is written through him as<br />
nobody ekse realize such disztinct approximately my trouble.<br />
You&#8217;re amazing! Thanks!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1252722</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 Oct 2014 09:34:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1252722</guid>
		<description><![CDATA[Infected ATMs Give Away Millions of Dollars Without Credit Cards
http://it.slashdot.org/story/14/10/07/215222/infected-atms-give-away-millions-of-dollars-without-credit-cards

Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers discovered the Tyupkin malware used to infect ATMs and allow attackers to remove money via direct manipulation, stealing millions of dollars. 

Infected ATMs gave away millions of dollars
http://blog.kaspersky.com/tyupkin-atm-malware/

What do you need in order to withdraw cash from an ATM? First, you need to have a debit or credit card, which acts as a key to your bank account. Second, you must know the PIN code associated with the card; otherwise, the bank wouldn’t approve the transaction. Finally, you need to have some money in your account that you can withdraw. However, hackers do things differently: they don’t need cards, PIN codes or bank accounts to get money. In reality, all they need is an ATM with some cash in it and a special piece of software.


Infected ATMs give away millions of dollars without credit cards
http://www.net-security.org/malware_news.php?id=2880
Posted on 07.10.2014
Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers discovered the Tyupkin malware used to infect ATMs and allow attackers to remove money via direct manipulation, stealing millions of dollars.

“Over the last few years, we have observed a major upswing in ATM attacks using skimming devices and malicious software. Now we are seeing the natural evolution of this threat with cyber-criminals moving up the chain and targeting financial institutions directly. This is done by infecting ATMs themselves or launching direct APT-style attacks against banks. The Tyupkin malware is an example of the attackers taking advantage of weaknesses in the ATM infrastructure,”]]></description>
		<content:encoded><![CDATA[<p>Infected ATMs Give Away Millions of Dollars Without Credit Cards<br />
<a href="http://it.slashdot.org/story/14/10/07/215222/infected-atms-give-away-millions-of-dollars-without-credit-cards" rel="nofollow">http://it.slashdot.org/story/14/10/07/215222/infected-atms-give-away-millions-of-dollars-without-credit-cards</a></p>
<p>Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers discovered the Tyupkin malware used to infect ATMs and allow attackers to remove money via direct manipulation, stealing millions of dollars. </p>
<p>Infected ATMs gave away millions of dollars<br />
<a href="http://blog.kaspersky.com/tyupkin-atm-malware/" rel="nofollow">http://blog.kaspersky.com/tyupkin-atm-malware/</a></p>
<p>What do you need in order to withdraw cash from an ATM? First, you need to have a debit or credit card, which acts as a key to your bank account. Second, you must know the PIN code associated with the card; otherwise, the bank wouldn’t approve the transaction. Finally, you need to have some money in your account that you can withdraw. However, hackers do things differently: they don’t need cards, PIN codes or bank accounts to get money. In reality, all they need is an ATM with some cash in it and a special piece of software.</p>
<p>Infected ATMs give away millions of dollars without credit cards<br />
<a href="http://www.net-security.org/malware_news.php?id=2880" rel="nofollow">http://www.net-security.org/malware_news.php?id=2880</a><br />
Posted on 07.10.2014<br />
Kaspersky Lab performed a forensic investigation into cybercriminal attacks targeting multiple ATMs around the world. During the course of this investigation, researchers discovered the Tyupkin malware used to infect ATMs and allow attackers to remove money via direct manipulation, stealing millions of dollars.</p>
<p>“Over the last few years, we have observed a major upswing in ATM attacks using skimming devices and malicious software. Now we are seeing the natural evolution of this threat with cyber-criminals moving up the chain and targeting financial institutions directly. This is done by infecting ATMs themselves or launching direct APT-style attacks against banks. The Tyupkin malware is an example of the attackers taking advantage of weaknesses in the ATM infrastructure,”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1244263</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 30 Sep 2014 09:43:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1244263</guid>
		<description><![CDATA[Could your credit score soon be based on your FACEBOOK FRIENDS? Expert predicts future of banking will rely on social networks
http://www.dailymail.co.uk/sciencetech/article-2773349/Could-credit-score-soon-based-FACEBOOK-FRIENDS-Expert-predicts-future-banking-rely-social-networks.html

    The predictions were made financial tech expert Gi Fernando
    He claimed that credit scores could soon be based on Facebook friends
    Banks could also move into coffee shops and supermarkets
    Payment technology will become wireless and be based on biometric data
    And Mr Fernando claims this could happen within the next decade]]></description>
		<content:encoded><![CDATA[<p>Could your credit score soon be based on your FACEBOOK FRIENDS? Expert predicts future of banking will rely on social networks<br />
<a href="http://www.dailymail.co.uk/sciencetech/article-2773349/Could-credit-score-soon-based-FACEBOOK-FRIENDS-Expert-predicts-future-banking-rely-social-networks.html" rel="nofollow">http://www.dailymail.co.uk/sciencetech/article-2773349/Could-credit-score-soon-based-FACEBOOK-FRIENDS-Expert-predicts-future-banking-rely-social-networks.html</a></p>
<p>    The predictions were made financial tech expert Gi Fernando<br />
    He claimed that credit scores could soon be based on Facebook friends<br />
    Banks could also move into coffee shops and supermarkets<br />
    Payment technology will become wireless and be based on biometric data<br />
    And Mr Fernando claims this could happen within the next decade</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1229077</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 15 Sep 2014 09:09:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1229077</guid>
		<description><![CDATA[JPMorgan hack investigation finding dozens of the company&#039;s servers breached over two months; one source says SSNs and account data not stolen:

After Breach, JPMorgan Still Seeks to Determine Extent of Attack
http://www.nytimes.com/2014/09/13/technology/after-breach-jpmorgan-still-seeks-to-determine-extent-of-attack.html

The headache caused by the attack on JPMorgan Chase’s computer network this summer may not go away anytime soon.

Over two months, hackers gained entry to dozens of the bank’s servers, said three people with knowledge of the bank’s investigation into the episode who spoke on the condition of anonymity. This, they said, potentially gave the hackers a window into how the bank’s individual computers work.

They said it might be difficult for the bank to find every last vulnerability and be sure that its systems were thoroughly secured against future attack.

The hackers were able to review information about a million customer accounts and gain access to a list of the software applications installed on the bank’s computers. One person briefed said more than 90 of the bank’s servers were affected, effectively giving the hackers high-level administrative privileges in the systems.

Hackers can potentially crosscheck JPMorgan programs and applications with known security weaknesses, looking for one that has not yet been patched so they can regain access.]]></description>
		<content:encoded><![CDATA[<p>JPMorgan hack investigation finding dozens of the company&#8217;s servers breached over two months; one source says SSNs and account data not stolen:</p>
<p>After Breach, JPMorgan Still Seeks to Determine Extent of Attack<br />
<a href="http://www.nytimes.com/2014/09/13/technology/after-breach-jpmorgan-still-seeks-to-determine-extent-of-attack.html" rel="nofollow">http://www.nytimes.com/2014/09/13/technology/after-breach-jpmorgan-still-seeks-to-determine-extent-of-attack.html</a></p>
<p>The headache caused by the attack on JPMorgan Chase’s computer network this summer may not go away anytime soon.</p>
<p>Over two months, hackers gained entry to dozens of the bank’s servers, said three people with knowledge of the bank’s investigation into the episode who spoke on the condition of anonymity. This, they said, potentially gave the hackers a window into how the bank’s individual computers work.</p>
<p>They said it might be difficult for the bank to find every last vulnerability and be sure that its systems were thoroughly secured against future attack.</p>
<p>The hackers were able to review information about a million customer accounts and gain access to a list of the software applications installed on the bank’s computers. One person briefed said more than 90 of the bank’s servers were affected, effectively giving the hackers high-level administrative privileges in the systems.</p>
<p>Hackers can potentially crosscheck JPMorgan programs and applications with known security weaknesses, looking for one that has not yet been patched so they can regain access.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: anxiety attack vs panic attack</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1092278</link>
		<dc:creator><![CDATA[anxiety attack vs panic attack]]></dc:creator>
		<pubDate>Sat, 06 Sep 2014 23:56:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1092278</guid>
		<description><![CDATA[Hi there to every one, it&#039;s really a pleasant for me to pay 
a visit this web page, it includes precious Information.]]></description>
		<content:encoded><![CDATA[<p>Hi there to every one, it&#8217;s really a pleasant for me to pay<br />
a visit this web page, it includes precious Information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1088721</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 06 Sep 2014 12:52:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1088721</guid>
		<description><![CDATA[Hitachi and Barclays announce a vein scanner for online banking security
Claims to be more secure than fingerprint scanning 
http://www.theinquirer.net/inquirer/news/2363671/hitachi-and-barclays-announce-a-vein-scanner-for-online-banking-security

BARCLAYS BANK AND HITACHI have unveiled a biometric security device that scans the unique vein patterns in fingers to prevent fraud.

The Barclays Biometric Reader consists of a SIM card that holds the unique vein structure information of a single user and a small infra-red scanner. Using Hitachi&#039;s VeinID technology, the reader captures the image of the vein pattern in a user&#039;s finger, which, like a fingerprint, is unique to each individual.

Unlike fingerprints, the internal structures of veins are very difficult to reproduce artificially and the scanner only operates if there is a constant blood flow to the finger, meaning the severed finger of a finance officer could not be used to bypass the device&#039;s authentication.

In 2015, the reader will be offered to corporate banking clients who will be able to access their bank accounts and authorise payments without the need for PINs, passwords or other authentication.

Both companies believe there is a wider potential to use the biometrics scanner in the consumer sector and integrate it with mobile devices.]]></description>
		<content:encoded><![CDATA[<p>Hitachi and Barclays announce a vein scanner for online banking security<br />
Claims to be more secure than fingerprint scanning<br />
<a href="http://www.theinquirer.net/inquirer/news/2363671/hitachi-and-barclays-announce-a-vein-scanner-for-online-banking-security" rel="nofollow">http://www.theinquirer.net/inquirer/news/2363671/hitachi-and-barclays-announce-a-vein-scanner-for-online-banking-security</a></p>
<p>BARCLAYS BANK AND HITACHI have unveiled a biometric security device that scans the unique vein patterns in fingers to prevent fraud.</p>
<p>The Barclays Biometric Reader consists of a SIM card that holds the unique vein structure information of a single user and a small infra-red scanner. Using Hitachi&#8217;s VeinID technology, the reader captures the image of the vein pattern in a user&#8217;s finger, which, like a fingerprint, is unique to each individual.</p>
<p>Unlike fingerprints, the internal structures of veins are very difficult to reproduce artificially and the scanner only operates if there is a constant blood flow to the finger, meaning the severed finger of a finance officer could not be used to bypass the device&#8217;s authentication.</p>
<p>In 2015, the reader will be offered to corporate banking clients who will be able to access their bank accounts and authorise payments without the need for PINs, passwords or other authentication.</p>
<p>Both companies believe there is a wider potential to use the biometrics scanner in the consumer sector and integrate it with mobile devices.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Judith</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1072153</link>
		<dc:creator><![CDATA[Judith]]></dc:creator>
		<pubDate>Thu, 04 Sep 2014 21:22:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1072153</guid>
		<description><![CDATA[Thankfulness to my father who informed me concerning 
tis website, this weblog iis genuinely amazing.]]></description>
		<content:encoded><![CDATA[<p>Thankfulness to my father who informed me concerning<br />
tis website, this weblog iis genuinely amazing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1022560</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Aug 2014 12:21:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1022560</guid>
		<description><![CDATA[U.S. banking group says unaware of any ‘significant’ cyber attack
http://www.reuters.com/article/2014/08/29/us-jpmorgan-cybersecurity-idUSKBN0GS1CO20140829

The group, known as the Financial Services Information Sharing and Analysis Center, or FS-ISAC, includes all major U.S. banks and dozens of smaller ones along with some large European financial institutions.

“There are no credible threats posed to the financial services sector at this time,” the group said in an email to its members.

“Banks are getting attacked every single day. These comments from FS-ISAC and its members indicate that this is not a major new offensive,” said Dave Kennedy, chief executive officer of TrustedSEC LLC, whose clients include several large U.S. banks.

“While we should remain diligent and active in monitoring, it doesn’t appear there is a major offensive,” said Kennedy.]]></description>
		<content:encoded><![CDATA[<p>U.S. banking group says unaware of any ‘significant’ cyber attack<br />
<a href="http://www.reuters.com/article/2014/08/29/us-jpmorgan-cybersecurity-idUSKBN0GS1CO20140829" rel="nofollow">http://www.reuters.com/article/2014/08/29/us-jpmorgan-cybersecurity-idUSKBN0GS1CO20140829</a></p>
<p>The group, known as the Financial Services Information Sharing and Analysis Center, or FS-ISAC, includes all major U.S. banks and dozens of smaller ones along with some large European financial institutions.</p>
<p>“There are no credible threats posed to the financial services sector at this time,” the group said in an email to its members.</p>
<p>“Banks are getting attacked every single day. These comments from FS-ISAC and its members indicate that this is not a major new offensive,” said Dave Kennedy, chief executive officer of TrustedSEC LLC, whose clients include several large U.S. banks.</p>
<p>“While we should remain diligent and active in monitoring, it doesn’t appear there is a major offensive,” said Kennedy.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1022555</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 29 Aug 2014 12:21:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1022555</guid>
		<description><![CDATA[JPMorgan, Four Other Banks Hit by Hackers: U.S. Official
Aug 28, 2014
http://www.bloomberg.com/news/2014-08-27/customer-data-said-at-risk-for-jpmorgan-and-4-more-banks.html

Computer hackers targeted JPMorgan Chase &amp; Co. (JPM) and at least four other banks in a coordinated attack on major financial institutions this month, according to a U.S. official.

The attack led to the theft of customer data that could be used to drain accounts, according to another person briefed by U.S. law enforcement.]]></description>
		<content:encoded><![CDATA[<p>JPMorgan, Four Other Banks Hit by Hackers: U.S. Official<br />
Aug 28, 2014<br />
<a href="http://www.bloomberg.com/news/2014-08-27/customer-data-said-at-risk-for-jpmorgan-and-4-more-banks.html" rel="nofollow">http://www.bloomberg.com/news/2014-08-27/customer-data-said-at-risk-for-jpmorgan-and-4-more-banks.html</a></p>
<p>Computer hackers targeted JPMorgan Chase &amp; Co. (JPM) and at least four other banks in a coordinated attack on major financial institutions this month, according to a U.S. official.</p>
<p>The attack led to the theft of customer data that could be used to drain accounts, according to another person briefed by U.S. law enforcement.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/12/12/banking-security-and-sms-authentication/comment-page-2/#comment-1013296</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 Aug 2014 11:31:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=15092#comment-1013296</guid>
		<description><![CDATA[Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you&#039;d hoped you wouldn&#039;t find &#039;em
http://www.theregister.co.uk/2014/08/27/coding_flaws_study/

The whopping 70 per cent of retail and 69 perc ent of financial services apps are vulnerable to data breaches.

That&#039;s according to an analysis of 705 million lines of code as used by 1,316 enterprise applications carried out by software analysis and measurement firm CAST. The firm reckons a growing number of data breaches and security incidents can be directly linked to poor code quality, which can be attributed to tightening project deadlines and other factors.

He added: &quot;Businesses handling customer financial information have a responsibility to improve software quality and reduce the operational risk of their applications – not only to protect their businesses, but ultimately their customers.&quot;

Input validation errors gave rise to the infamous Heartbleed bug and are among the most common class of coding error more generally. 

The research also revealed that the financial services industry has the highest number of input validation violations per application]]></description>
		<content:encoded><![CDATA[<p>Banking apps: Handy, can grab all your money&#8230; and RIDDLED with coding flaws<br />
Yep, that one place you&#8217;d hoped you wouldn&#8217;t find &#8216;em<br />
<a href="http://www.theregister.co.uk/2014/08/27/coding_flaws_study/" rel="nofollow">http://www.theregister.co.uk/2014/08/27/coding_flaws_study/</a></p>
<p>The whopping 70 per cent of retail and 69 perc ent of financial services apps are vulnerable to data breaches.</p>
<p>That&#8217;s according to an analysis of 705 million lines of code as used by 1,316 enterprise applications carried out by software analysis and measurement firm CAST. The firm reckons a growing number of data breaches and security incidents can be directly linked to poor code quality, which can be attributed to tightening project deadlines and other factors.</p>
<p>He added: &#8220;Businesses handling customer financial information have a responsibility to improve software quality and reduce the operational risk of their applications – not only to protect their businesses, but ultimately their customers.&#8221;</p>
<p>Input validation errors gave rise to the infamous Heartbleed bug and are among the most common class of coding error more generally. </p>
<p>The research also revealed that the financial services industry has the highest number of input validation violations per application</p>
]]></content:encoded>
	</item>
</channel>
</rss>
