How gamers are at the risk of cyber attacks, BFSI News, ET BFSI

[ad_1]

Read More/Less


The rising cybercrimes are now targeting gamers using a crypto-mining malware called Crackonosh. The research shows this crime has so far made more than $2 million for hackers.

But it’s not targeting any gamers. Games that are “cracked” pirate copies of popular games come infected with this malware script, allowing hackers to secretly mine cryptocurrencies using the victim’s resources. These games include Grand Theft Auto V, Pro Evolution Soccer 2018, Jurassic World Evolution, and NBA 2K19 available for free on forums or torrent.

So, how does this exactly work?

The crime is called cryptojacking, and the way it works is by embedding malware on a computer or mobile device to steal its resources and mine cryptocurrencies.

Since mining cryptocurrencies use a considerable volume of electricity and need a high-performing PC to solve a critical mathematical equation, this attack risks gamers. So by using gamers’ high-performance resources from computers, hackers earn cryptocurrencies without bearing the overhead cost. The malware script works secretly in the victim’s computer and doesn’t get noticed easily. However, the symptoms of a victim are slowed down PCs and spike in electricity bills.

Moreover, the attack goes unnoticed by the user because once Crackonosh is inside the system, it modifies the computer’s registry to allow it to run in safe mode. This disables most antivirus software. It then boots the computer into a safe mode. Further, it replaces the Windows Security icon in Windows 10 with a fake one and disables other security software.

The malware creator is believed to be Czech because the name Crackonosh means “mountain spirit” in Czech culture. What’s more alarming is the fact that Avast, a cyber-security company, is now detecting over 800 cases on computers each day. But these are registered cases of computers that have Avast installed, meaning the spread of these crimes could be much higher.

Thus, this situation implies that there’s nothing like free lunch. Even though the games are free, the user eventually ends up paying a heavy sum for it. Even though the cryptojacking scripts do not comprise a user’s personal data, it exploits CPU processing resources and electric power. Some scripts come with worming capabilities that infect and compromise other servers and devices on the network.

So, what can you do about this scenario?

Removing the malware from the computer is a lengthy and complex process. It requires deleting files, scheduled tasks, and even registry keys. Therefore, the best remedy to this situation is prevention.

The applications or games should be installed from only the legitimate gaming stores. Next, the updates should be done from the developer’s website only. This attack is only executed once the user downloads games from unofficial pages like torrent or other third-party applications.

Remember, the cure to such crimes is prevention, thus, maintaining healthy security habits like using original gaming stores, and downloading updates straight from the developers can help you mitigate these risks in the first place.

The author is Vice President – International Sales at Array Networks



[ad_2]

CLICK HERE TO APPLY

Axis Bank’s Thapar, BFSI News, ET BFSI

[ad_1]

Read More/Less


Misconfiguration is one of the key risks to cyber attacks, said Rajesh Thapar, the chief information security officer of Axis Bank. Banks may bring in the best tool or technology but if it isn’t configured right, you are opening doors to cyber risks, he added.

Banks are facing an unprecedented surge in cyber attacks, and the nature of these attacks are constantly evolving the complex theft landscape.

While ransomware attacks, Denial of Service (DOS) attacks, phishing are common, with more digitalisation, the nature of such attacks is changing.

“Cyber risk is now becoming a business risk. Earlier cyber risk was a cyber risk from infrastructure perspective but today, with all the digitalisation happening, cyber risks are more becoming a business risk as it can impact a customer’s confidentiality which can lead to customer distrust. It can impact regulations, the company can be non compliant to some of the legislations and get penalties for it “, added Thapar.

Balancing customer experience alongwith security in an organisation is necessary yet complicated. Now, there is a huge pool of data, which needs to be protected and this data is the first target for hackers.

Manish Sinha, director sales engineering, India and SAARC at McAfee Enterprise, said “The risk is not just hackers attacking these data threads, the threat is them selling it away to third parties, which is more harmful to the organisation in all ways. Data leakage is a serious concern. To battle it what’s required is a unified approach for data protection in a holistic manner across the banking platforms.”

Misconfiguration a key risk to cyber attacks: Axis Bank's Thapar

Cyber attackers and hackers are being very sophisticated now in their attacks. The average dwell time of these hackers in the network, before being discovered, is increasing. More the dwell time, greater the damage, making time a very critical factor of the extent of cyber attacks.

“Security operation models are evolving. The identification and prevention of cyber threats and attacks were in a periodic cycle of assessments but now it will be in a continuous cycle of assessments. Attacks are happening all the time so organisations will need to carry out the continuous assessment model to beat cyber threats and attacks”, said Thapar.

Talking about the future model to control cyber attacks, Sinha said that the bigger challenge for the next generation cyber security teams is to prioritise the threats after identifying it. “This should come from alot of AI based engines or algorithms, which are running, and also from global threat intelligence, which can relate to the threat actors from the banking space globally, and finally look out to the regional advisories,” he said.



[ad_2]

CLICK HERE TO APPLY

CyberX9 questions PNB’s denial of server vulnerability

[ad_1]

Read More/Less


Cyber security firm, CyberX9 which alleged that there was a vulnerability in Punjab National Bank’s (PNB) internal server on Tuesday questioned the bank’s claims that no such breach or leak of customer data has taken place.

Read also: PNB server vulnerability may have exposed data of over 180 m customers

CyberX9, in a statement, asked, “Have they checked every single computer system and servers in their massive network which even includes computer systems in their large number of bank branches and other offices? It is a baseless argument from PNB without putting any actual efforts into checking if there are attackers already in their network or not who could’ve entered in at any point in these ~7 months when they were vulnerable. They simply left the door to their internal systems open for ~7 months and now they’ve to check their whole network (a very big maze) to find if any attacker is covertly hiding.”

Read more: No breach of systems and pilferage of any personal data, says PNB

“For the scale of PNB’s network (extremely large number of systems which includes computers in bank branches and other servers), it’ll take at least more then a month even for a very large team of skilled security and forensic engineers to re-secure everything and find and clean up any infiltration. Until then PNB can’t be considered secure. We should not forget that CERT-In and NCIIPC accepted our reports to them where we mentioned the impact of the vulnerability which we also mentioned in our blog. And also that PNB had to shut down their server after our report which is a big thing since it shows the severity of the vulnerability and it’s impact,” it added.

Following several reports of vulnerability found in Punjab National Bank’s internal server, exposing personal and financial information of customers, the bank on Monday denied any breach of system and possibility of data exposure. The bank has deployed data leak prevention solutions that stop any unauthorised data from being sent through emails, it said.

Following PNB’s claims of deploying data leak prevention solutions that prevent any unauthorised data to be sent through emails,CyberX9 said, “It’s an irrelevant statement here since it’s unclear what they mean by “unauthorised data. Any internal employee sending sensitive customer personal or financial data or internal confidential documents isn’t “unauthorised data” and hence is indeed shared in emails.”

CyberX9 even questioned PNB’s ISO 27001 certification saying it has violated the same by not timely report and remediate the vulnerability.

[ad_2]

CLICK HERE TO APPLY

Vulnerability in PNB server exposed customer data for about seven months: CyberX9

[ad_1]

Read More/Less


A vulnerability in the server of Punjab National Bank allegedly exposed the personal and financial information of its about 180 million customers for about seven months, according to cyber security firm CyberX9.

CyberX9 has claimed that the vulnerability provided access to the entire digital banking system of PNB with administrative control.

Meanwhile, the bank has confirmed the glitch but denied any exposure of critical data due to the vulnerability.

PNB said, “customer data/applications are not affected due to this” and “server has been shut down as a precautionary measure.” “Punjab National Bank kept severely compromising the security of funds, personal and financial information of over 180 million (all) its customers for about the last 7 months. PNB only woke up and fixed the vulnerability when CyberX9 discovered the vulnerability and notified PNB through CERT-In and NCIIPC,” CyberX9 founder and MD Himanshu Pathak told PTI.

He said CyberX9 research team discovered a critical security issue in PNB, leading to admin access to internal servers hence exposing a massive number of banks’ systems nationwide open for cyber-attacks for the last about seven months.

Pathak said that vulnerability was found in an exchange server interconnected with other exchanges and shares all access — including access to all email addresses, which results in access to all email addresses.

“The vulnerability which we discovered was leading to the highest level of admin privilege in PNB’s exchange servers. If you gain access to Domain Controller through an exchange server, the doors are easily open to make any computer accessible in the network.

“These computers even include those that are being used in their branches and other departments,” Pathak said.

When contacted, PNB said, the server in which the vulnerability was found had no sensitive or critical data.

“The server wherein the vulnerability was reported, was being used as one of the multiple Exchange Hybrid servers used to route emails from On-prim to Office 365 Cloud. There is no sensitive/critical data in this server,” PNB said.

PNB denied CyberX9 claim on the impact of the vulnerability on customer’s data.

“The server is in a separate VLAN segment and customer data/applications are not affected due to this. Vulnerability assessments and penetration testing is done periodically by external Cert-in empanelled Information Security Auditors and the observations are complied with.

Now this server has been shut down as a precautionary measure,” PNB said.

According to CyberX9, the vulnerability was mitigated on November 19, and it reported the incident to Indian cyber security watchdog Cert-In and National Critical Information Infrastructure Protection Centre (NCIIPC).

[ad_2]

CLICK HERE TO APPLY

RBI set to monitor digital banking and cyber security, asks banks to be vigilant too, BFSI News, ET BFSI

[ad_1]

Read More/Less


RBI will soon launch a web-based supervisory system that will enable off-site and on-site monitoring of modern functions like digital banking, cyber security, said RBI deputy governor MK Jain. At the same time banks need to be careful in complying with rules and invest in technologies to meet the supervisory challenges as they experiment with new services in the post COVID world though ultimately its governance standards, business model, risk culture, and assurance functions will decide how well it fares in the long run, he said.

“For continuous engagement with supervised entities, a web-based and an end-to-end workflow automation system has been developed ( by RBI)” said Jain in a keynote address at a summit. It has various functionalities including inspection, compliance and incident reporting for cyber security, etc. with a built-in remediation workflow, time tracking, notifications and alerts, Management Information System reports and dashboards. “This is being launched shortly”.

With the proliferation of digital banking, cyber security has become an extremely important area of supervisory concern. To address this concern, the Reserve Bank has developed a model-based framework for assessing cyber risk in banks using various risk indicators, risk incidents. ” Cyber drills are conducted based on hypothetical scenarios”.

While a lot is being done in the cyber security space, these risks are continuously evolving in the dynamic environment we operate in, and hence there should be constant vigil and continuous enhancements of IT systems, warned Jain.

Globally, fintechs are challenging banks with more convenient offerings, better reach and lower cost to customers. Besides, developments in areas artificial intelligence, robotics and chat advisory, digitalisation, Distributed Ledger Technology, quantum computing, cloud arrangements, data analytics, new ways of remote, though have their benefits but are also generating new risks, Jain warned. Also, climate change, KYC / AML, cyber security, virtual currencies as well as increasing reliance on outsourcing are some of the other major challenges that will need to be addressed, he said.

Banks need to be agile and creative to stay ahead of the digital curve, but banks will have to align their products in compliance with existing laws and regulations. ” Financial institutions would need to experiment with new technologies and tailor their products and services in alignment with business strategy and in compliance with existing laws and regulations” Jain said. “Leveraging on technology will also require enhanced financial investments, building expertise and capacities, proper resource allocation and further strengthening of the operational capabilities”.



[ad_2]

CLICK HERE TO APPLY

Rapid digitisation of banks invites cyber risks as well. What are the risks, and what should banks do?, BFSI News, ET BFSI

[ad_1]

Read More/Less


-By Ishwari Chavan

The banking sector has always been victim of cyberattacks, and with COVID-19, it has become more vulnerable. Cyberattacks against banks and financial institutions across the globe increased to 238% between February 2020 and April 2020, according to VMware Carbon Black.

According to the Indian Computer Emergency Response Team (CERT-In), over 2.9 lakh cyberattacks related to digital banking were reported in 2020. A total number of 1,59,761; 2,46,514 and 2,90,445 cyber security incidents related to digital banking were reported during 2018, 2019 and 2020 respectively. These incidents included phishing attacks, network scanning and probing, viruses and website hacking.

Year Number of cyber security incidents
2018 1,59,761
2019 2,46,514
2020 2,90,445

Source: Indian Computer Emergency Response Team

“The kind of security threats that we see whether it is a remote mirroring of applications, localization of your data stores in your mobile, hijacking of your sessions, social engineering attacks, all of those are very easy things to do. You don’t need real hackers to do that, smart people can do this too. That’s what has happened in the banking sector where we’ve seen a lot of increase in fraud, whether it’s on the UPI side or the traditional payment side,” said Ramesh Lakshminarayan, chief information officer at HDFC Bank.

According to Heeral Sharma, senior cyber security advisor at McAfee, three challenges must be tackled to ensure cyber safety. First is the challenge of internal IT security, second is digitization of applications and of critical data such as payments and personally identifiable information (PII), and third are cloud native threats.

What are the risks?

More and more individuals are now accessing their bank accounts through banks’ mobile apps. Many of these apps, and even customers, tend to have minimal or no security, such as users keeping easy passwords or banks keeping minimum password checks for transactions.

“The cloud threats in the BFSI segment increased by 571%, which is huge. The reason is simple, the network boundaries are no longer defined. It’s all borderless. So the attackers have found out new ways to get in and penetrate at times even by using legitimate credentials.” said Sharma.

Cyber security infrastructure as a whole needs an upgrade. Banks need to rightfully utilise their cyber security budget to help advance their technology and detect all kinds of risks.

As banks have upgraded their cyber security, attackers have turned to shared banking systems and third-party networks to gain access. In case, these are not as protected, there is more risk for cyberattacks.

Even for cryptocurrency, hacks have become more advanced as the segment is still unsure on how to implement cyber security.

What should banks do?

Banks should prioritise investing in cybersecurity and build a resilient infrastructure, to address current cyber security threats and prepare for challenges in the future.

“When we talk about digital we talk about investments. Our investments will also go into the cybersecurity segment as we move towards digitization. There should not be any compromise as far as the data securities and the Data Protection Service securities are concerned,” said Upma Goel, chief financial officer at Ujjivan Small Finance Bank.

Sharma stressed on how data protection requires a completely different approach so that banks are aware on what’s happening in the cloud. “Data protection, threat protection and network security model all built in together will provide a better approach and also take care of the complexity in the multi state and collaborative environment,” she said.

“If you look at the entire security landscape, right from an employee experience to the customer experience to our own, huge disruptions are happening in the area,” Lakshminarayan said. Banks are required to reimagine some of their own technology and adapt to a three-year or four-year journey, he added.

The article is based on the panel discussion on: Fireside Chat on Bankers Chariot, Riding on Tech that took place at ETBFSI CXO conclave



[ad_2]

CLICK HERE TO APPLY

Follow these 10 steps to ensure your online financial data remains safe, BFSI News, ET BFSI

[ad_1]

Read More/Less


Rajesh Iyer lost money while selling an old television set through an online classified ad. Aarif Ansari uploaded his CV on a job portal, only to be swindled by someone claiming to be from a placement agency. Sudha Ramakrishnan was buying clothes, when by clicking on an advertisement on a social media platform, she found herself poorer by a few thousand rupees.

With the line between the real and virtual worlds becoming hazy, online frauds are becoming more common. It’s no longer about a fancy envelope arriving in your mail to announce that you have won a lottery or that you are inheriting an estate in another continent. As the time we spend online working and playing increases, fraudsters are also finding newer avenues to con us out of our hard-earned money.

You can’t be careful enough. “It is not possible to live outside the virtual world. What we need to do is to treat the virtual world as the real world and take same pre cautions accordingly,” says Ritesh Chopra, Director Sales and Field Marketing, India and SAARC, NortonLifeLock. Sometimes the fraudsters don’t even need you to act directly. Only a few months after Rekha Prasad opened a salary account with a leading private bank in India, her international debit card was used to pay for Uber rides in the UK. Suresh Nair could only watch in horror as small amounts of money started disappearing from his account every few minutes even though he had done nothing to trigger the debits.

Prasad and Nair lost money because data was leaked—inadvertently by them or a service provider. Every financial transaction involves multiple service providers and data may get leaked due to frictions between these entities. The weak link may be at any of the following levels—device manufacturing, device operation, telecom network that provides the SMS, banks, merchants or payment gateway provider. Hackers get their hands on the data by at tacking the weakest link.

Rekha Prasad, 33, Chennai: On starting a new job, Prasad opened a salary account with a leading private bank. Two months later, her international debit card was misused and she lost around Rs 20,000 on one Sunday. SMSes from the bank revealed that the card was used to pay Uber hires in the UK. She later realised that a fake Uber account was created using her card details. As she had not shared her card details with anyone, the bank refunded the money after a couple of months.

As users, we don’t have control on any of these links. What we can only do is take the following steps to ensure our financial data remains safe.

Don’t share OTPs or scan random QR codes
A sure-fire way to lose your money is by sharing one time passwords (OTP) with unknown entities or scanning unverified quick response (QR) codes. “QR codes need to be scanned to give money and not to receive money. Similarly, you enter an OTP when giving money and not when you have to receive money. Hence, to receive money via UPI, one does not need to scan a QR code or enter a PIN or OTP,” says Shilpi Mishra, Senior EVP, Kotak Mahindra Bank. Several fraudsters are misusing the ‘collection facility’ allowed under UPI. “A fraudster may send a collection request and ask you to approve it to receive money. You will end up losing money if you give digital consent to these kinds of trans actions,” says Topendra Bhattacharjee, Head – Digital Bank, RBL.

You should also never share an OTP while making a payment. Remember most sites, including banking sites, allow you to change passwords with OTP authentication. So by sharing the OTP you could be allowing scamsters to take control of your online banking logins.

QR code with malicious software is also emerging as a new threat. QR codes are two dimensional barcodes and contain large amount of data. “While you are paying Rs 200 by scanning a QR code, a malicious code will capture details linked to the wallet, bank account, etc that can be misused later,” says Chopra. Should you avoid scanning QR codes completely? No, but exercise caution. “Scan QR codes only with known and genuine merchants and make sure that the merchant’s name is appearing there,” says Suresh Rajagopalan, CEO, Wibmo.

Rajesh Iyer, 45, Mumbai: He put out an ad on an online classified site to sell his old television. Next day, a potential buyer contacted him and the deal was finalised at Rs 1,500. The purchaser said he would send a vehicle to pick up the TV. He took Iyer’s bank account number to transfer the money. Soon afterwards, Iyer got a message showing Rs 4,500 had been transferred into his account. The purchaser called to say he had mistakenly transferred Rs 4,500 and asked Iyer to transfer Rs 3,000 back, which he did. The buyer then failed to turn up to collect the TV. When a suspicious Iyer checked his bank account he realised that no money had been sent to him in the first place, the SMS was a fake, and instead he had been cheated of Rs 3,000.

Don’t click on that link
Before clicking on a link you check the source and ‘mouse over’ the link to see whether you are being taken to the genuine site or not right? However, that’s no longer enough. Fraudsters may send you a mail that is masked to show the sender as a genuine entity, in other words they resort to phishing. You could also get several messages that seemingly come from genuine sources, like your bank. Mouse over and checking the link is of little use due to the increased usage of tiny URL, a system that allows users to hide their long URLs. “Due to masking of ids and companies using tiny URLs, there is no fool proof way for an individual to stop the malicious links,” says Chopra from Norton.

So, what should one do? “Since it is difficult to distinguish between the correct and fake link, don’t click on any link,” says Bharat Panchal, Chief Risk Officer, India, Middle-East & Africa, FIS. Even if you have to click on any link, make sure the site opened is secured. Look out for a small lock emblem at the extreme left side of the URL before parting with any personal information. “You can also get more details by clicking on the lock icon. Ideally, you should do it every time before giving out personal information,” says Sachin Goel, EVP and CTO, Tata AIA Life Insurance.

Deregister from offers
The best way to keep frauds at bay is by updating contact details stored with your bank. However, banks and other financial institutions tend to bombard customers with regular doses of promotional mails and SMSes. By ignoring these messages, you could miss out on important messages too. The safest way out is to unsubscribe from these promotional offers. “The transactional SMS and emails are mandated by RBI and banks can’t stop these if you opt out of marketing SMS and emails,” says Panchal.

Don’t store card details
Many of us have the habit of saving debit and credit card details on several sites and apps. However, this is best avoided. “All sites are vulnerable to being attacked. As a safe practice, desist from storing card and bank details on websites. Some of these sites may also have other data about you, like phone number, address, etc. So the risk is of an attacker getting access to that data as well,” says Shivangi Nadkarni, Co-Founder and CEO, Arrka, a data privacy and cyber security company. Sometimes your data gets saved automatically. This happens when you fail to turn off the auto fill facility in your browser. Turning it off will increase inconvenience, but make your online transactions more secure.

Protect your SIM
Since banking is now at your fingertips thanks to your smartphone, protecting your SIM is important. “Twenty to 30 minutes are enough to clone a SIM. If you suddenly lose network, that is a warning sign,” says Mishra from Kotak Mahindra Bank. If you leave your SIM cards unattended, fraudsters with SIM reader / writer can clone it, use it on some other phone and receive the OTPs and other SMSes sent to you by banks. “Several banks today use device finger printing, and it will ask for additional information if both the SIM and device doesn’t match,” says Rajagopalan.

Keep the device safe
Device finger printing has increased the importance of your devices like mobiles and laptops. A device can be hacked offline or online. Offline hacking can happen if you leave the device in the hands of someone else, like leaving your mobile in a not so reputed repair shop.

Though online hacking can happen from direct attacks, most occur when you download apps or pirated movies or similar stuff from unsecured platforms. How many of us take the trouble of checking the privacy policies of apps that we download? As a rule, don’t give permission to all your data— photos, location, email, SMS, microphone, camera, etc. This can be a serious threat because banks send emails and SMSes for every transaction and any app that reads all that will know your exact banking transaction details.

Among apps, one segment in particular is turning out to be a big problem. “Gaming / casino apps are the main source of worry now because they collect details and store it outside India. Some also have the ability to read data from other apps,” says Rajagopalan. For example, Nair lost money because of the gaming apps installed on his phone by his son.

You should also be careful while sharing sensitive information using your mobile, because these shared information get stored there. “Don’t share important documents like Aadhaar, PAN, etc on WhatsApp. Please delete all details from the phone gallery also,” says Mishra.

Lock devices with antivirus software. A hacker’s life becomes easy when there is an overflow of information and we keep watching movies on our mobiles. “Since many videos, pictures and some downloaded apps may contain virus / malware, it is better to have a paid antivirus / anti malware soft ware to protect your device – especially Android,” says Dheeman Thacker, Head- Digital Banking, Ujjivan SFB.

Beware tap & pay cards
Customers need to be extra careful with tap and pay cards because there is no PIN authentication needed for it and this can create problems if the card is misplaced or stolen,” says Rajagopalan. The threat has increased ever since RBI hiked its maximum daily usage limit from Rs 2,000 to Rs 5,000 in January. Limit use of this facility or block it altogether to stay safe.

Similarly, you also need to be extra careful while transacting in a foreign country or on foreign sites. “Risk increases with foreign transactions because other than India, only few countries like Singapore have started using second factor authentication like OTP,” says Panchal. Some foreign sites also force you to save card details before making payments. “The best strategy when shop ping online is not to store card details on the merchant website. Unregister the card and delete the card details once the transaction is complete,” says Mishra.

Sudha Ramakrishnan, 29, Chennai: She clicked on a Facebook advertisement to buy some dress material. Since the site did not offer the option of cash on delivery, she paid Rs 900 using UPI. When the product failed to arrive, she called the seller, only to be told that a delivery had been made. When she protested, they offered to refund her money and asked for her bank details. They asked her to share a verification code to get the refund. As soon as she shared the OTP, Rs 10,000 disappeared from her account. Her bank refused to reimburse as she had shared the OTP.

Use new system
RBI has introduced several steps to protect bank customers. However, customers need to act on them. “Though RBI introduced positive pay from 1 January, most customers are not using it,” says Panchal. Under positive pay system, you can ask your bank now to verify details of the cheque if the amount involved is more than Rs 50,000 and this will prevent the misuse of cheque leaves. All you need to do is to inform a few details of the cheque like date, name of the payee, amount, etc to your bank electronically. As of now, positive pay system is voluntary, but RBI has allowed
banks to make it mandatory for cheques involving more than Rs 5 lakh.

Similarly, most bank customers are still not using the facilities to re strict usage of their debit and credit cards. “Keeping the cards in inactive mode or with very low transaction limits is the best strategy. Activate it or
increase limits only when you actually need it,” says Rajagopalan.

Suresh Nair, 48, Kozhikode: He holds an account with a leading multinational bank. One night he got a message showing Rs 1 had been credited to his account. After a few minutes, small amounts between Rs 300 and Rs 400 started getting debited from his account. Within no time he had lost Rs 1,700. The bank did not refund any money on the premise that his phone might have been infected with malware while downloading some apps.

Don’t ignore other data
Not just financial data, you should guard all data from misuse. “Not just financial information, people should avoid sharing any highly personal information, on social media and other public sites. Fraudsters can get hold of your details and misuse them for fraudulent activities,” says Nadkarni.

This fraud is becoming easy now due to mushrooming of online loan portals. “Since digital on boarding of any site is based on the available digital data only, someone can replicate your pro file with publicly available / leaked data and create a new account and take loans,” says Bhattacharjee of RBL.

Problems can come in other forms also. “Don’t think that cyber crime is just restricted to financial loss. For example, cyber criminals could create deep fake videos using the video you posted on social media,” says Chopra from Norton. Publicising every move is another no no. “Don’t publicise where you are through social media. It is only helping the fraudster know that you are not at home,” says Bhattacharjee.

Similarly, don’t give out family details on social media. Refrain from mentioning your date of birth and avoid revealing details that can be linked to your passwords.

If you lose money
Contact your bank immediately if you are a victim of fraud. However, this doesn’t mean that the bank will reimburse the money immediately. Liability depends on where the leakage occurred. “The bank is responsible for the illegal use of the card or if the card cloning happened in its ATM. However, the customer is responsible if the loss is because customer shared any information like OTP, CVV, password, etc,” says Panchal.

Aarif Ansari 36, Mumbai: He posted his CV on a leading job portal. After a few days, he got a call from a placement agency, which asked him to send Rs 100 to get details of a company interested in hiring him. He was sent a link, asked to click on it and share the verification code. He realised his mistake immediately when Rs 10,000 disappeared from his account. His complaint with the placement portal or bank did not yield any results.

Keep your data safe

  • Don’t carry out financial transactions from public computers or from public wifi.
  • Keep passwords as cryptic as possible.
  • Don’t write down your passwords
  • Increase the security of your device with multi-factor authentication like fingerprint or iris scan.
  • Though inconvenient, keeping a separate phone for banking is a good idea.
  • Start a separate bank account for your investments. Use separate account with small balance to carry out online transactions.



[ad_2]

CLICK HERE TO APPLY

SBI official, BFSI News, ET BFSI

[ad_1]

Read More/Less


Cyber security is critical for the success of digital banking and banks should create the infrastructure to win customers‘ trust for all such transactions, a senior SBI official said on Wednesday.

Digital banking or Figital is here to stay and is the future but it is equally important to safeguard the interests of all stakeholders, State Bank of India (SBI) Deputy Managing Director and Chief Digital Officer Ravindra Pandey said at a webinar.

“It is important to win the customers’ trust in any system. It is the objective of banks to create and win the customers’ trust, such that all transactions are routed through banks as is presently done by multiple payment apps,” Pandey was quoted as saying in a release issued by industry body PHD Chamber of Commerce & Industry.

The official said that fintech has bought about changes in the customer mindset and it is an era of techfins rather than fintech.

Digital banking has helped in enhancing customer relationship, engagement and satisfaction and reduced operating cost, processing cycle time, among others, he added.

Digital banking is thriving on artificial intelligence and technical algorithm models which help to find out the customer’s ability to pay and also the intention to pay along with credit ratings of the customer.

According to the official, conventional operating models have given way to new channels. There are three areas in fintech that needs to be intertwined to make it a success — payment and remittance; process improvement – compliance and risk management; and customer engagement –, he noted.

Sanjay Aggarwal, President of PHD Chamber of Commerce & Industry, said the banking industry is moving towards a more collaborative and open environment while focusing on data protection and minimising systemic risks.

Representatives from fintech companies, NBFCs and other financial sector also participated in the webinar.



[ad_2]

CLICK HERE TO APPLY

Dhotre, BFSI News, ET BFSI

[ad_1]

Read More/Less


Over 2.9 lakh cyber security incidents related to digital banking were reported in 2020, Parliament was informed on Thursday. As per the information reported to and tracked by Indian Computer Emergency Response Team (CERT-In), a total number of 1,59,761; 2,46,514 and 2,90,445 cyber security incidents pertaining to digital banking were reported during 2018, 2019 and 2020, respectively, Minister of State for Electronics and IT Sanjay Dhotre said in a written reply to the Rajya Sabha.

These incidents included phishing attacks, network scanning and probing, viruses and website hacking, he added.

The Minister noted that the rising popularity of non-banking financial companies (NBFCs) along with e-commerce has also expanded the scope of digital payments.

“The percentage rise in digital transactions is 46 per cent in 2020 in comparison to 2018-19,” he said.

The numbers of digital transactions have increased from 3,134 crore in the financial year (FY) 2018-19 to 4,572 crore in FY 2019-20, Dhotre added.

Responding to a separate query, the minister said the number of websites/webpages/accounts blocked stood at 9,849 in 2020.

This was 2,799 in 2018 and 3,635 in the year 2019.

He said Section 69A of the IT Act empowers the government to block any information generated, transmitted, received, stored or hosted in any computer resource in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign states or public order.

In response to another question, Dhotre said 6,233 cases were registered in 2019 under fraud and cheating (involving communication devices as medium/ target as per Information Technology Act 2000), as per National Crime Records Bureau (NCRB) data.

“As per NCRB, number of cases registered under fraud and cheating (involving communication devices as medium/ target as per IT Act 2000) for cyber crimes are 3,466, 3,353, 6,233 during the year 2017, 2018 and 2019, respectively,” he added.



[ad_2]

CLICK HERE TO APPLY