Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/23/2010
03:43 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Credit Union Offers Mobile Banking Security Tips

Mobile banking is essentially safe, but fraud is on the rise, so consumers need to be aware

San Jose, CA (March 23, 2010) - The widespread use of mobile banking means more convenience for consumers and offers better ways to monitor account activity. Unfortunately, it also means there are more opportunities for consumer fraud, says Technology Credit Union, a Silicon Valley credit union that has served the financial needs of high tech professionals for 50 years and is an industry leader in online and mobile banking technology.

Credit unions and banks across the country employ multiple forms of identification authentication, log-in procedures and encrypted communications to make sure cyber criminals can't access confidential banking information while consumers are using a mobile banking application. However, the biggest threat to mobile security isn't the technology; it's the fact that many consumers are ignorant of the many fraudulent applications that exist online and on mobile platforms.

"Fraudsters know that the key to their success lies in the consumer," said Victor Smilgys, Tech CU's AVP of eCommerce and a mobile banking security expert, "so they are being very crafty in their approach to making the consumer believe an app is harmless and, in some cases, disguising it as a security safeguard. Better education is the key to minimizing these risks."

Though no specific data exists on the prevalence of mobile banking fraud, The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), says that cyber-crime complaints in general have increased significantly over the past year. The IC3 has received 22.3 percent more complaints in 2009 than in 2008 for a total loss of $559.7 million (up from $265 million in 2008) all linked to online fraud.

Consumers can significantly minimize the risk of fraud and help protect their identity while using mobile banking services by following these common-sense tips offered by Technology Credit Union.

TECH CU'S CONSUMER TIPS FOR MOBILE BANKING SECURITY

-Password-protect your mobile device and lock your device when it's not in use. Keep your mobile device in a safe location.

-Frequently delete text messages from your financial institution on your mobile device, especially if they contain sensitive information.

-Never disclose personal information about your accounts via a text message, i.e. account numbers, passwords, or any combination of information that can be used to steal your identity.

-If you change your mobile number or lose your mobile phone, immediately contact your financial institution to change the details of your mobile banking profile.

-Do not hack or modify your device, as this will leave it susceptible to infection from a virus or Trojan.

-When possible, install mobile security software on your device (if it's available). Some mobile security solutions include: AhnLab Mobile Security, avast! PDA Edition, Kaspersky Mobile Security, and Norton Smartphone Security.

-Be aware that malware exists and fraudulent applications will continue to pop up. Don't download applications onto your phone without checking them out first. Verify the legitimacy of an application with your financial institution before downloading it to your smartphone - verify that the app publisher or seller is your financial institution, or if possible, go through your financial institution's web site to download the application.

-Report any banking application that appears to be malicious to your financial institution right away.

-Monitor your financial records and accounts on a regular basis and consider having electronic alerts on account activity sent to your email or mobile device. Regularly review your statements with online banking. This will enable you to spot any suspicious activity

If you have been a victim of identity theft, contact your financial institution immediately. You should also place a fraud alert on your credit report and continue to review your credit reports, close the accounts that you know (or believe) have been tampered with or opened fraudulently, and file a complaint with the Federal Trade Commission (FTC). Go to www.ftccomplaintassistant.gov for more information.

Finally, Smilgys points out that using mobile banking can actually help deter some fraud because it gives a person an easy way to check their account on a regular basis and notify their credit union or bank more quickly if they see suspicious activity.

ABOUT TECHNOLOGY CREDIT UNION Technology Credit Union is a full-service financial institution serving and high tech professionals and their families who work, live or study in Santa Clara, Alameda, Contra Costa, Santa Cruz, San Mateo and San Francisco counties. First established in 1960, Tech CU is now among the top 1 percent of the nation's largest credit unions. It is recognized as one of the best managed and strongest financial institutions in the country, as indicated by Tech CU's 5-star rating from Bauer Financial, the nation's largest independent rating service for banks and credit unions. With more than 77,000 members, over $1.3 billion in assets and 10 full-service branches around the Bay Area, Tech CU is a leader in the credit union industry. For more information, visit www.TechCU.com.

CONTACT INFORMATION: Tawnya Lancaster Public Relations Phone: 408-205-1618 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27581
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-28042
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
CVE-2021-28041
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2021-3377
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
CVE-2021-3420
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.