123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Use Of Sms Tokens For Validating Third Party Payments Make Mobile Phones Vulnerable To Attacks

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Increasing number of banks are adopting the practice to send authentication tokens through short message service (SMS) to their customers for validating third party payments. Bank customers are required to enter the security token number to complete third party payments through Internet banking. If customers choose not to use the number, than they have to use other channels of banking to make payments to third parties. When a customer selects third party payment on an online banking site, the concerned bank sends a SMS token - with unique numerical codes to the customer, which has to be entered on the net banking site to complete the payment. While the approach complements the requirement to reenter authentication details on the website to validate payments, also makes mobile phones vulnerable to hacking attacks. Recently, security firm RSA has cautioned that offenders may attempt to intercept the SMS messages and increase attacks on mobile phones.

While the SMS tokens have introduced an additional layer of security, they may encourage criminals to launch denial-of-service attacks on the mobile phones to disrupt its ...
... use by customers. Attackers may also intercept the message during transmission from bank to customer and forward it to their own mobile device. RSA has also warned against increased smishing attacks, the mobile variant of phishing attacks. The growth of mobile banking also makes mobile devices soft target for attacks. While spear phishing attacks are replacing phishing attacks on e-mail, mobile phones may face increase number of spam messages and smishing attacks. Online computer training programs may help users in understanding the possible sophisticated threats in the e-banking environment and help in conducting secure transactions.

Usually, manufacturers avail the services of ethical hacker certified experts to explore and identify the vulnerabilities in devices and applications. Banking organizations may work with stakeholders such as manufactures, software developers, telecom companies, regulatory agencies and IT security firms to ensure safe transmission of information.

IT personnel holding security certifications can help banks in improving the IT security apparatus and ensure safe banking experience for customers. While banks are now providing security tips and information related to threats to customers, they may also create awareness through online video programs and case studies to ensure adherence to safety precautions and practices.

Total Views: 285Word Count: 375See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: