[73245] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Phishing (Was Re: WashingtonPost computer security stories)

daemon@ATHENA.MIT.EDU (Michael.Dillon@radianz.com)
Tue Aug 17 09:17:59 2004

In-Reply-To: <200408171205.IAA30140@sigma.nrk.com>
To: nanog@merit.edu
From: Michael.Dillon@radianz.com
Date: Tue, 17 Aug 2004 14:13:26 +0100
Errors-To: owner-nanog-outgoing@merit.edu


> I wonder if the banks have ever considered how they have
> contributed to the problem. If their pages were straight
> up, no pop-up's, no JavaVirus, etc.... it would be far easier
> to tell their customers:
> 
> ==============================================================
>    Here is what our page looks like:

> But of course, that would not be glitzy enough....

My bank does pretty much what you suggest. Have a look  here
https://ibank.barclays.co.uk/fp/1_2c/online/1,26806,logon,00.html
and if that link has timed out or something, just go here
https://ibank.barclays.co.uk/
and click the Log-in button.

Barclays also uses a "memorable word" in addition to
the PIN code. They repeatedly tell us that no-one
from Barclays will ever ask us to reveal this
memorable word. It's only use is for a simple 
challenge-response where the website asks for
two specific letters from the word and we select
them from drop-down boxes to defeat keyloggers.
Nice example of layered security that keeps the
criminals snapping at the heels of the guy next
door, i.e. CitiBank et al.

--Michael Dillon


home help back first fref pref prev next nref lref last post