Tuesday, 03.19.2024, 6:40 AM

Ethical Hacking - By Chintan Gurjar

Site menu
Calendar
«  January 2011  »
SuMoTuWeThFrSa
      1
2345678
9101112131415
16171819202122
23242526272829
3031
Our poll
Rate my site
Total of answers: 171

Main » 2011 » January » 19

As we all know that wireless applications have numbers of vulnerabilities higher then the wired applications and the devices.
In India there are not lots of people who do banking through mobile but outside India there are high profile countries in which many people do banking through mobile only.So the assurance of the security is needed for them.

Here are some recommandation that the bank and the financial institutions which to be noted and to be implemented in their system.

- Implement 2 way and 2 factor authentication which goes with the traditional username and the password.If username and password are compromised, the attacker still needs the second factor to gain access to an account.

- Implement high transaction monitoring and also fraud detection system.If hacker passes the 1st factor of authentication or ... Read more »
Views: 6323 | Added by: handsome_devil | Date: 01.19.2011 | Comments (0)