{"id":75790,"date":"2013-05-22T14:22:51","date_gmt":"2013-05-22T08:52:51","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=75790"},"modified":"2013-05-22T14:22:51","modified_gmt":"2013-05-22T08:52:51","slug":"know-the-risks-of-using-atm-and-online-banking","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/know-the-risks-of-using-atm-and-online-banking\/","title":{"rendered":"Know the Risks of Using ATM and Online Banking"},"content":{"rendered":"<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\">As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take.<\/span><\/p>\n<p><span style=\"font-family: Calibri,sans-serif;\"><b>Risks Involved with ATMs<\/b><\/span><span style=\"font-family: Calibri,sans-serif;\"><b><br \/>\n<\/b><\/span><span style=\"font-family: Calibri,sans-serif;\">The greatest security risk of using an ATM is falling prey to &#8220;card skimming&#8221;. It is an illegal activity carried out by criminals to obtain the data embedded in the magnetic strip of credit or debit cards that are used in ATMs. You can read more on card skimming, and get some important security tips <a href=\"https:\/\/blogs.quickheal.com\/stay-clear-of-skimmers-when-using-atms-2\/\" target=\"_blank\">here<\/a><\/span><span style=\"font-family: Calibri,sans-serif;\">.<\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><b>Risks Involved with Online Banking<\/b><\/span><\/p>\n<p lang=\"en-GB\" style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/fake-website.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-75791 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/fake-website-280x300.jpg\" alt=\"fake-website\" width=\"280\" height=\"300\" \/><\/a><\/p>\n<p lang=\"en-GB\" style=\"text-align: center;\">Fake ICICI Bank website<\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><span style=\"text-decoration: underline;\">Phishing Scam<br \/>\n<\/span>A phishing scam involves sending emails to a target. The emails are skilfully designed to look like a genuine communication from a trustworthy entity &#8211; in this case, a bank. Such emails contain links to websites that almost appear as the customer&#8217;s bank&#8217;s website. Once the user lands on the fraudulent website, they are asked for their bank account details.<\/span><\/span><\/p>\n<p lang=\"en-GB\" style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/phishing-email.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-75792 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/phishing-email-300x177.jpg\" alt=\"phishing-email\" width=\"300\" height=\"177\" \/><\/a><\/p>\n<p lang=\"en-GB\" style=\"text-align: center;\">Phishing email<\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><span style=\"text-decoration: underline;\">Pharming<br \/>\n<\/span>Pharming is a type of phishing activity, where, even if a user types in the correct URL of their bank&#8217;s website, they get redirected to a fake website, that looks identical to the legitimate one. In short, pharming is a method that an attacker uses to hijack a bank&#8217;s URL.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><span style=\"text-decoration: underline;\">Key Logging<br \/>\n<\/span>If you usually carry out online banking in a public network like cyber cafes, then you are risking yourself to keylogging. Keylogging is a method of capturing the keyboard keys you strike during your online activity. With this data, it is not difficult for criminals to track your online banking details, and use the info to make illegal transactions.<\/span><\/span><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/hardware-keylogger.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-75796 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/05\/hardware-keylogger.jpg\" alt=\"A hardware-keylogger\" width=\"250\" height=\"243\" \/><\/a><\/p>\n<p style=\"text-align: center;\">A hardware keylogger<\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><span style=\"text-decoration: underline;\">Man-in-the-Browser Attack <\/span><\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\">The man-in-the-browser (MitB) is a Trojan horse. Once this malware infects your system, it sits dormant in your system&#8217;s browser. When you visit a banking site, the malware gets activated and displays a fake login page (similar to the login page of your bank). The fake page will ask for your bank credentials and other security information. Providing all these details will let the attacker hijack your bank account, and change the destination account you are transferring your money to, and even the amount. The hijacker can also modify and adjust transactions so that you do not sense any changes in your account.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><b>Some Online Banking Safety Tips:<\/b><\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>1<\/strong>. Always do online banking from a secured connection at home. Avoid doing it from a cyber cafe, a shared computer, or over an unsecured Wi-Fi network.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>2<\/strong>. Always look for the \u201cpadlock\u201d icon in the window of the browser (it won&#8217;t be present in the web page itself). Also, ensure that the URL of the bank&#8217;s website begins with \u201chttps\u201d. Both these things indicate that you are on a secure website.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>3<\/strong>. Change your banking password regularly, and do not keep one common password for multiple online banking accounts.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>4<\/strong>. Monitor your bank account on a regular basis.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>5<\/strong>. Always remember to LOGOUT from your bank&#8217;s website, once your work is done.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>6<\/strong>. Avoid clicking external links in mails or elsewhere, which offers to take you to your bank&#8217;s website.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>7<\/strong>. It is a good practice to check your last login history, whenever you login to your bank&#8217;s website.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>8<\/strong>. Consider using the virtual keyboard while entering your banking password. Taking this security measure significantly reduces the risk of keylogging. Alternatively, you can also make use of the Onscreen Keyboard, which is freely available in PC and Mac.<\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\"><strong>9<\/strong>. If you are using a mobile banking application, then be certain that it has been downloaded from your bank&#8217;s website and not from any other source. It is also essential that you review the permissions of the application. <\/span><\/span><\/p>\n<p lang=\"en-GB\"><span style=\"font-family: Calibri,sans-serif;\"><span style=\"font-size: medium;\">To conclude, always employ a reliable antivirus and ensure that the software is up-to-date so that you can keep your system, and other crucial details safe and secure.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take. Risks Involved with ATMs The greatest security risk of using an [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,21,133,300,151,303,293],"tags":[325,326,327,328,329,330],"class_list":["post-75790","post","type-post","status-publish","format-standard","hentry","category-cyber-crime","category-email","category-hacker","category-online-hoaxes","category-password","category-phishing","category-spam","tag-atm-security-threats","tag-card-skimming","tag-key-logging","tag-man-in-the-browser-attack","tag-pharming","tag-safe-online-banking"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75790"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=75790"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/75790\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=75790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=75790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=75790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}