On September 24, 2018, the clients of three major Czech banks received a major hit by a mobile malware and have money from their bank accounts stolen. What happened with the QRecorder malware? (updated version)
Innovations on Banking - Digital Banking Security in the Age of Open BankingPetr Dvorak
With PSD2, 3rd party providers are given an access to bank accounts and even have an ability to initiate payments. As a result, banks need to revise their approach to digital channel security and invest in new categories of security solutions. During the talk, we will present an overview of existing security components for digital banking that will help you harden your system security and comply with SCA under PSD2.
out line of this Presentation.
Elaboration of Mobile banking.
What is the Mobile banking.
How to connect with Mobile banking.
Features & Benefits of Mobile banking.
Advantages & Disadvantages of M-banking
Mobile banking in world.
Mobile banking in sri lanka.
Innovations on Banking - Digital Banking Security in the Age of Open BankingPetr Dvorak
With PSD2, 3rd party providers are given an access to bank accounts and even have an ability to initiate payments. As a result, banks need to revise their approach to digital channel security and invest in new categories of security solutions. During the talk, we will present an overview of existing security components for digital banking that will help you harden your system security and comply with SCA under PSD2.
out line of this Presentation.
Elaboration of Mobile banking.
What is the Mobile banking.
How to connect with Mobile banking.
Features & Benefits of Mobile banking.
Advantages & Disadvantages of M-banking
Mobile banking in world.
Mobile banking in sri lanka.
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...BlueHornet
Presented by BlueHornet’s Director of Product Management, Manny Ju, this webinar will introduce you to the concept of the mobile wallet and how it’s affecting email marketing programs, including:
- Emerging trends in the mobile/digital wallet space
- Why early adoption of the digital wallet is a strong indicator of brand loyalty
- How wallets, like Apple’s Passbook, mean incremental revenue for email marketers
Introduction
Technology in the banks is presently catching up with a high level of development around the world. The gaps between the Indian banks and their counterparts in the technologically advanced countries are gradually narrowing down. The world has witnessed an information and technological revolution of late. This revolution has touched every aspect of public life including banking (Siam, 2006). Since two decades, due to an increasingly competitive, saturated and dynamic business environment, retail banks in many countries have adopted customer-driven philosophies to address the rapid and changing needs of their customers (Walker et al., 2008). Technological advances have changed the world radically, altering the manner in which individuals conduct their personal and business affairs. Over the past two decades in particular, the banking industry has invested substantial resources in bringing ICT to customers.
The banking industry is undergoing through the significant technological changes; it has several impacts on customer satisfaction and loyalty. ―It has revolutionised every industry including banking in the world by rendering faster and cost effective delivery of products and services to the customers. According to Chakrabarty, (2007) core banking solution enables banks to extend the full benefits of ATM, tele-banking, mobile banking, internet banking, card banking and other multiple delivery channels to all customers allowing banks to offer a multitude of customer-centric services on a 24x7 basis from a single location, supporting retail as well as corporate banking activities.
Now, Indian banks are investing heavily in the technologies such as branch automation and computerization, core banking, tele-banking, mobile banking (M-banking), internet banking, automated teller machine (ATMs), data warehousing etc. ICT innovations in the previous few years have changed the landscape of banks in India (Mittal and Dhingra, 2007; Kour and Kour, 2011). Today public sector and private sector banks are offering online banking services. Various alternative channels to provide easy and any where banking are properly thought of. The process of bank computerization was started since 1985 in public sector banks in India. However, some private sector banks have started computerization prior to the public sector banks in India. The banks in India are using ICT not only to improve their own internal processes but also to increase facilities and services to their customers.
Έφη Πρεσβεία, Επικεφαλής Επιχειρηματικής Μονάδας Ηλεκτρονικού Επιχειρείν, Eur...Starttech Ventures
Oμιλία από την Έφη Πρεσβεία, Επικεφαλής Επιχειρηματικής Μονάδας Ηλεκτρονικού Επιχειρείν, Eurobank στο πλαίσιο του Digital Finance Forum 2016
Περισσότερες πληροφορίες: http://digitalfinance.ethosevents.eu/
The BFS industry track touched upon analyze and digitize as themes. Included "Achieving Data Leadership & Deeper Timely Insights" and "mPayments" as two areas for customer talks, points of view and panel discussions. Chaired by M.V. Ramana Murthy, VP & Head, BFS, TCS
mBank - the most design-driven digital bank in the world - NetFinance, Miami ...Nordea
Most recent update on mBank - the most design-driven digital bank in the world.
Deck presented at NetFinance in Miami in April 2014.
6 global innovation awards (Finovate, Efma, Bank Innovation 2014, Celent's Model Bank 2014). Coverage by Forrester Research, TechCrunch, Harvard Business Review, WSJ, American Banker and more...
Mobile Banking Security Risks and Consequences iovation2015TransUnion
View the recorded presentation: https://www.iovation.com/resources/webinars/mobile-banking-security-risks-consequences
Gain insight into the evolution of mobile banking and the risks that accompany this business channel.
BlueHornet Webinar: The Rise of the Digital Wallet - New Opportunities for Em...BlueHornet
Presented by BlueHornet’s Director of Product Management, Manny Ju, this webinar will introduce you to the concept of the mobile wallet and how it’s affecting email marketing programs, including:
- Emerging trends in the mobile/digital wallet space
- Why early adoption of the digital wallet is a strong indicator of brand loyalty
- How wallets, like Apple’s Passbook, mean incremental revenue for email marketers
Introduction
Technology in the banks is presently catching up with a high level of development around the world. The gaps between the Indian banks and their counterparts in the technologically advanced countries are gradually narrowing down. The world has witnessed an information and technological revolution of late. This revolution has touched every aspect of public life including banking (Siam, 2006). Since two decades, due to an increasingly competitive, saturated and dynamic business environment, retail banks in many countries have adopted customer-driven philosophies to address the rapid and changing needs of their customers (Walker et al., 2008). Technological advances have changed the world radically, altering the manner in which individuals conduct their personal and business affairs. Over the past two decades in particular, the banking industry has invested substantial resources in bringing ICT to customers.
The banking industry is undergoing through the significant technological changes; it has several impacts on customer satisfaction and loyalty. ―It has revolutionised every industry including banking in the world by rendering faster and cost effective delivery of products and services to the customers. According to Chakrabarty, (2007) core banking solution enables banks to extend the full benefits of ATM, tele-banking, mobile banking, internet banking, card banking and other multiple delivery channels to all customers allowing banks to offer a multitude of customer-centric services on a 24x7 basis from a single location, supporting retail as well as corporate banking activities.
Now, Indian banks are investing heavily in the technologies such as branch automation and computerization, core banking, tele-banking, mobile banking (M-banking), internet banking, automated teller machine (ATMs), data warehousing etc. ICT innovations in the previous few years have changed the landscape of banks in India (Mittal and Dhingra, 2007; Kour and Kour, 2011). Today public sector and private sector banks are offering online banking services. Various alternative channels to provide easy and any where banking are properly thought of. The process of bank computerization was started since 1985 in public sector banks in India. However, some private sector banks have started computerization prior to the public sector banks in India. The banks in India are using ICT not only to improve their own internal processes but also to increase facilities and services to their customers.
Έφη Πρεσβεία, Επικεφαλής Επιχειρηματικής Μονάδας Ηλεκτρονικού Επιχειρείν, Eur...Starttech Ventures
Oμιλία από την Έφη Πρεσβεία, Επικεφαλής Επιχειρηματικής Μονάδας Ηλεκτρονικού Επιχειρείν, Eurobank στο πλαίσιο του Digital Finance Forum 2016
Περισσότερες πληροφορίες: http://digitalfinance.ethosevents.eu/
The BFS industry track touched upon analyze and digitize as themes. Included "Achieving Data Leadership & Deeper Timely Insights" and "mPayments" as two areas for customer talks, points of view and panel discussions. Chaired by M.V. Ramana Murthy, VP & Head, BFS, TCS
mBank - the most design-driven digital bank in the world - NetFinance, Miami ...Nordea
Most recent update on mBank - the most design-driven digital bank in the world.
Deck presented at NetFinance in Miami in April 2014.
6 global innovation awards (Finovate, Efma, Bank Innovation 2014, Celent's Model Bank 2014). Coverage by Forrester Research, TechCrunch, Harvard Business Review, WSJ, American Banker and more...
Mobile Banking Security Risks and Consequences iovation2015TransUnion
View the recorded presentation: https://www.iovation.com/resources/webinars/mobile-banking-security-risks-consequences
Gain insight into the evolution of mobile banking and the risks that accompany this business channel.
Customers crave the convenience of being able to use their mobile phones to make transactions, but security concerns may be impeding adoption and business growth. In our 2014 Views of Consumers on Electronic Fraud survey 53% of respondents cited security concerns as a deterrent to mobile banking. With the rapid rise of alternative mobile payment options, protecting your mobile channel is no longer just a security department problem, but a real business growth priority.
In this webinar you will learn:
- New and cutting-edge threats targeting mobile devices
- The role of mobile in accelerating faster payments, improving customer retention and generating cross-selling opportunities
- How rogue applications are created, distributed and used to carry out fraud
- Security approaches to grow your business without impeding the mobile experience
Watch the replay here: http://www.easysol.net/resources-mobile-security-strategies-to-grow-your-business
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
Honeypot is used for botnet analysis, traffic capturing and revealing C&C hostnames. It’s also used for detecting subscribers with infected devices and monitoring malware activities like funds withdrawal and remote control.
Mobile phones are a quintessential part of our lives; they keep us connected with friends and family and make our lives more convenient every day. As the global Covid-19 pandemic encouraged people to remain safely indoors, there was a large increase in the number of Mobile Banking users. From depositing checks remotely to having 24*7 access to your bank account, the convenience and the utility of Mobile Banking are the reasons behind this popularity. And yet many people still wonder if Mobile Banking is Safe. If you are someone who is undecided about adopting Mobile Banking because of concerns about the security of Mobile Banking then here is the answer to your question ‘Are Mobile Banking Apps really safe?’ covered in this article. The best way to do this is to look at the risks involved with Mobile Banking and what organizations and customers can do about it.
ID cuffs: Hackers targeting international travelersdenniskelly315
A luxury vacation to sunny climes should be worry free, right But, recent reports from the FBI and other government agencies warn international travelers against using hotel internet site access without precautions The FBI says that malicious actors are targeting travelers abroad via pop up windows while establishing an Internet connection in their hotel rooms Travelers in the continental U S have not been identified as at risk groups to date With everyone from LinkedIn to GoDaddy being hacked lately, it s no surprise.
As most people are aware, there has been an expansion in mobile banking applications in recent years. The Czech Republic is no exception to this, as nearly all banks have developed a mobile application for their modern mobile operating systems. Although different banks solve their security concepts in different ways, it is possible to discuss typical situations and problems that inevitably appear while designing mobile banking applications.
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
This presentation covers:
- Why today’s Retail POS systems are at risk
- How using relatively simple techniques, cyber criminals get onto retailer networks and POS machines
- How POS malware works in capturing credit card data
- How antiquated security architectures and technology put retailers and customers at risk
- How good security architecture and advanced threat protection tools can defeat these attacks before data is breached.
- How to recognize outdated vulnerable POS endpoints that might expose you to credit card fraud
mDevCamp 2016 - Zingly, or how to design multi-banking appPetr Dvorak
What problems do you need to deal with when designing an app for multiple banks? How do you solve a security of such apps? And how about a user interface design and application structure? What technologies are under the hood? And what does Zingly bring to you?
Webinář je k dispozici ke shlédnutí zde: https://www.youtube.com/watch?v=M4e34Zs6AKM
Jak by mělo vypadat ideální bankovní API? Zeptali jsme se vývojářů na základě zadání z bank a výsledky dotazníku pro vás zpracovali.
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíPetr Dvorak
O bezpečnosti mobilního bankovnictví se toho již řeklo mnoho. Je ale možné tyto poznatky přenést na multi-banking aplikace (aplikace, které umí spravovat více bank současně)? Na přednášce ukážu, jaké nové a dosud neřešené problémy multi-banking aplikace (a otevřená bankovní API) přináší například v oblasti autentizace či ochrany osobních dat, ale hlavně to, jak takové aplikace udělat bezpečně a současně pohodlně z pohledu koncového uživatele.
Záznam webináře: https://www.youtube.com/watch?v=Fh-cOjgpT3Q
U nás je otevřené bankovní API novinkou. Ale jak je to ve světě? Kde už otevřená bankovní API dávno fungují a jak vypadají? Dozvíte se v dalším bleskovém webináři...
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePetr Dvorak
Záznam webináře: https://www.youtube.com/watch?v=RKgbUgIl6kE
PSD2 a otevřená bankovní API začala být žhavým tématem. Jaké jsou nejčastější informační šumy a které nesprávné interpretace toho, co se děje, ještě uslyšíte? Dozvíte se v tomto bleskovém webináři.
Představení Zingly API Serveru a popis integracePetr Dvorak
Záznam webináře: https://www.youtube.com/watch?v=u6c-fYGAMQc
PSD2 a veřejné bankovní API? Banka této legislativě může vyhovět během pár dní s téměř nulovými náklady pomocí open-source Zingly API Serveru. Jak Zingly API Server funguje a jak složité je ho nasadit? Dozvíte se v tomto webináři.
Lime - PowerAuth 2.0 and mobile QRToken introductionPetr Dvorak
PowerAuth 2.0 is an open-source solution for authentication, end-to-end encryption and secure storage for mobile banking. QRToken is a mobile token built on top of the PowerAuth 2.0 cryptography protocol.
Lime - Push notifications. The big way.Petr Dvorak
How to properly implement mobile push notifications and how to scale them big? What technologies and infrastructure is needed? Check out these slides from #mDevTalk by Avast, Etnetera and Ackee to find out.
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Petr Dvorak
Videozáznam webináře je dostupný zde: https://www.youtube.com/watch?v=ASQl8fMYAP8
Proč banky nezkrachují poté, co vystaví otevřená bankovní API? Jaký bude mít dopad legislativa PSD2 na fungování současných bankovních kanálů? Jaký je obchodní model a kdo je cílová skupina aplikace Zingly? Proč by si měl uživatel instalovat multi-banking aplikaci?
Co musí banka udělat pro zapojení do Zingly?Petr Dvorak
Záznam webináře je k dispozici zde: https://www.youtube.com/watch?v=3v02Zd_W0PM
Co musí banka udělat pro to, aby se mohla zapojit do multi-bankingu Zingly? Ukážeme, že to není tak složité, a že náklady na nasazení potřebné infrastruktury nepřesahují několik jednotek dní práce.
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Petr Dvorak
Záznam webináře: https://www.youtube.com/watch?v=dwkjgkJBz6I
Proč je Zingly bezpečnější, než klasické mobilní či internetové bankovnictví? Co je to PowerAuth 2.0 a jak funguje pod pokličkou? Dozvíte se, včetně kryptografických detailů, které jste snad ani vědět nechtěli...
Zingly is a multi-banking app for European banking - think of it as a Venmo for the Europe. An easy to use mobile app makes payments simpler than ever before, regardless of a bank you have.
Zingly uses a super secure open-source PowerAuth 2.0 protocol for authentication and transaction signing, so that user money is extra safe.
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Petr Dvorak
Technologie iBeacon přináší zcela nové příležitosti tvůrcům aplikací pro chytrá zařízení. Umožňuje totiž, aby tyto aplikace lépe porozumněly situaci, ve které se nachází jejich uživatel, a podle toho jednaly. Aplikace tak mohou zobrazovat kontextově relevantní obsah a aktivně na něj uživatele upozornit jakmile se ocitne v místě, kde to dává největší smysl. Přímočaré využití tak iBeacon nachází například v “proximity marketingu” nebo při sběru cenných dat o pohybu zákazníků v rámci prodejny, či třeba jen v automatizaci a zrychlení činností, které si aplikace může dovodit z okolního kontextu.
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Petr Dvorak
Ukážu vám, co je to iBeacon a jak jej vaše společnost může využít pro různé účely, ať se jedná o propagaci značky nebo o zjednodušení života vašich klientů.
Dozvíte se například:
- Co je to iBeacon a jak funguje
- Jak je iBeacon podporován na straně mobilních zařízení
- Jaké existují alternativy k iBeacon
- Případové studie použití iBeacon ze zahraničí
- Jak můžete s iBeacon bez nutnosti vysokých nákladů začít vy
Podíl chytrých mobilních telefonů v ČR v první polovině roku 2015 byl necelých 45%, rozdělení platforem pro jednotlivé operátory vyznívá jasně - Android vede s drtivými 81,6% následovaný iOS s 11,2% a Windows Phone s 5,5%.
Virtual beacons are a budget friendly alternative to physical beacons, such as iBeacon or Eddystone beacons. They work using the location services on mobile or wearable devices - virtual beacon is tied to a GPS coordinate with given range, which is less accurate than with physical beacons (approx. 200m).
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
Technologie iBeacon přináší zcela nové příležitosti tvůrcům aplikací pro iOS. Umožňuje totiž to, aby mobilní aplikace lépe rozumněly kontextu, ve kterém se nachází jejich uživatel. Aplikace tak mohou zobrazovat více relevantní obsah nebo urychlit akce, které v dané situaci dávají největší smysl. Na přednášce si ukážeme, jak se s technologií iBeacon programuje na platformě iOS, podíváme se na vychytávky v Estimote SDK pro iOS, a představíme si platformu Lime pro rychlou tvorbu context-aware aplikací.
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
Technologie iBeacon přináší zcela nové příležitosti tvůrcům aplikací pro iOS. Umožňuje totiž to, aby mobilní aplikace lépe rozumněly kontextu, ve kterém se nachází jejich uživatel.
Aplikace tak mohou zobrazovat kontextově relevantní obsah nebo urychlit akce, které v dané situaci dávají největší smysl. Na přednášce si ukážeme, jak se s technologií iBeacon programuje na platformě iOS, podíváme se na vychytávky v Estimote SDK pro iOS, a představíme si platformu Lime pro rychlou tvorbu context-aware aplikací.
Internet of Things as a Leading Trend for 2015 - Examples for Personal UsePetr Dvorak
Couple useful examples of the Internet of Things devices for a personal use. The brief introduction to the subject is followed by over 20 real world and already purchasable examples, from wearables to personal EEGs and DIY kits.
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
when will pi network coin be available on crypto exchange.DOT TECH
There is no set date for when Pi coins will enter the market.
However, the developers are working hard to get them released as soon as possible.
Once they are available, users will be able to exchange other cryptocurrencies for Pi coins on designated exchanges.
But for now the only way to sell your pi coins is through verified pi vendor.
Here is the telegram contact of my personal pi vendor
@Pi_vendor_247
how can I sell pi coins after successfully completing KYCDOT TECH
Pi coins is not launched yet in any exchange 💱 this means it's not swappable, the current pi displaying on coin market cap is the iou version of pi. And you can learn all about that on my previous post.
RIGHT NOW THE ONLY WAY you can sell pi coins is through verified pi merchants. A pi merchant is someone who buys pi coins and resell them to exchanges and crypto whales. Looking forward to hold massive quantities of pi coins before the mainnet launch.
This is because pi network is not doing any pre-sale or ico offerings, the only way to get my coins is from buying from miners. So a merchant facilitates the transactions between the miners and these exchanges holding pi.
I and my friends has sold more than 6000 pi coins successfully with this method. I will be happy to share the contact of my personal pi merchant. The one i trade with, if you have your own merchant you can trade with them. For those who are new.
Message: @Pi_vendor_247 on telegram.
I wouldn't advise you selling all percentage of the pi coins. Leave at least a before so its a win win during open mainnet. Have a nice day pioneers ♥️
#kyc #mainnet #picoins #pi #sellpi #piwallet
#pinetwork
How Does CRISIL Evaluate Lenders in India for Credit RatingsShaheen Kumar
CRISIL evaluates lenders in India by analyzing financial performance, loan portfolio quality, risk management practices, capital adequacy, market position, and adherence to regulatory requirements. This comprehensive assessment ensures a thorough evaluation of creditworthiness and financial strength. Each criterion is meticulously examined to provide credible and reliable ratings.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
how to sell pi coins effectively (from 50 - 100k pi)DOT TECH
Anywhere in the world, including Africa, America, and Europe, you can sell Pi Network Coins online and receive cash through online payment options.
Pi has not yet been launched on any exchange because we are currently using the confined Mainnet. The planned launch date for Pi is June 28, 2026.
Reselling to investors who want to hold until the mainnet launch in 2026 is currently the sole way to sell.
Consequently, right now. All you need to do is select the right pi network provider.
Who is a pi merchant?
An individual who buys coins from miners on the pi network and resells them to investors hoping to hang onto them until the mainnet is launched is known as a pi merchant.
debuts.
I'll provide you the Telegram username
@Pi_vendor_247
3. What happened?
• Several clients of the Czech banks reported losing money from their
bank accounts.
• In total, "high tens of thousands" of US dollars were lost.
• About 10 000 user might be affected by the malware.
• The users had their Android smartphone infected with mobile
malware, Eset was the first to report it.
• The police are currently investigating the incident.
5. More info about the malware
• QRecorder: A repackaged app for a phone call recording.
• Distributed via Google Play, which is a regular channel.
• Activated via a remote update in the right moment. Internally, the
"Spy.Banker.AIX" malware core was used.
• Tailor-made for specific banks. It was able to bypass the additional
security measures designed by the banks.
6.
7. What was the principle of this attack?
• The attack was in principle a clever "overlay attack."
• The malware was placing an overlay over the regular banking app. It
requested sensitive information from the user, pretending a regular
mobile app is requesting the info.
• After gathering a sufficient amount of the private information, it
intercepted SMS OTP sent via bank and took full control over the
bank account.
8. What can banks do?
• Invest in App Shielding / RASP technologies to protect their mobile
banking apps from overlay attacks and other sophisticated runtime
attacks. Learn more →
• Be ready and respond fast in the case a similar threat emerges
again.
• Educate customers, though it would not help in this case, the
customers did everything right.
9. What can app users do?
• Uninstall the QReader app, in case they have it on their smartphone!
• Install a mobile anti-virus solution. Learn more →
• Be alert to changes of behavior of their mobile banking app.
• Never enter any credentials intended for the Internet banking into
the mobile banking app or any other system than the Internet
banking.