Welcome!

News Feed Item

Banking Websites Pose Easy Target for Malicious WIFI Hotspots

AACHEN, GERMANY and BOSTON, MA -- (Marketwired) -- 05/29/14 -- Recent studies in the Netherlands showed that consumers who are sending Internet banking transactions through a malicious WIFI hotspot could be easily manipulated if the SSL security is switched off during communication. For only $100 cyber criminals can buy a malicious WIFI router, which will give them access to any data sent through the hotspot in order to intercept passwords and to manipulate payment transactions.

Today every large city has hundreds of WIFI hotspots available, free to access and easy to use but it's very difficult or even impossible to identify whether a WIFI hotspot is malicious or not. To solve the problem of disabling the SSL security, most Dutch banks and web browsers are now supporting the new HTTP Strict Transport Security (HSTS) protocol to ensure that the communication security between the consumer and the bank is guaranteed. The problem however is that not all browsers, like the current Microsoft Internet Explorer version, are supporting the new web security standard.

The security leak is very serious according to SecureLabs, a Dutch security company that has tested the security of Dutch banking websites using a malicious WIFI hotspot. The risk heightens especially when using Microsoft IE or any other outdated Internet browser. As long as all online banking websites and browser vendors are not embracing the new security standard, the SSL web security can be easily bypassed with a cheap and easily assessable WIFI hotspot.

Several Dutch banks have now implemented fraud detection technology from INFORM GmbH to avoid this problem. With RiskShield, INFORM GmbH offers a real-time fraud detection solution that monitors transaction details and web anomalies to identify unusual behavior when payments are processed through hotspots.

"Most of the larger banks in the Netherlands are using RiskShield to protect them from fraudulent payments. With RiskShield we provide them the tools to respond quickly to the new modus operandi of cyber criminals. The new cyber threat is a good example of how critical it is for banks to be able to quickly react to new types of threats. It allows them to easily adapt the detection rules in a short timeframe and without any IT involvement. Banking websites are not the only targets. Any other online merchants like airlines or web shops are vulnerable to these cyber hacks," says Stanley Harmsen van der Vliet, Product Marketing Manager of INFORM GmbH.

For more information about RiskShield, please visit our website at www.riskshield.com or call us at +49 2408 9456 5000.

About INFORM GmbH

INFORM develops and markets software systems to optimize business processes on the basis of operations research and fuzzy logic. Using these two technologies, INFORM is able to develop software systems that "think" and can make intelligent decisions. The benefits for users are better on-time delivery performance, lower costs and a significant competitive advantage.

More than 1000 companies worldwide benefit from advanced optimization software systems by INFORM in industries such as transport logistics, airport resource management, production planning, financial crime risk management and insurance claims handling optimization. INFORM employs over 500 staff from more than 30 countries.

Contact RiskShield
INFORM GmbH
Caroline Lenkitsch
Risk & Fraud Division
Pascalstrasse 23, 52076 Aachen, Germany
Phone: +49 2408-9456-5000
E-Mail: Email Contact

Contact INFORM Communications
INFORM GmbH
Sabine Walter
Pascalstrasse 23, 52076 Aachen, Germany
Phone: +49 2408 9456-1233
E-Mail: Email Contact

US Media Relations Contact
Valerie Harding
Ripple Effect Communications
Phone: 617-429-8628
E-Mail: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.