Hot Authentication Tools

The trusty telephone is emerging as one of the key elements in new multifactor authentication schemes designed to protect online banking and other web-based financial transactions from rapidly evolving security threats.

Hot Authentication Tools prev next


Man-in-the-Browser attacks

One serious threat on the horizon is the man-in-the-browser (MITB) attack. In this example,

1. Alice requests transfer of $1,000 to Bob.

2. MITB alters transfer request to transfer $21,000 to Fred.

3. MITB submits fraudulent request to bank.

4. Bank requests confirmation of transfer of $21,000 to Fred.

5. MITB alters confirmation page to present user with original request.

6. Alice reviews the transaction details and confirms request.

7. Bank transfers $21,000 to Fred.

Prev Next 2/21

Comments on this image

There are currently no comments for this image.

Post new comment

Users posting comments agree to the Good Gear Guide comments policy.

Login or register to link comments to your user profile, or you may also post a comment without being logged in.


Hot Authentication Tools

21 images

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?