SCA for low-tech phones and fallback options
Today it is easy to assume that everybody has a smartphone and are able, and willing, to use it for all tasks, including banking. That is not always the case though. A significant number of users either won’t or can’t use a smartphone for banking purposes. How do we deal with that? How can we offer a PSD2 SCA compliant authentication without a smartphone?
The taxonomy of SCA challenges
Authentication in the banking industry continues to be a headache for many. While everybody would like to have a “one-size-fits-all” solution to SCA, experience shows that the authentication use cases are too complex for that to be feasible. Let’s take a look at the different scenarios.
SCA industry challenges
When implementing Strong Customer Authentication (SCA), most organisations come across a number of challenges. Through discussions with different actors in the PSD2 SCA industry, some issues have emerged that are shared across the industry, regardless of company size or whether you are an incumbent or challenger bank.
2FA - Why sending OTP via SMS is vulnerable
Most organizations today provide two factor authentication (2FA) to their users and customers, to provide them with a more secure mode of accessing their accounts. 2FA has indeed helped most users keep their accounts more secure than they were before its inception. However, with the introduction of 2FA as a more secure way of authenticating users came other issues that made it vulnerable to certain hacks.
Expectations for Strong Customer Authentication in 2020
2019 was an exciting and challenging year in the payment and strong customer authentication industry. With New Years Eve just behind us this is a good time to look forward into 2020, both for what we know will happen and for some speculation on what might happen.
PDS2 SCA compliance checklist
One of the aims of the Revised Payment Service Directive, more commonly known as PSD2, is to better protect consumers when they pay online. The requirement for a strong customer authentication (SCA) in a majority of electronic payments is a key element of the regulation.
What can malware do? Mobile malware part 2
In the previous post we discussed what malware can do once it is active on your phone. But, how do end-users get malware in the first place? You might think that you’re protected if you don’t really do anything else than messaging and Facebook on your phone, but that is not the case.
What can malware do? Mobile malware part 1
So far in 2019, there has been a rapid growth of malware, particularly in the mobile banking sector. According to the latest report from Checkpoint the growth in banking malware has been more than 50% compared to 2018. At the same time, Kaspersky reported that 438,709 of their mobile users encountered a total of 3,730,378 financial attacks, which does not include other types of mobile malware. So, clearly, there is a lot of malware out there trying to target the financial sector. In this post, we’ll look at what malware can do once it is installed. Don’t worry, we’ll look at how malware spreads in the next post.
Auditing and documenting
This topic might appear to be quite boring, but this does not make it any less important. While documentation has been a requirement for a long time, the RTS creates new challenges for anyone involved in payments. There are a number of new articles that are more demanding than previously referring to the documentation.
Linking payments to the user: using authentication codes
Both article 4 and article 5 of the RTS uses the term “authentication codes” quite a lot. While it is not explicit in the regulation what an authentication code is, it is likely that most people will associate it with a TAN, a “Transaction Authentication Number”, which is a variant of a One Time PIN (OTP).
Multi-factor authentication: Knowledge, inherence and possession
The most traditional way of authenticating to a service is to simply use a username and a password. This is what is known as single-factor authentication. Although this is the most common authentication process, it’s not ideal for today’s standards since it can very easily break.
The impact of the Revised Directive on Payment Services (PSD2) on security
The Revised Directive on Payment Services (PSD2) has a wide range of objectives, which impacts nearly all financial institutions and many merchants. Fundamentally, as long as you are located in Europe, or do transactions with customers located in Europe, the PSD2 will have some kind of impact.
PSD2 SCA Compliance & How You Can Prepare for the Deadline
As a bank or PSP, you have to be ready to test your PSD2 compliance with strong customer authentication under the Commission Delegated Regulation before the deadline on the 14th of March 2019. A good place to start for a Single Device SCA is with our own - Okay This.
PSD2 explained and why you should care
Since the revised ) was proposed by the European Commission back in 2013 it has already created widespread of disruption in the European payment market. New payment processors are popping up almost daily, and the big banks are clearly moving to secure their positions before the directive comes fully into force in September 2019.
The latest news in overlay attacks
Some times it feels like security vendors are fighting an endless battle against malware creators who come up with new exploits. A common goal for malware authors is to find new ways of stealing user credentials and passwords, so that criminals can hijack accounts and even do fraudulent transactions. The mechanisms used to do this has gone under several different names: Tapjacking,
Mobile phones are under attack through from Bluetooth and Wi-Fi
Lately there have been two much published reports of vulnerabilities which threatens billions of mobile phones. First, in July it was vulnerability in the firmware of a little known chip powering almost all modern smartphones, a Wi-Fi chip made by Broadcom. The vulnerability, known as BroadPwn, allows a smartphone to be infected simply by looking for known networks, something that all mobile phones do regularly. In theory the vulnerability could also be used convert the Wi-Fi chip into an access point, so that it could automatically spread itself to other phones, potentially spreading worldwide in just a few hours. You can read more about this vulnerability in this . As the firmware can be updated through the operating system any phone not updated since July is likely to be vulnerable.