Saturday, August 25, 2012

Tips for a Secure Internet Banking


Internet banking users should carefully monitor Trojan Spyware attacks because they can lead to financial fraud on their online accounts.
Kasikornbank recommends its K-Cyber Banking users take the following precautionary measures before conducting any financial transactions:
- You must always check the third-party account number and/or name shown in your opt-in SMS message to make sure the third-party information is correct before entering the OTP (one-time password) to confirm the transaction.
If your computer is infected with a Trojan, the instruction sent to the K-Cyber Banking system as well as information shown on the computer screen will be altered by the virus.
- You must always check the third-party account number and/or name shown in the e-mail confirmation sent to you from K-Cyber Banking after each transaction is completed.
If you find any irregularity in the OTP SMS or e-mail, you should immediately call the K-Contact Centre (02-888-8888) to suspend your K-Cyber Banking service until you are certain the Trojan has been eliminated from your computer.
- You should set your preferences to let the system notify you by e-mail every time you log in to K-Cyber Banking.
- In order to minimise risks from Trojans on your computer, you should follow security tips shown on the log in page. For example, regularly update your computer programmes (for example, operating systems, browers, and antivirus programmes), do not click on any URL links in any e-mails to access the bank's online banking system, and do not visit any dubious websites or run any suspicious programmes.
KBank said if customers follow its security measures, they will not be asked to participate in any security tests.
Therefore, users must not follow any requests to enter their user ID and password, especially by OTP SMS sent to their mobile phones to perform security testing.
read the rest of the story at BangkokPost



Wednesday, July 25, 2012

WARNING: New Android Malware


A new piece of malware is trying to take advantage of Opera's popularity as a mobile browser alternative on Android smartphones. Cybercriminals have created a new variant of Opfake that bundles the real Opera Mini version 6.5 so as to further mask what the malware is actually doing (earning its creators money from unsuspecting users by sending international text messages). GFI, which first discovered the malware, is calling this particular threat Trojan.AndroidOS.Generic.A. The package is named "com.surprise.me" while the file name is "opera_mini_65.apk" (both can easily be changed).



As you can see above, two sets of "Permission to Install" pages are displayed during installation. The first (above in the middle), comes from the malware itself: it asks for read and modify rights to all SMS and MMS messages, read rights to all contacts stored on the smartphone, modify or delete rights to the SD card, and so on. The second (above on the right) one appears once users agree to install the first, which is simply the permissions required for the legitimate Opera Mini browser.

This particular threat is interesting because it shows that OpFake is evolving. Instead of trying to mimic a popular app, OpFake now simply installs the real version. As a result, the user is less suspicious that something is wrong. "More than likely, users will not be aware that something might have infiltrated their phones until the bill arrives," a GFI spokesperson said in a statement.


Read the rest of the story at ZDNET