<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#187; bank</title>
	<atom:link href="http://blog.m-sec.net/tag/bank/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.m-sec.net</link>
	<description>When security is not enough</description>
	<lastBuildDate>Tue, 13 Nov 2012 20:58:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Small research about POS terminals</title>
		<link>http://blog.m-sec.net/2011/small-research-about-pos-terminals/</link>
		<comments>http://blog.m-sec.net/2011/small-research-about-pos-terminals/#comments</comments>
		<pubDate>Fri, 12 Aug 2011 22:29:52 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[GSM]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[credit card]]></category>
		<category><![CDATA[eft]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[payment]]></category>
		<category><![CDATA[pos]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=51</guid>
		<description><![CDATA[I have recently made a research among top 7 banks regarding the POS terminal security. I&#8217;ve sent each bank two questions: 1. Regarding the wireless POS devices &#8211; that use a GPRS / EDGE connection &#8211; is there any security involved in sending data (is a secure data transfer between the device and bank)? If [...]]]></description>
			<content:encoded><![CDATA[<p>I have recently made a research among top 7 banks regarding the <a title="POS terminal" href="http://en.wikipedia.org/wiki/POS_terminal" target="_blank">POS terminal</a> security. I&#8217;ve sent each bank two questions:</p>
<p>1. Regarding the wireless POS devices &#8211; that use a GPRS / EDGE connection &#8211; is there any security involved in sending data (is a secure data transfer between the device and bank)? If so, can you give me one example of a secure protocol you use?</p>
<p>2. What&#8217;s the mobile provider used by your devices?</p>
<p>Results can only worry you:</p>
<p>- for the first question, all of the banks replied saying that they can&#8217;t provide such information due to it&#8217;s confidential classification.</p>
<p>- for the second question, all of them just told me the operator used.</p>
<p>Why their reply came as a surprise to me is because I consider that the second question is something that the banks should not disclose at all. If someone finds a vulnerability in the mobile network of an operator, then it&#8217;s just a matter of seconds until you know the target. Not answering about if there is any security involved during the payment process makes you think if your payment is really secure. And it&#8217;s not even something confidential because <a title="PCI-PED compliance" href="https://www.pcisecuritystandards.org/merchants/how_to_be_compliant.php" target="_blank">PCI (Payment Card Industry) compliance</a> is mandatory for merchants.</p>
<p>Considering that the <a title="GPRS intercept" href="http://blog.m-sec.net/2011/gprs-is-broken/" target="_blank">GPRS is now broken</a>, do you feel safe paying with your credit card since the bank has no interest in letting their customers know that payment is secure?</p>
<div id="tweetbutton51" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsmall-research-about-pos-terminals%2F&amp;via=msecnet&amp;text=Small%20research%20about%20POS%20terminals&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fsmall-research-about-pos-terminals%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/small-research-about-pos-terminals/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>About privacy and data protection (II)</title>
		<link>http://blog.m-sec.net/2011/about-privacy-and-data-protection-ii/</link>
		<comments>http://blog.m-sec.net/2011/about-privacy-and-data-protection-ii/#comments</comments>
		<pubDate>Sat, 06 Aug 2011 22:16:05 +0000</pubDate>
		<dc:creator>m-sec.net</dc:creator>
				<category><![CDATA[Privacy]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[CNP]]></category>
		<category><![CDATA[crack]]></category>
		<category><![CDATA[iban]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[SSN]]></category>

		<guid isPermaLink="false">http://blog.m-sec.net/?p=37</guid>
		<description><![CDATA[As stated in my previous post, there are other legal ways you can find some special private data about someone else. 1. You call yourself &#8220;Carrefour&#8220;, you put up a marketing campaign and ask your customers to fill in a form where one of the fields is the Numerical Personal Code. Of course, you are [...]]]></description>
			<content:encoded><![CDATA[<p>As stated in my previous post, there are other legal ways you can find some special private data about someone else.</p>
<p>1. You call yourself &#8220;<em>Carrefour</em>&#8220;, you put up a marketing campaign and ask your customers to fill in a form where one of the fields is the <a title="CNP Romania" href="http://en.wikipedia.org/wiki/Romanian_identity_card" target="_blank">Numerical Personal Code</a>. Of course, you are not registered as a company who deals with private data (according to <a title="Data protection Romania" href="http://www.dataprotection.ro/" target="_blank">ANSPDCP</a>&#8216;s website). There are a lot of people out there that give their personal information just to get 10$.  I really wonder if it was to give their credit card info and PIN, would they really give it?</p>
<p>2. What about if you are <em>a bank</em>? Or a customer of a bank? Theoretically your private details like bank account, <a title="Romanian CNP" href="http://en.wikipedia.org/wiki/Romanian_identity_card" target="_blank">CNP</a>, address, etc should be safe. Well&#8230;that&#8217;s the theory. There is one bank out there (you&#8217;ll discover the name below) that allows you to find protected info about any of its customers. Let&#8217;s say you have an i-banking account with them and you get the <a title="IBAN details" href="http://en.wikipedia.org/wiki/International_Bank_Account_Number" target="_blank">IBAN</a> account of one of their customers. As soon as you try to make a money transfer to that person, you will get that person&#8217;s name. What&#8217;s wrong with that you will say. Well, you can just play around with the IBAN account and discover other valid accounts along with the holder&#8217;s name. Ok, I agree, maybe that&#8217;s not a serious security problem. Once you continue with the money transfer, you can see more: in the details of the transfer <strong>you also get the CNP of that someone</strong>. And yes, the bank is registered as a private company who deals with confidential data and obeys the law. Right!</p>
<p>See a demo for yourself. I have blurred some details, but that&#8217;s the only edit on the video.<br />
<iframe src="http://player.vimeo.com/video/27367161?title=0&amp;byline=0&amp;portrait=0" frameborder="0" width="500" height="400"></iframe></p>
<div id="tweetbutton37" class="tw_button" style=""><a href="http://twitter.com/share?url=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fabout-privacy-and-data-protection-ii%2F&amp;via=msecnet&amp;text=About%20privacy%20and%20data%20protection%20%28II%29&amp;related=&amp;lang=en&amp;count=horizontal&amp;counturl=http%3A%2F%2Fblog.m-sec.net%2F2011%2Fabout-privacy-and-data-protection-ii%2F" class="twitter-share-button"  style="width:55px;height:22px;background:transparent url('http://blog.m-sec.net/wp-content/plugins/wp-tweet-button/tweetn.png') no-repeat  0 0;text-align:left;text-indent:-9999px;display:block;">Tweet</a></div>]]></content:encoded>
			<wfw:commentRss>http://blog.m-sec.net/2011/about-privacy-and-data-protection-ii/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
