AGL 39.58 Decreased By ▼ -0.42 (-1.05%)
AIRLINK 131.22 Increased By ▲ 2.16 (1.67%)
BOP 6.81 Increased By ▲ 0.06 (0.89%)
CNERGY 4.71 Increased By ▲ 0.22 (4.9%)
DCL 8.44 Decreased By ▼ -0.11 (-1.29%)
DFML 41.47 Increased By ▲ 0.65 (1.59%)
DGKC 82.09 Increased By ▲ 1.13 (1.4%)
FCCL 33.10 Increased By ▲ 0.33 (1.01%)
FFBL 72.87 Decreased By ▼ -1.56 (-2.1%)
FFL 12.26 Increased By ▲ 0.52 (4.43%)
HUBC 110.74 Increased By ▲ 1.16 (1.06%)
HUMNL 14.51 Increased By ▲ 0.76 (5.53%)
KEL 5.19 Decreased By ▼ -0.12 (-2.26%)
KOSM 7.61 Decreased By ▼ -0.11 (-1.42%)
MLCF 38.90 Increased By ▲ 0.30 (0.78%)
NBP 64.01 Increased By ▲ 0.50 (0.79%)
OGDC 192.82 Decreased By ▼ -1.87 (-0.96%)
PAEL 25.68 Decreased By ▼ -0.03 (-0.12%)
PIBTL 7.34 Decreased By ▼ -0.05 (-0.68%)
PPL 154.07 Decreased By ▼ -1.38 (-0.89%)
PRL 25.83 Increased By ▲ 0.04 (0.16%)
PTC 17.81 Increased By ▲ 0.31 (1.77%)
SEARL 82.30 Increased By ▲ 3.65 (4.64%)
TELE 7.76 Decreased By ▼ -0.10 (-1.27%)
TOMCL 33.46 Decreased By ▼ -0.27 (-0.8%)
TPLP 8.49 Increased By ▲ 0.09 (1.07%)
TREET 16.62 Increased By ▲ 0.35 (2.15%)
TRG 57.40 Decreased By ▼ -0.82 (-1.41%)
UNITY 27.51 Increased By ▲ 0.02 (0.07%)
WTL 1.37 Decreased By ▼ -0.02 (-1.44%)
BR100 10,504 Increased By 59.3 (0.57%)
BR30 31,226 Increased By 36.9 (0.12%)
KSE100 98,080 Increased By 281.6 (0.29%)
KSE30 30,559 Increased By 78 (0.26%)

LAHORE: Banks in Pakistan are practicing variety of tools to collect impulses of cyber attacks, said banking sector experts.

They said these tools included electronic observation platforms, terrestrial intelligence and aircraft such as call recording, stage satellites etc.

Muhammad Ahsan Raza, an expert, said the pirated copies of credit card information can be accessed in two configurations. First, he said, credits such as full name, address, phone number, card number, and expiration date can be easily used by someone for illegal online purchases. The second configuration is represented by the scanned dumps, he added.

Jawad Hussain, another expert, said there are several forms of attacks; however, the most commonplace security attacks are described as denial of service attacks, brute-force attacks, browser attacks, shellshock attacks, Secure Sockets Layer (SSL) attack, backdoor attacks, message manipulation, interruption of internal communication, information attack, and hardware/tool attack.

Another expert Tanvir Fatima said a cyber crime and security survey report suggests that injecting malware, phishing, computer theft and bot attacks are common approaches to cyber-attacks to attain sensitive material and thus cause damage to organizations.

She said mobile banking is one of the latest improvements in the banking sector. This means that customers and banks communicate online. According to her, banks' clients now choose online facilities because they are more suitable, inexpensive and easier and quicker to use.

There was also the introduction of mobile money transfer via mobile networks and in Pakistan via services such as MobiCash and Easypaisa. Therefore, she said, banking services has made accessible to many people using technology by improving user-friendliness and availability.

Despite the advantages, she said, it has been found that many applications based on smartphones are not security-oriented and often do not comply with best practices.

According to estimates, some 38.5 billion devices are connected to the Internet to generate and disseminate confidential information worldwide by 2020.

It may be noted that leading banks in Pakistan with largest networks are affected by cyber attacks one after another. The number of affected cards of these banks runs into thousands.

According to experts, the hackers were found physically willing to check and scan the details of the card at an ATM or a compromised commercial computer or trade machine for illegal trade.

They said the banking sector all over the world faces the most common two factors, including heterogeneous data where modified device use standardized and different protocols for communication purpose. Secondly, they aid, the large number of events where a multitude of information and events flow into data and communication systems.

Copyright Business Recorder, 2020

Comments

Comments are closed.