Windows Support Chat

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 22 November 2006

How safe is your PIN?

Posted on 13:20 by Unknown
Early this year I asked my bank to cancel my main credit card and issue me with a brand new card having a completely different card number. This was because an unauthorized transaction had occurred, which seemed to be somehow related to an overseas software purchase, and I no longer had confidence in the security of my old card.

I've been purchasing software like this for years, and this was the first time anything like this had happened. It really got me thinking about credit card security for online transactions. I absolutely NEVER use my card on anything but secured web pages (having the "locked padlock"), and continually scan for malware (keylogging trojans, etc).

My best guess was that in this case somewhere overseas a scoundrel somehow got access to transaction details and was able to generate a bogus transaction. My bank refunded the transaction amount, but didn't (or perhaps as a matter of policy wouldn't) tell me what their investigation into the matter turned up.

This all bubbled to the surface when I just came across the following report -
The unbearable lightness of PIN cracking by Omer Bergman and Odelia Moshe Dostoevsky. Take a look at it yourself:
Abstract. We describe new attacks on the financial PIN processing API. The attacks apply to switches as well as to verification facilities. The attacks are extremely severe allowing an attacker to expose customer PINs by executing only one or two API calls per exposed PIN. One of the attacks uses only the translate function which is a required function in every switch. The other attacks abuse functions that are used to allow customers to select their PINs online. Some of the attacks can be applied on a switch even though the attacked functions require issuer’s keys which do not exist on a switch. This is particularly disturbing as it was widely believed that functions requiring issuer’s keys cannot do any harm if the respective keys are unavailable.
Your own local bank's systems and processes might be totally secure, but think of all the stages in a transaction and all the chances for a rogue to somehow tap into the transaction ... and shudder!

Security expert Bruce Schneier discusses this report too in Attacking Bank-Card PINs and this post includes some interesting comments by others.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home
View mobile version

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • I was going to delay writing this, but here it is anyway …
    What’s the difference between ignorance and apathy?    ANSWER: I don’t know, and I don’t care! It’s been one of those days for me, ...
  • The premise is … I’m getting even madder
    I was reading this IBM Redbook today, and it didn’t make a good first impression: I really love IBM Redbooks, but not at all the way...
  • "Simple Signer" - Freeware tool to easily sign Lotus Notes databases
    This is a deliberately simple tool enabling you to select any Lotus Notes database -- local, or on a Lotus Domino server -- and then to sign...
  • Which one is "bigger" -- Microsoft or IBM?
    There's an IT industry debate that has been going on for a decade or more now, about whether or not " The mainframe is dead." ...
  • Another weird LotusScript compiler problem
    I had barely told you about a LotusScript compiler error that I had a few days ago (see The curious case of the "Name previously decla...
  • Get knotted!
    Hey, you might find any topic discussed on this blog! These days, I tend to dress very formally and don't have all that much use for th...
  • How to fix Eudora when the spell checker doesn't want to remember added words
    I started using Eudora as my mail client way back in 1993 or thereabouts. I still use Eudora to this day; it's not perfect, but has many...
  • How to install CDBurnerXP (and WinSCP) without Open Candy
    CDBurnerXP is free and very good software for burning CDs, DVDs and Blu-ray disks, but unfortunately the default installer installs OpenC...
  • Hot topic? A new ice age is coming (eventually)
    My science/engineering background is bubbling to the surface again. I’ve just examined Burt Rutan’s presentations and highly recommend them...
  • Life Begins at Requirements (not at 40)
    "Few people have the same notion of what requirements are and where they fit into the big picture" writes Richard M. Marshall, in ...

Categories

  • Add-ons
  • Adobe Reader
  • AJAX
  • Application Platform
  • Architecture
  • AS/400
  • Asia
  • Australia
  • Bad Software
  • Browser
  • Browser Share
  • Bug
  • Bushfire
  • Business
  • Chemistry
  • China
  • Coding
  • Communication
  • Communities of Interest
  • Crossword
  • Crosswords
  • Curiosity
  • Device Drivers
  • DLL hell
  • Documentation
  • Dragon
  • Durian
  • Ecosystems
  • Error Messages
  • Eudora
  • Extensions
  • Facetiousness
  • Failure
  • Firefox
  • FOSS
  • Freelance
  • Freeware
  • Fun
  • Heat Wave
  • Humor
  • i Series
  • IBM
  • IBM Systems
  • IE
  • Image resource manipulation
  • Innovation
  • Installation
  • Internet Explorer
  • Intranet
  • Japan
  • Koala
  • Linux
  • Live Writer
  • Lotus Domino
  • Lotus Notes
  • Lotus Notes Lotus Domino
  • Lotus Software
  • LotusScript
  • Mainframe
  • Melbourne (Australia)
  • Microsoft
  • Multiple
  • Natural Disaster
  • NaturallySpeaking
  • Nigerian 419 fraud
  • Notes Mail
  • NotesTracker
  • Nuance
  • Open Source
  • OpenNTF.ORG
  • Patents
  • POSS
  • PowerPoint
  • Pragmatism
  • Presenter
  • Print Server
  • Project Management
  • Pronunciation
  • Proprietary
  • Registry
  • Releases
  • Research and Development
  • RIA
  • SDMS
  • Security
  • Service Oriented Architecture
  • SNA
  • SOA
  • Software
  • Software Package
  • speech recognition
  • Spell Checking
  • Standards
  • System i
  • System/38
  • TCP/IP
  • Technology
  • Usability
  • Usability Testing
  • Versions
  • Victoria
  • Weather
  • Web 2.0
  • Web 3.0
  • Web Design
  • Web Pi
  • Web Services
  • Webshots.com
  • Windows
  • Windows 7 backgrounds
  • Words
  • z Series

Blog Archive

  • ►  2013 (25)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  June (7)
    • ►  May (1)
    • ►  April (7)
    • ►  March (2)
    • ►  February (4)
  • ►  2012 (25)
    • ►  December (7)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (2)
    • ►  April (2)
    • ►  March (1)
  • ►  2011 (20)
    • ►  December (3)
    • ►  November (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (2)
    • ►  March (4)
    • ►  February (2)
    • ►  January (5)
  • ►  2010 (69)
    • ►  November (2)
    • ►  October (3)
    • ►  September (5)
    • ►  August (13)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (10)
    • ►  March (10)
    • ►  February (8)
    • ►  January (10)
  • ►  2009 (41)
    • ►  December (5)
    • ►  November (6)
    • ►  October (5)
    • ►  September (4)
    • ►  August (1)
    • ►  June (1)
    • ►  May (3)
    • ►  April (2)
    • ►  February (9)
    • ►  January (5)
  • ►  2008 (16)
    • ►  November (3)
    • ►  October (3)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  April (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2007 (39)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  July (5)
    • ►  June (1)
    • ►  May (2)
    • ►  April (11)
    • ►  March (5)
    • ►  February (8)
    • ►  January (4)
  • ▼  2006 (98)
    • ►  December (8)
    • ▼  November (25)
      • Good form is hard to come by (in America)!
      • Dead Peasants, and Dead Poets
      • Let's be professional about this!
      • asiapac.com.au Browser Share, late November 2006 -...
      • Heads I win, tails you lose?
      • Using Junction Points or SoftGrid for Installing m...
      • How safe is your PIN?
      • Life Begins at Requirements (not at 40)
      • Get knotted!
      • How to be a genius -- after ten years
      • Firefox outfoxed by Microsoft?
      • Peeling off the layers
      • Half-witted Design Arithmetic
      • Sysinternals rocks, at Microsoft
      • Windows Vista might force a flight to Linux? We'll...
      • What They Forgot - Part 1
      • 1 candidate fixes a Zero Divide problem
      • Banzai, Bonza, Bonsai? ... But not Bonzai!
      • Why, Robot?
      • Quantum Quandary?
      • SDMS V4.0 and CAPTURE V2.0 released
      • SOA's Business Value (three articles)
      • STWebContact -- a nice alternative to Sametime Links
      • A slash with some "dash"
      • Increasing your Internet Explorer concurrent conne...
    • ►  October (6)
    • ►  September (6)
    • ►  August (5)
    • ►  July (6)
    • ►  June (16)
    • ►  May (17)
    • ►  April (2)
    • ►  March (4)
    • ►  February (3)
  • ►  2005 (38)
    • ►  November (5)
    • ►  September (2)
    • ►  August (10)
    • ►  July (14)
    • ►  June (3)
    • ►  April (3)
    • ►  March (1)
Powered by Blogger.

About Me

Unknown
View my complete profile