{"id":315,"date":"2005-02-21T00:00:00","date_gmt":"2005-02-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/21\/new-cyber-security-protocol-for-online-banking-and-more\/"},"modified":"2021-12-30T11:37:00","modified_gmt":"2021-12-30T11:37:00","slug":"new-cyber-security-protocol-for-online-banking-and-more","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/21\/new-cyber-security-protocol-for-online-banking-and-more\/","title":{"rendered":"New cyber security protocol for online banking, and more"},"content":{"rendered":"<p>A new security approach could improve safeguarding of credit card numbers, bank passwords and other sensitive information for those who surf the Internet using wireless connections, researchers told the annual meeting of the American Association for the Advancement of Science (AAAS)on Saturday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The same protocol could be employed in many computer networks in which two computers, hand-held communication devices or network nodes need to simultaneously verify the identity of each other.<\/p>\n<p>The protocol &#8211; called &#8220;delayed password disclosure&#8221; &#8211; was created by Markus Jakobsson and Steve Myers of Indiana University.<\/p>\n<p>It may have application in any environment where &#8220;mutual identity authentication&#8221; is required, the researchers say.<\/p>\n<p>This new security protocol could help to prevent consumers from getting tricked into connecting to a fake wireless hub at an airport, for example.<\/p>\n<p>Or the protocol could notify you that the link included in a legitimate-looking e-mail points to a fake website set up to steal your sensitive information, such as passwords and PINs to bank accounts, credit cards numbers and account numbers for online fund-transfer services.<\/p>\n<p>The safety measures also might help stop organized crime and terrorist-funding groups from collecting large numbers of fund-transfer account numbers that could be used for money laundering, the researchers say.<\/p>\n<p>The new protocol is meant to strengthen such networks, using a type of electronic &#8220;interrogation&#8221; to ensure they are not compromised.<\/p>\n<p>For network attackers to launder money through online fund-transfer accounts of unsuspecting individuals, the criminals must stop email notifications from the fund-transfer company to the account holder.<\/p>\n<p>&#8220;Denial of service attacks&#8221; and other kinds of network attacks could be employed to stop such notification emails, the researchers say.<\/p>\n<p>http:\/\/www.innovations-report.com\/html\/reports\/information_technology\/report-40656.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-315","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/315\/revisions"}],"predecessor-version":[{"id":2802,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/315\/revisions\/2802"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}