[<prev] [next>] [day] [month] [year] [list]
Message-ID: <44A203DE.6030709@singnet.com.sg>
Date: Wed, 28 Jun 2006 12:21:50 +0800
From: thomas48 <thomas48@...gnet.com.sg>
To: security-basics@...urityfocus.com, firewalls@...urityfocus.com,
full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
focus-ids@...urityfocus.com, newslist@...urity-briefings.com,
forensics@...urityfocus.com, vuln-dev@...urityfocus.com,
webappsec@...urityfocus.com, funsec@...uxbox.org
Cc: organiser@...can.org
Subject: SyScan'06 Highlight - Is Phone Banking Safe?
This is a brand new presentation and its going public for the very first
time in SyScan'06.
Marek Bialowlowy is a Polish security researcher based in Southeast Asia
whose expertise is researching into mobile technologies like phone
banking, wifi and bluetooth etc. In this presentation in SyScan'06, he
will present his shocking findings in one of the most popular banking
application.
Use of a telephone in banking is considerably widespread. The most
popular is certainly the interactive voice response (IVR) technology,
which has been adopted by nearly all major banks. There is also a new
successor of this technology that is a mobile banking. It is mainly
based on SMS or STK (SimToolkit) and the popularity of it is rapidly
increasing largely thanks to the popularity of mobile phones. Certainly
with benefits of new technology also come new threats which have to be
addressed. Meanwhile, the old IVR based technology still lacks security,
which questions the overall safety of using phone in banking services.
The presentation summarises results of comprehensive analysis into phone
banking security and introduces never previously presented attack
scenarios on phone banking systems, reveals the security weakness in
phone banking systems of a major banks and explains some potential
methods of minimising the risks.
Other presentations at SyScan'06 include:
Unpacking Malware, Trojans and Worms - Paul Craig
Towards Automated Botnet Detection and Mitigation - Thorsten Holz
I-worm Fuzzer: A new propagation type of worm - Enrique Sanchez
Securing Linux/Unix Systems - Andrew Griffiths
VoIP Security Issues - Hendrik Scolz
Exploiting Embedded System - Barnaby Jack
Reverse Engineering Microsoft Binaries - Alexander Sotirov
Feeding Fuzzing - ByteRage
Writing behind a Buffer - Angelo Rosiello
Skeletons in Microsoft Closet - Andre Protas
Binary Analysis; finding secrets in ISAPIs
Yet Another Web Application Testing Toolkit - Fyodor Yarochkin
Oracle Rootkit and Viruses - Alexander Kornbrust
Attacking Microsoft Vista - Joanna Rutkowska
For more information, please visit
http://www.syscan.org
-------------------------------------------------------------------------
Sponsored by: Watchfire
As web applications become increasingly complex, tremendous amounts of
sensitive data - personal, medical and financial - are exchanged, and
stored. Consumers expect and demand security for this information. This
whitepaper examines a few vulnerability detection methods - specifically
comparing and contrasting manual penetration testing with automated
scanning tools. Download "Automated Scanning or Manual Penetration
Testing?" today!
https://www.watchfire.com/securearea/whitepapers.aspx?id=701300000008BOQ
--------------------------------------------------------------------------
Powered by blists - more mailing lists