Online banking is only as secure as possible with the right tools. While iTAN lists have largely disappeared, chipTAN and mTAN are enjoying great popularity. But mTAN in particular harbors considerable risks. You can find out how secure mTAN is here.
With online banking, you have a security mechanism called “TAN” to verify transfers or the like. Today there are three TAN methods. This includes:
In our article chipTAN and mTAN we explain the differences between the TAN procedures in more detail.
mTAN is very popular with bank customers. This is mainly due to mobility. No matter where you are, mTAN will provide you with a functioning TAN if required. With chipTAN you would always have to carry the generator with you.
However, the security of mTAN is only given to a limited extent. Initial attempts at attack by researchers and criminals have shown that the user’s smartphone can be infected with malware. The only task of this malicious program: spying on and redirecting TANs.
As early as 2012, the damage caused by specific mTAN Trojans such as “ZitMO” is said to have been well over 35 million euros. The bank customers were led to believe that there was a necessary update for their smartphone. In truth, however, it was the Trojan that began to intercept TANs immediately after installation. These are transferred to the criminals’ constantly changing servers.
Also Read: How To Protect Digital Identity
Online banking is now used by millions of German citizens, but there are still many skeptics. We took a closer look at the various TAN procedures in online banking and analyzed the security situation.
If you want to do online banking, you can choose between different TAN processes after activation by the bank. Currently, the two options mobileTAN (mTAN) and chipTAN are mainly used.
The so-called iTAN also exists but is no longer used. You can find out why iTAN is no longer used in this article.
With the large number of TAN procedures, it is difficult to keep track of things. We will briefly show you the three known TAN procedures and their characteristic features.
The TAN procedures mentioned work in different ways. Below is a description:
Now you have to hold the generator to the monitor of your PC. There is a “flickering” image when making a transfer. This contains the encoded transaction data. The card reader reads this out and compares it with your EC card. The TAN is then generated from this.
Also Read: Cybersecurity Threats: Where Do They Come From And What Are The Challenges We Face?
Let's imagine a world where your ideas and information are freed from the monotony of…
Managing a big data environment is challenging, especially when you have sensitive, high-risk information to…
For surfing at maximum speed, not only the Internet connection is important. The router is…
In an increasingly digital and fast-paced world, the need for convenient and secure payment solutions…
Who doesn't know it by now, the most well-known little AI helper in everyday working…
Are you ready to embark on the entrepreneurial adventure of the communication sector? Congratulations! Before…