AVN 67.13 Decreased By ▼ -3.17 (-4.51%)
BOP 9.83 Decreased By ▼ -0.21 (-2.09%)
CHCC 112.33 Decreased By ▼ -9.12 (-7.51%)
DCL 9.81 Decreased By ▼ -0.49 (-4.76%)
DGKC 103.04 Decreased By ▼ -3.56 (-3.34%)
EFERT 60.82 Decreased By ▼ -0.58 (-0.94%)
EPCL 40.10 Decreased By ▼ -1.05 (-2.55%)
FCCL 19.90 Decreased By ▼ -0.20 (-1%)
FFL 15.76 Decreased By ▼ -1.00 (-5.97%)
HASCOL 19.23 Decreased By ▼ -1.92 (-9.08%)
HBL 130.86 Decreased By ▼ -0.03 (-0.02%)
HUBC 78.53 Decreased By ▼ -0.92 (-1.16%)
HUMNL 7.60 Decreased By ▼ -0.20 (-2.56%)
JSCL 25.36 Decreased By ▼ -1.82 (-6.7%)
KAPCO 26.18 Decreased By ▼ -0.76 (-2.82%)
KEL 4.18 Decreased By ▼ -0.06 (-1.42%)
LOTCHEM 11.91 Decreased By ▼ -0.21 (-1.73%)
MLCF 35.98 Decreased By ▼ -1.24 (-3.33%)
OGDC 102.68 Decreased By ▼ -2.70 (-2.56%)
PAEL 32.56 Decreased By ▼ -2.03 (-5.87%)
PIBTL 12.15 Decreased By ▼ -0.63 (-4.93%)
PIOC 91.00 Decreased By ▼ -2.52 (-2.69%)
POWER 8.79 Decreased By ▼ -0.32 (-3.51%)
PPL 91.70 Decreased By ▼ -1.81 (-1.94%)
PSO 200.02 Decreased By ▼ -5.39 (-2.62%)
SNGP 61.00 Decreased By ▼ -1.60 (-2.56%)
STPL 13.05 Decreased By ▼ -0.34 (-2.54%)
TRG 52.26 Decreased By ▼ -2.49 (-4.55%)
UNITY 16.40 Decreased By ▼ -0.95 (-5.47%)
WTL 1.15 Decreased By ▼ -0.03 (-2.54%)
BR100 4,194 Decreased By ▼ -14.04 (-0.33%)
BR30 21,218 Decreased By ▼ -93.63 (-0.44%)
KSE100 40,222 Decreased By ▼ -349 (-0.86%)
KSE30 17,071 Decreased By ▼ -134.42 (-0.78%)
COVID-19 TOTAL DAILY
CASES 312,806 543
DEATHS 6,484 5

LAHORE: Banks in Pakistan are practicing variety of tools to collect impulses of cyber attacks, said banking sector experts.

They said these tools included electronic observation platforms, terrestrial intelligence and aircraft such as call recording, stage satellites etc.

Muhammad Ahsan Raza, an expert, said the pirated copies of credit card information can be accessed in two configurations. First, he said, credits such as full name, address, phone number, card number, and expiration date can be easily used by someone for illegal online purchases. The second configuration is represented by the scanned dumps, he added.

Jawad Hussain, another expert, said there are several forms of attacks; however, the most commonplace security attacks are described as denial of service attacks, brute-force attacks, browser attacks, shellshock attacks, Secure Sockets Layer (SSL) attack, backdoor attacks, message manipulation, interruption of internal communication, information attack, and hardware/tool attack.

Another expert Tanvir Fatima said a cyber crime and security survey report suggests that injecting malware, phishing, computer theft and bot attacks are common approaches to cyber-attacks to attain sensitive material and thus cause damage to organizations.

She said mobile banking is one of the latest improvements in the banking sector. This means that customers and banks communicate online. According to her, banks' clients now choose online facilities because they are more suitable, inexpensive and easier and quicker to use.

There was also the introduction of mobile money transfer via mobile networks and in Pakistan via services such as MobiCash and Easypaisa. Therefore, she said, banking services has made accessible to many people using technology by improving user-friendliness and availability.

Despite the advantages, she said, it has been found that many applications based on smartphones are not security-oriented and often do not comply with best practices.

According to estimates, some 38.5 billion devices are connected to the Internet to generate and disseminate confidential information worldwide by 2020.

It may be noted that leading banks in Pakistan with largest networks are affected by cyber attacks one after another. The number of affected cards of these banks runs into thousands.

According to experts, the hackers were found physically willing to check and scan the details of the card at an ATM or a compromised commercial computer or trade machine for illegal trade.

They said the banking sector all over the world faces the most common two factors, including heterogeneous data where modified device use standardized and different protocols for communication purpose. Secondly, they aid, the large number of events where a multitude of information and events flow into data and communication systems.

Copyright Business Recorder, 2020