Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Privacy Your Rights Online

New Zealand Banks Demand a Peek at User PCs 268

Montgomery Burns III writes with a link to a ComputerWorld article on a ... unique approach to bank security. New Zealand financial institutions are looking for a way to access customer PCs used in online banking transactions. Their goal is to verify the security of the user's terminal. "Under the terms of a new banking Code of Practice, banks may request access in the event of a disputed transaction to see if security protection in is place and up to date. Liability for any loss resulting from unauthorized Internet banking transactions rests with the customer if they have 'used a computer or device that does not have appropriate protective software and operating system installed and up to date, [or] failed to take reasonable steps to ensure that the protective systems, such as virus scanning, firewall, antispyware, operating system and antispam software on [the] computer, are uptodate.'"
This discussion has been archived. No new comments can be posted.

New Zealand Banks Demand a Peek at User PCs

Comments Filter:
  • Interesting (Score:5, Insightful)

    by MightyYar ( 622222 ) on Friday June 29, 2007 @01:28PM (#19691037)
    I was wondering what the end of internet banking would look like, and this is it.

    I'll go right back to using the branch if they start holding me liable for using their cost-saving website.
  • by Anonymous Coward on Friday June 29, 2007 @01:28PM (#19691039)
    So, if they're allowed to inspect my client, may I inspect their server? No?
  • Therefore..... (Score:5, Insightful)

    by Lumpy ( 12016 ) on Friday June 29, 2007 @01:28PM (#19691045) Homepage
    All of you damned users not running Microsoft OS will be liable.

    Just because anti-spyware software does not exist for your software platform is no excuse!

    you BeOs users! how dare you not run a Virus scanner app!

    gotta love Bank executives asking for things they dont even have the slightest clue about.
  • by blahplusplus ( 757119 ) on Friday June 29, 2007 @01:29PM (#19691061)
    I really have to wonder if this is a kneejerk reaction to Banks having fraud problems?

    I think this is pretty extreme measure, as if companies didn't already have enough data about people already. What exactly is the criteria for a 'secure' system? Sounds like a lot of BS to me.
  • It's about time (Score:1, Insightful)

    by korekrash ( 853240 ) on Friday June 29, 2007 @01:32PM (#19691107)
    IMO it's about time ppl had to take responsibility for their system. Why on earth should a bank take a loss when it was your fault? I don't get to go to the bank and expect them to replace the cash I withdrew yesterday that got stolen from my pocket.....This might be the push ppl need to get them to pay attention.....computers are here to stay....the "I don't understand computers very well excuse is really old.....just because you don't understand the way a locking mechanism in your door works doesn't mean you shouldn't fix it if it is broken.....
  • All about Trust. (Score:4, Insightful)

    by Shambly ( 1075137 ) on Friday June 29, 2007 @01:37PM (#19691165)
    I don't trust the banks to secure their data or use it in non malicious ways. They don't trust me to be able to secure my computer properly. I also don't trust the connection between my computer and their servers to be completly secure. All of these have reasons not to trust each other since all of these have failed at some point or another. I think i'll stick to ATM's for my needs. At least if it fails it's their hardware that's getting blamed and not mine.
  • Comment removed (Score:2, Insightful)

    by account_deleted ( 4530225 ) on Friday June 29, 2007 @01:43PM (#19691245)
    Comment removed based on user account deletion
  • by The_REAL_DZA ( 731082 ) on Friday June 29, 2007 @01:45PM (#19691261)
    ...if they can access it, it ain't secure. 'nuff said.
  • by R2.0 ( 532027 ) on Friday June 29, 2007 @01:49PM (#19691315)
    User: "My bank account is empty!"

    Bank: "Yes, at 0325 yesterday your account was logged into and the money transferred"

    User: "But I didn't do it!"

    Bank: "Well, sir, the proper login and password were used, and our logs indicate it came from the same IP address your previous transactions came from. If you did not personally do it, did soeone else in your household do it?"

    User: "I live alone, and I work night shift. No one was at the house last night"

    Bank: "We're sorry sir, but it sounds like you have been a victim of computer fraud. That's when someone else has stolen your money, just like if you lost your checkbook. We would be more than happy to cooperate with the authorities to provide any data we have. Let us know who to send the data to. Thanks, buh-bye"

    Cold? Yes. But I'd rather be responsible for my own computer security than the bank be allowed to root around in my computer.

    (Please note this does not apply to data leaks from teh banks or other businesses - they are guilty of negligence, on top of whatever fraud drains the account)
  • by trolltalk.com ( 1108067 ) on Friday June 29, 2007 @01:50PM (#19691335) Homepage Journal

    Yeah ... right.

    The bank once deposited $80,000 into my sisters' account by mistake. She told them about it ....the next week, it was "corrected" - it was then $234,000.00.

    When she went in to tell them about it, they were having another problem --- the ATM was spitting out paper and money all over the place.

    Audited doesn't mean perfect any more than ISO9001 means low level of defects.

  • by AHumbleOpinion ( 546848 ) on Friday June 29, 2007 @02:12PM (#19691651) Homepage
    But I'd rather be responsible for my own computer security than the bank be allowed to root around in my computer.

    That is probably a gross exaggeration. Rather than arbitrarily root around a technician will probably come to your home, and check you OS version and patches, anti-virus version and updates, firewall, ... all while you watch. To do otherwise would drive customers from banks that arbitrarily root around to banks that do an appropriately focused search.

    Your "eat my own losses" argument has two primary flaws.
    (1) You assume the mistake was the customers, not the banks. Those who are sure the error was on the banks side will be more likely to cooperate in ruling out their home computers.
    (2) Privacy has a price, and often a limit. If the account emptied was a savings account with a lot of money rather than a checking account with a small amount of money then the customer will become increasingly cooperative.
  • by fred fleenblat ( 463628 ) on Friday June 29, 2007 @02:18PM (#19691727) Homepage
    I'd like to see some additional on-line banking security in these areas:

    1. 100% first-class support for macs, linux, solaris, firefox, opera, etc. Any environment that is less targetted than windows+IE should be encouraged by the banks as a way to reduce fraud.

    2. Start issuing SecurID tokens (or similar) to bank customers. This would take care of the simpler keyloggers and phishing attacks.

    3. Pay attention to the IP addresses. Compare them to known bot-infested netblocks. Track the IP's that a particular customer uses and flag it when it's not from their home ISP or employer's http proxy.

    4. Don't allow wire-transfers or on-line bill pay of large amounts to arbitrary parties via the web banking interface.

    5. Look for *patterns*. Change of address followed by any kind of withdrawal or request for a card or checks. Transactions from different people's accounts sending money to the same or similar destination. Hire some game AI dude or data mining people to proactively look for fraud in real time instead of waiting for customers to report missing funds.

    6. Criminally investigate fraud. Don't just push the problem back on the customer or write it off as a business expense, actually go out and prosecute the people committing the fraud. Hire the RIAA's legal staff and put them to good use.

    7. Implement an undo. On-line transactions should only be allowed to/from banks and financial institutions that pledge to reverse any disputed transaction (instantly) and assist in investigating those who would have benefited from it.

    Just my thoughts.
  • by Alain Williams ( 2972 ) <addw@phcomp.co.uk> on Friday June 29, 2007 @02:55PM (#19692381) Homepage
    At least twice this year I have had someone from the bank 'phone me up out of the blue, say that they are from Nat West Bank and that the need to talk to me about something ... but first would I prove who I was by answering some questions.

    My reply: certainly, but they must prove who they are first.

    Oh, no - that is not the way that they do things, I must prove who I am first -- by answering exactly the same security questions that someone phishing would want to know. Needless to say: I refused.

    I then took this as a complaint to the bank chairman - and have received platitudes as to how they take security seriously, burble, burble, ... I'm not going to let this go: I shall chase them. I should be OK since I won't give the information out, but many people will do so.

    Banks are crap.

  • Re:Interesting (Score:4, Insightful)

    by MightyYar ( 622222 ) on Friday June 29, 2007 @03:04PM (#19692517)
    Let me reverse that - will they let me audit THEIR systems to make sure that the security breach isn't from THEIR end?
  • by CastrTroy ( 595695 ) on Friday June 29, 2007 @03:11PM (#19692615)
    I was just thinking about something similar. If the bank is so worried about the user's system being comprimised, then they should send out CDs with a VMWare image that the user can run so that it's known to be safe. There's probably still some attack vectors, because the Host OS could be majorly compromised, but it would make the process a whole lot more secure. But the VM Image could be signed, so that it could be verified to be unchanged upon each boot, and the memory contents could even be kept encrypted. It would also make sense for the access point of the bank not to be an actual web page you could visit with any browser, preventing people clicking on links in their email, or even being used to visiting the site in the browser. It would be plenty fast for online banking, and would take a lot of the risk out. But then again, they're probable going to just keep on adding layer after layer of stupid "security" functions like asking you your mother's maiden name (because nobody knows that information).
  • by AK Marc ( 707885 ) on Friday June 29, 2007 @03:21PM (#19692783)
    Rather than arbitrarily root around a technician will probably come to your home, and check you OS version and patches, anti-virus version and updates, firewall, ... all while you watch.

    Well, even that seems objectionable. The only reason they would need to do that is if there has been a loss and they want to pin it on someone other than themselves. So, they aren't even "looking" at the computer, they are there for one and only one reason, document security holes. Whether one of those holes were used doesn't matter. If they document enough, then they will shift the blame to the customer. Why should I go out of my way to help the bank deny me the money I deposited into it?
  • by jimicus ( 737525 ) on Friday June 29, 2007 @03:43PM (#19693101)
    Anyone who's ever dealt with the kind of call centres you get with banks knows what's going to happen.

    [Rings up to complain of fraud]

    Bank: Hello, this is ${BANK}, how can I help you?
    Customer: Yes, I appear to have a transaction for £3000 leaving my account which I don't know anything about.
    Bank: OK, I see you use our Internet banking service. Do you have antispyware software on your computer?
    Customer: No, I use a....
    Bank: Do you have antivirus software on your computer?
    Customer: No, I use a Mac....
    Bank: No antispyware, no antivirus. Not our problem. Goodbye.

  • by macemoneta ( 154740 ) on Friday June 29, 2007 @04:16PM (#19693521) Homepage
    One of my banks has a bad SSL certificate configuration.

    I emailed then to let them know. Their response? "Clear your cache and cookies".

    I thanked them and explained that the problem wasn't on my end, that Verisign actually documented their problem and provided them with the URL. Their response? "Maybe the date on your computer is wrong, our certificates expire in 2011".

    I again explained that it wasn't a certificate expiration issue, and in fact the certificate in question expired in 2009. Their response? "No one else is reporting the problem". I stopped reporting the issue, and we started moving money elsewhere.

    The problem isn't so much that they didn't have a properly configured certificate, the problem was their response to a security issue. The ticket went back and forth several times (to multiple representatives), and there was no automatic escalation or intercept. The ticket was reporting a security matter, but again, there was no intercept. I can understand not having tier 1 customer support be security experts, but the exchange exposed a complete lack of proper security practices and procedures.

    I am not now, nor have I ever been impressed with the security practices at any bank. Some are just not as bad as at others. They will never be permitted to lay hands on a computer of mine.
  • Re:Ill conceived (Score:2, Insightful)

    by robo_mojo ( 997193 ) on Friday June 29, 2007 @05:20PM (#19694319)
    "Why not provide customer with an anti virus/malware/spyware of bank's choosing before letting customers make transactions ?"

    Because that means the bank would be responsible if something went wrong. And the banks don't want that responsibility, hence this whole deal.
  • by Anonymous Coward on Friday June 29, 2007 @06:27PM (#19694991)
    which is why i use a bootable puppy linux CD to surf the internet.
  • by Hecilwe ( 681537 ) on Saturday June 30, 2007 @11:34AM (#19699697)
    The tech they send out probably won't be able to take your word for it.

    In fact, he'll probably be outfitted with a CD that has programs on it that root around inside your machine and sends the information back home via the Internet. In a perfect storm of stupidity, the programs would have to be run as Administrator.

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...