Key Lessons from 2011 What Have We Learnt? Different Development Philosophies Banks Focus on Security and Interoperability Lots of documentation, Minimal.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Content Prepaid products – introduction and main advantages System Overview RCM System DCM system IR water meter
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
© John Wallace Mobile and Online Banking Security John Wallace Consultant, Resources Global Professionals.
Intuit QuickBooks Connect Intuit ® QuickBooks ® Connect/Mobile Extending the power of QuickBooks to the web and smart phones.
Win the Cyberwar on Mobile Banking and Payments
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Wi-Pow! A Smart Solar Wireless Charger Katrina Maranon | Erika Aggarao | Nilda Flores | Angelo Sulit BUSINESS AND PROFESSIONAL DISCOURSE – S38 Wire-free.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Implications and Security Issues of the Internet By Neelesh Patel.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
© 2003, Educational Institute Chapter 6 Point-of-Sale Technology Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
TEMENOS ROMANIA March 18, 2003 Every time a step ahead.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
“Turn you Smart phone into Business phone “
Methods of Payments Cash in Letter of Documentary Open Advance Credit Collections Account Most Advantageous to the Exporter Most Advantageous to the Importer.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Max Kramer  Transactions between consumers and businesses Cash Check Credit  Transactions between individuals Cash Check Credit 
Apple iPhone I-224 March 21, 2007 I-224 March 21, 2007.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
At its most basic definition, price is the monetary value charged for a product or a service – or the total value the consumer gives up in order to gain.
QR Codes By: Jayrell Ringpis. Overview What is a QR code? Who uses them and where? How do you read it? How do you create it? Why is it useful to you?
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
1990 – RIM begins selling wireless connectivity equipment 1997 – RIM receives the Emmy Award for technological innovation 1997 – listed on the Toronto.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
Delivery mechanisms for cash and voucher programs MBRRR Training Session 5.1.
Show me the money Succeeding with the recurring revenue model Mark Emanuelson Atlantic Technologies.
Investment offer. Gsafe LTD The company: Gsafe LTD Established on 2010 Business : eWallet & Payment for Smartphone.
QR Code. What is a QR code QR code is a quick response code It is a 2D barcode.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Types of Application Software Lesson Objective: Understanding the terminology behind the different types of application software Learning Outcome: Answer.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
Unified PC Maintenance Console (PCMC) - 1
Introduction to Softpay CP 105 Tier 1 Training Education and Support Technical Series : Tier 1 Core Software Technical Developer: Christopher Wallis –
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
What does Chip offer Banks today?. CARD TYPES CREDIT DEBIT CHARGE PRIVATE LABEL PRE-PAYMENT MULTI FUNCTION.
5 Hot Software for Small Business in Cloud computing continuously transforming the accounting industry by the way, accounting firms do accounting.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Shlomo Golsherazian Jeff Heiser Etana Kenter Michael Rosenberg A.J. Shah Chelsea Schneider Danielle Zimmerman.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile Device Security Management Leyna Belinsky.
Ransomware BISD Technology Department. Ransomware Ransomware is a type of malicious software (malware) that infects a computer and/or mobile device and.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Technology in Retail.
Implications of Digital Technology for Business and Customers
“About This Presentation”.
Various Types of Malware
Steps to Troubleshoot Norton 360 Error Norton 360 security software is all in one solution that combined online protection and performance tuning.
NORTON CUSTOMER SUPPORT NUMBER. NORTON CUSTOMER SERVICE.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Security of Handheld Devices
ACN Premium Technical Support
How to keep the bad guys out and your data safe
BullGuard Support. BullGuard- The Virus Protection Software Now a day’s variety of malware and viruses are attacking your systems and ultimately attacking.
Presentation transcript:

Key Lessons from 2011 What Have We Learnt? Different Development Philosophies Banks Focus on Security and Interoperability Lots of documentation, Minimal Change Restricts innovation ? Mobile Application Developers Fast to market, regular addition of new features “Rapid Development” (minimal documentation) Opportunity for errors? We will fix them in later releases Please Copy and Distribute

Key Lessons from 2011 Risk – Products are Insecure What a card looks like to a Square credit card reader Please Copy and Distribute

Key Lessons from 2011 Perceived Value of Data on Phone What is the Value of the Data on Your Smartphone iPhone sales in Lagos Same Connector used to Charge and Back Up Data Juice Jacking (DefCon 2011) Mobile charging point that doesn’t just charge your mobile device but instead takes advantage of automatic sync capabilities Please Copy and Distribute

Key Lessons from 2011 Malicious Applications Mobile Malware Applications that seek to retrieve credentials or fake transactions Principally Key-Loggers or Trojans QR Codes have been used to spread Malware Increase MNO’s Customer Service Costs Smart Tags Deliver the Same Functionality Sales of Mobile Anti- Virus Software is Minimal Please Copy and Distribute