Page 39 - Banking Finance May 2020
P. 39

ARTICLE

                                                              Spyware: Spyware such as Trojan horse is generally
                                                              considered to be software that is installed on a computer
                                                              without the knowledge of the user and may take personal
                                                              information, business information, bandwidth; or processing
                                                              capacity and secretly gives it to someone else.


                                                              Card skimming: Card skimming is the illegal copying and
                                                              capture of credentials and PIN data on credit and debit
                                                              cards. Skimming can occur at any bank ATM or via a
                                                              compromised EFTPOS (Electronic Funds Transfer at Point of
                                                              Sale) machine. Captured card and PIN details are encoded
                                                              onto a counterfeit card and used to make fraudulent
                                                              account withdrawals and transactions.


         around 50,000 cyber frauds in the country's Scheduled  ATM Skimming: Fraudsters can attach false casings and
         Commercial Banks (SCB) in 2018-19 fiscal. In reply to an RTI  PIN pad overlay devices onto genuine existing ATMs, or they
         (Right to Information) query, the RBI stated that    can attach a camouflaged skimming device onto a card
         cybercrimes are related to ATM, debit and credit cards, and  reader entry used in tandem with a concealed camera to
         internet banking. It notified that over 50,547 banking frauds  capture and record PIN entry details.
         occurred in the SCBs that resulted in a loss worth of Rs.
         145.08 crore in the last fiscal. According to the RBI, the total EFTPOS Skimming: Electronic Fund Transfer at Point of
         number of banking frauds, including cyber, detected in all  Sale. A foreign device is implanted into an EFTPOS machine
         the SCBs are 59,826 and the loss incurred is around Rs.  that is capable of copying and capturing card and PIN details
         67,432.26 crore. More than 4,269 frauds occurred due to  processed through the machine. A compromised EFTPOS
         insiders in the banks, involving Rs. 1,014.97 crore loss during  terminal can only be detected by a physical inspection.
         the period, RBI added.
                                                              Cracking: Cracking includes gaining illegal entry into a PC
         Techniques of online banking frauds                  system. Nowadays, the Cracking of IP addresses is very
                                                              universal as it permits the crackers to imagine a fake online
         The following are some types of fraud are taking places in
         the recent time; these frauds mostly are performed by  character and carry out illegal dealings exclusive of using
                                                              his factual individuality.
         internet.
         Phishing:  A person's personal details are obtained by
                                                              Identity theft: A large number of identity theft crimes
         fraudsters posing as bankers, who launch a site similar to
                                                              occur over the internet. Criminals can get a hold of your
         that of the person's bank. They are asked to provide all
         personal information about themselves and their account  personal information through your computer and then set
                                                              up fake bank accounts or take put loans in your name.
         to the bank on account of database up gradation. The
         number and password are then used to carry out
         transactions on their behalf without their knowledge.  Fraud Risk Management:
                                                              There is need for a proper and comprehensive fraud
         Spam: Spam is an electronic 'junk mail' or unwanted  governance standard. The fraud risk management and fraud
         messages sent to your email account or mobile phone. They  investigation must be owned by the banks itself.
         may try to persuade you to buy a product or service, or visit
                                                              The following are the some ways of fraud risk
         a website where you can make purchases; or they may
         attempt to trick you into divulging your bank account or management.
         credit card details by clicking on some links provided in the     Every banking company must maintain strong
         spam mail.                                              "Transaction Monitoring Team". The role of transaction

            BANKING FINANCE |                                                                  MAY | 2020 | 39
   34   35   36   37   38   39   40   41   42   43   44