Dag-Erling Smørgrav wrote:
Michelle Sullivan <miche...@sorbs.net> writes:
User gets an email saying his banking details are compromised, and to
update them now.  User clicks the link and gives banking details to
phishing site as well as having a keylogger and rootkit installed
during the process.  User has bank account hacked.  Where did the bank
go wrong?
Banks and financial institutions have whole teams working 24/7

Not out side of Europe (and those that do are not large.)

, usually
in cooperation with national authorities, to detect, investigate and
shut down phishing campaigns, and to warn customers (either directly or
through mass media) of particularly large or well-executed campaigns.

No.
In the EU and EEA, banks are liable for losses in excess of €150 unless
the customer acted “with intent or gross negligence”, but the definition
of “gross negligence” is fluid.  Legal precedent in Norway is to hold
the customer liable only if the email was “an obvious forgery”, for some
definition of “obvious”.
Maybe that will change stuff.

TL;DR: yes, banks are held liable for losses attributable to phishing.

No, and I can tell you I had a discussion with some un-named bank (but very well known, very very very well known) online security managers and I said to them, hold the users responsible for 419 type spams. The response was a resounding 'no', and not because of regulation, but purely because they were worried about losing market share to other banks through bad publicity!

Source: I do this for a living (although not at a bank).

DES

So do I, have been in the business I am since 2000, and a lot of what I do and who for I can't even mention. What I can tell you is I built SORBS, I still run SORBS and I still work closely with LEOs and Banks (amongst others) dealing with online security for the company that now owns SORBS.

This is getting way off-topic though. The topic is about forcing the use of https over http in the name of 'securing' an inherently insecure and compromised network, in the name of privacy for a couple of people. Wrong solution, for the wrong reasons, svn over https is already available those people that believe it gives security should use it and get out of other peoples business. If they really want to make an impact on the perceived problem they should target the malicious actors and the use of Tor as a pseudo secure platform (ie the few that would use http over Tor for downloading source that don't know the dangers should probably learn or not use Tor in the first place!)

Regards,

Michelle
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to