Content deleted Content added
Added Unreferenced and off-topic to paragraph on Identity Theft |
m Date/fix the maintenance tags |
||
Line 16:
Should the client system become compromised by some form of [[malware]] that enables a [[cracker|malicious user]] to obtain both the login data and a TAN number (in some systems, a TAN is usable for some minutes after the initial insertion), the possibility of an unauthorised transaction is high. It should be noticed that the remaining TANs remain uncompromised and can be used safely, even though action should be taken by the user as soons as possible.
{{Unreferencedsect|date=January 2007}}▼
▲{{Unreferencedsect}}
{{ Off-topic-other | identity theft }}
Recent research has shown that slightly over half of all [[identity theft]] is committed by an insider, often a family member. An insider would, of course, have greater access and opportunity to gain simultaneous access to both the TAN list and to the user's password. While an improvement over simple single-password methods, it is important to keep in mind that a system's security strength depends on multiple factors.
[[Category:Authentication methods]]
|