Transaction authentication number: Difference between revisions

Content deleted Content added
ce) "of little use" -> "useless"; An illogical, counterintuitive and misleading idiom. See plain English
ce) "should become" -> "becomes" ; Archaic syntax again
Line 15:
 
However, as any TAN can be used for any transaction, TANs are still prone to phishing attacks where the victim is tricked into providing both password/PIN and one or several TANs. Further, they provide no protection against [[man-in-the-middle attack]]s where an attacker intercepts the transmission of the TAN and uses it for a forged transaction.
Especially when the client system should becomebecomes compromised by some form of [[Antivirus software|malware]] that enables a [[Hacker (computer security)|malicious user]], the possibility of an unauthorized transaction is high. It should be noticed that the remaining TANs remain uncompromised and can be used safely, even though action should be taken by the user as soon as possible.
 
== Indexed TAN (iTAN) ==