Transaction authentication number: Difference between revisions

Content deleted Content added
ce) "should become" -> "becomes" ; Archaic syntax again
ce) I could not understand that sentence, so I have change it completely.
Line 15:
 
However, as any TAN can be used for any transaction, TANs are still prone to phishing attacks where the victim is tricked into providing both password/PIN and one or several TANs. Further, they provide no protection against [[man-in-the-middle attack]]s where an attacker intercepts the transmission of the TAN and uses it for a forged transaction.
Especially when the client system becomes compromised by some form of [[Antivirus software|malware]] that enables a [[Hacker (computer security)|malicious user]], the possibility of an unauthorized transaction is high. It should be noticed thatAlthough the remaining TANs remainare uncompromised and can be used safely, eventhe though actionuser should betake takenan byappropriate the useraction as soon as possible.
 
== Indexed TAN (iTAN) ==