For computer attacks on banks,

their quantity and quality will probably remain rcs data practically at the same level. Here, we should pay attention to two main vectors – target phishing mailings of Trojan programs by e-mail and hacking popular sites for subsequent distribution of malware. Individual attackers and their groups will continue direct attacks on ATMs using hardware (blackbox, etc.), this is a potentially less profitable method, but also less complex. Therefore, our task as a regulator and the task of the banks themselves is to continue to keep our finger on the pulse, not only to promptly respond to incidents, but also to create conditions to prevent these incidents from occurring, if possible.

The State Duma is considering

A bill on the exchange of data between mobile operators and banks on the owners of telephone numbers. Why is it ne?

— We are trying to ensure that all banks

have equal access to the information that operators how important are reports for your business? have, since we are talking about security – after all, a mobile phone is becoming a virtually universal means of identifying a person.

The bill will enable banks to verify that the phone number agb directory from which a transaction is made actually belongs to the account owner.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top