- Joined
- Nov 27, 2000
- Messages
- 27,274
- Reaction score
- 7,370
Seems like this is a govt initiative and more banks will follow suit?
true multifactor authentication is achieved when using web browser. unlike mobile app which everything is thru the appYes banking apps should disable user ID and password to login mobile browser or app. This is really very insecure due to phishing scam.
Can only login mobile IB through fingerprint or face only.
I believe remote hackers cannot bypass the fingerprint and face login.
if you ever used hardware token before, it requires that users enter some combi onto the device, and then enter the generated response from the token.I am unconvinced that a hardware token is effective against scams. The low-ses, non-techsavvy will gladly enter the 2FA generated by a hardware token into the scammer's website to authorise the transaction, which was what they did with the SMS OTP.
Letting the bank decide the IT requirements to use their online banking should be more effective. Another way will be allowing only people that fits a certain profile use online banking (such as tertiary educated) but this will cause more political backlash.
Provided you dun bring the hw token out. If not it is not secure too if someone stole it and know your account name and password.if you ever used hardware token before, it requires that users enter some combi onto the device, and then enter the generated response from the token.
it's much more secure than pressing approve and placing your thumb on your fingerprint sensor
How the hell ppl know that token is yours if a random fella picked it up? You write your user id and pw on it ar LOLProvided you dun bring the hw token out. If not it is not secure too if someone stole it and know your account name and password.
If use fingerprint, even if you lose your phone, no one can enter the phone.
Hw tokens are using 2FA. Whereas fingerprints are like passkeys. Passkeys are the preferred login method now.
if you ever used hardware token before, it requires that users enter some combi onto the device, and then enter the generated response from the token.
it's much more secure than pressing approve and placing your thumb on your fingerprint sensor
You really show ur ignorance. Please go and read more on 2FA and passkeys.How the hell ppl know that token is yours if a random fella picked it up? You write your user id and pw on it ar LOL
Use fingerprint, lose phone, noone can enter your phone?
You never see before how to lift a fingerprint from a phone surface and use it to unlock the phone?
Just bcoz 1 is preferred, doesn’t mean its more secure![]()
Exactly a lot of jokers wet their pants at fancy security keywordsHow the hell ppl know that token is yours if a random fella picked it up? You write your user id and pw on it ar LOL
Use fingerprint, lose phone, noone can enter your phone?
You never see before how to lift a fingerprint from a phone surface and use it to unlock the phone?
Just bcoz 1 is preferred, doesn’t mean its more secure![]()
ocbc app is not an antivirus leh. how you expect it to monitor for malicious behaviour?Anyway so many OCBC/MAS IBs here.
Look, when their banking app detected officially safe applications as malware then it is a false positive which mean MEGA FAIL, no excuses.
Whether an app is malicious or not is not determined by whether you use this app/android or not.
It is if the application exhibit malicious behaviour, not because some loser ah beng on EDMW think so.
it's funny i said something similar to you but decided to be kind and edited and removed it.You really show ur ignorance. Please go and read more on 2FA and passkeys.
If u think hw token is the way, then you better dun bring it out and haolian..
Cannot use paynow. Song boif other banks implement same thing, I might jus go for 2phones instead. 1 phone especially for banking apps use only, OTP will send to phone 2 which is daily usage. not sure if this way hackers can still put malware through.
I feel OCBC should give the option of signing a waiver to be able to use the ocbc app no matter what is installed on their phone, in return if the user does get scammed or hacked, it's entirely on the user. OCBC will bear no responsibilities.OCBC’s new anti-scam measure upsets some users; bank clarifies only apps with risky permission settings flagged
https://www.channelnewsasia.com/sin...malware-anti-scam-permission-settings-3687336
Huh? Now something new, only apps with risky permission settings flagged...it said not all apps from unofficial platforms will be flagged by its latest security update.
He added that other sideloaded apps that do not have the risky permission settings will not be affected.
So OCBC dug deep enough to check on all the apps' permission? Wow!... invasion of privacy!
WT!
I believe hardware tokens have some hidden issuesif you ever used hardware token before, it requires that users enter some combi onto the device, and then enter the generated response from the token.
it's much more secure than pressing approve and placing your thumb on your fingerprint sensor
Such waiver no use 1 if found the cause is the bank's fault for lack of security measures. Mas will just force bank to compensate. Whether is mas help to compensate, or bank compensate, only they know.I feel OCBC should give the option of signing a waiver to be able to use the ocbc app no matter what is installed on their phone, in return if the user does get scammed or hacked, it's entirely on the user. OCBC will bear no responsibilities.
There's a higher security hardware token than the ones bank use, but very costly. Usually given to vips or staffI believe hardware tokens have some hidden issues
(apart from cost)
its been in use for years
but no succession in place
limited circulation and availability
with no proper explaination for discontinuation
its strange for a tech product
issues are not made known
to protect those currently using
usa gov agencies and contractors
use fido2 keys now
which can generate pin for authentication
support in-key biometrics
reference
https://fidoalliance.org/u-s-general-services-administrations-rollout-of-fido2-on-login-gov/https://www.identiv.com/products/logical-access-control/utrust-fido2-security-keys/gov