[LINK] Study: surfers ignore common security cues on banking sites
Kim Holburn
kim.holburn at gmail.com
Tue Feb 6 20:55:25 AEDT 2007
http://arstechnica.com/news.ars/post/20070205-8771.html
> Study: surfers ignore common security cues on banking sites
>
> 2/5/2007 2:22:37 PM, by Eric Bangeman
>
> Password protection has its limitations, especially when it comes
> to things like online banking. That's why millions of phishing
> attempts are made every day—it's relatively easy to craft realistic-
> looking web pages that convince users to divulge passwords and
> other personal details. Financial institutions are well aware of
> this and as a result, have come up with additional authentication
> measures for their customers. A new study conducted by researchers
> from MIT and Harvard casts doubts on the efficacy of such measures.
>
> Researchers studied a system used by a handful of financial
> institutions where customers select an image that will always be
> displayed when they log into their account. The site authentication
> images are a cue for bank customers that the page they are viewing
> is in fact legitimate.
>
> Last fall, the researchers took 67 study participants and watched
> them go through typical online banking activities. The researchers
> had removed the site authentication images to see how many of the
> participants would log in anyway. The results were disturbing. Of
> the 60 participants who made it through the study (the other seven
> failed to follow instructions or didn't have their actions fully
> captured by researchers), only two of them found something fishy
> with the image-less login pages and refused to log in. The other 58
> signed on with little or no trepidation.
>
> Even more troubling is that 20 of the participants were given
> additional instructions "to behave securely." Despite the warnings,
> lack of site authentication images, and even the researchers'
> introducing some blatant spelling errors, the participants
> willingly logged in and attempted to go about their online banking
> business. "We were surprised to find that participants assigned to
> the security primed group behaved less securely than those in the
> role playing group, who had no security-priming," noted the study's
> authors.
>
> The study's conclusions should give added hope to phishers around
> the world: users typically don't play close attention to security
> indicators. All participants entered their passwords even when the
> HTTPS indicators were removed indicating that the site they were
> accessing was not secure. Site authentication images were of little
> help either, as removing the image and replacing it with a "this
> site is being upgraded" message failed to deter the vast majority
> of subjects.
>
> .......
--
Kim Holburn
IT Network & Security Consultant
Ph: +39 06 855 4294 M: +39 3342707610
mailto:kim at holburn.net aim://kimholburn
skype://kholburn - PGP Public Key on request
Democracy imposed from without is the severest form of tyranny.
-- Lloyd Biggle, Jr. Analog, Apr 1961
More information about the Link
mailing list