This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Halifax wins fraud case after log files show judge that customer used his own card

Share this article:

Log files helped a bank to win a case against a customer who claimed he had been a victim of ATM fraud.


According to a report by Computing, a judge has ruled in favour of Halifax bank in the UK's first lawsuit over phantom withdrawals from cashpoints.


Customer Alain Job sued the high street bank, claiming that a fraudster withdrew £2,100 from his account at cash machines, despite the fact he did not lose his card and changed his PIN as soon as he received it.


Halifax refused to refund the sum and claimed that its chip-and-PIN system is secure. The suit was filed by Job after two critical pieces of evidence - the original ATM card and the Authorisation Request Cryptogram, that could have proved that the card's chip had been read and authenticated by the machine that were once held by Halifax, were destroyed.


The judge based his ruling on log files that showed that Job's real card had been used for the transactions.


Ross Brewer, vice president and managing director at LogRhythm, said: “This is a classic, real-world example of the value that log files have when it comes to forensic investigations. It should be a wake-up call to any organisation, which currently doesn't have any means of organising or reporting on log data.


“We are living in an increasingly litigious society which means that it is even more important for companies to be able to access and report on historical activity.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Chinese hackers steal confidential documents on Israeli missile defence system

Chinese hackers steal confidential documents on Israeli missile ...

Chinese hackers comprised the computer systems of three Israeli defence contractors between 10 October 2011 and 13 August 2012 in order to steal hundreds on confidential documents on Israel's Iron ...

Security researcher finds exploitable flaws in 14 antivirus engines

Security researcher finds exploitable flaws in 14 antivirus ...

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has found exploitable local and remote flaws in 14 of the 17 major antivirus (AV) engines used by most major AV ...

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...