Feeds

Visa trials RF credit cards

Security implications unclear

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Consumers in Malaysia will soon be able to pay for their shopping with contactless, EMV standard smart cards, as Visa does away with the need for a signature with the launch of its new system, Visa Wave.

The company is running a four-month trial with 2000 Visa customers and over 150 merchants. The idea behind it (apart from selling lots of card readers) is to speed up the payment process. This, Visa hopes, will encourage people to use their cards more often in place of cash. Cardholders just need to wave their card near (within 4cm) the reader and the transaction goes through.

The move contrasts sharply with the added layers of secure authentication in Europe and the UK. To pay in person in Europe, and soon in the UK, we have chip-and-PIN-and-signture, while Asia Pacific does away with the authentication step altogether.

The implications for security and fraud are not altogether clear, particularly with respect to skimming the card details, and the possibility of card cloning. These are the issues that chip and PIN is being introduced to tackle: a cloned card is useless if it is not accompanied by the correct PIN.

The Visa Wave system seems similar, in terms of risk, to using your card in a ticket machine at the train station, for example. In this case, you insert your card, the details are read and the cost of the ticket is debited from your account without any further authentication.

However, what is not clear from the announcement is the interaction between the card and the reader. The important question is whether it would be possible to skim card details without a person's knowledge, for example, by scanning handbags and pockets with a duplicate reader on a busy train.

One would hope that a company like Visa would make sure that the data on the card is properly encrypted, but so far we have not been able to confirm those details with them. ®

Related stories

UK credit card fraud down 8%
Boffins test voice-activated secure credit card
Brits are crap at password security
Open and helpful community - of credit card thieves
Chip and PIN: not enough to beat card fraud

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.