Feeds

The chip and PIN insecurity card

Point of sale theft

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Updated A supposedly more secure method of authorising credit cards transactions in the UK may play into the hands of fraudsters, a leading IT security expert warns. A banking industry organisation says such fears are misplaced.

Chip and PIN began in October 2003 and is designed to make credit and debit card purchases more secure. Customers are asked to enter a four-digit PIN code instead of signing to verify card transactions. Newly-issued credit and debit cards will come with smart chips to recognise this PIN number when transactions are processed. Up to 130m new Chip and PIN cards will be sent out by the end of the year, at which point retailers who haven't introduced the new scheme become liable for fraudulent transactions.

Professor Ross Anderson, from Cambridge University, warns that the system could make it easier for crooks to capture vital security codes. "Now we're all being trained to use our pins at the point of sale it's a simple matter to set up a market stall and capture card and pin data. They can make up forged cards and use them, for example, at cash machines," Anderson told the BBC.

Recently, fraudsters have upped their efforts to harvest PIN details of potential victims by using fake ATM machines and other technical trickery. However, a spokesman for banking organisation APACS, said that fraudsters lack the resources to fabricate counterfeit Chip and PIN cards, which would be far more expensive to produce. He added that the earlier introduction of Chip and PIN-style schemes in France had led to a 80 per cent reduction in card fraud.

Anderson's concern is that once a fraudster knows a PIN, they don't need to copy the chip. All you need is to copy of the magnetic strip and use the card in an ATM that only reads the strip. These type of ATMs are common outside of the UK. This is possible because the same PIN is used for the Chip and magnetic strip on a UK card. ®


Related stories

Chip and PIN intro fuels mini-boom in card crime
The ATM keypad as security portcullis
Retailers still not prepared for Chip and PIN
Women are crap with PIN numbers - shock survey
UK credit card fraud down 8%

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
JLaw, Kate Upton exposed in celeb nude pics hack
100 women victimised as Apple iCloud accounts reportedly popped
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.