Feeds

Net shoppers bullied into being Verified by Visa

When voluntary means mandatory

Beginner's guide to SSL certificates

One card issuer, MBNA, told Steve that you are only able to avoid enrolling by clicking "not at this time" three times. His main card is held with Egg but unfortunately his attempts to make himself understood by the bank have floundered.

"Every person I speak to has either said that the system is optional, or that they don't know whether the system is optional or not.

"They have taken my complaint to be 'Verified by Visa is insecure' but my complaint is that I have chosen NOT to enrol, since I do not believe it makes me any more secure. But because of the fraud prevention system my card is blocked every time I choose not to enrol in Verified by Visa."

Steve is constantly having to unlock his card because of his doubts over the system. Worse still he's never quite sure which merchants are signed up to the scheme.

"This seems like a strange way to implement a voluntary system. On most of the retailers' websites there is no clue that you are about to be challenged by Verified by Visa until you attempt to complete the transaction. This means that you trigger the "fraud protection" unintentionally. And when you have located a retailer who doesn't require Verified by Visa to complete a purchase, you can't because your account is on hold.

3rd Man's Goodwill said that uptake of Verified by Visa by both merchants and consumers is low. "Customers don't like it because they get taken to a third-party website to enter their information. They have a new password to remember. How it's implemented varies from bank to bank," he explained.

Worse still, in some cases resetting the password is all too easy. Fraudsters know this and go after these credentials which, once obtained, make it harder for consumers to deny responsibility for a fraudulent transaction. Phishing scams posing as Verified by Visa sites have sprung up targeting these login credentials. "We like to support anything that aims to cut plastic fraud but Verified by Visa is flawed. MasterCard SecureCode works in much the same way and is no better," Goodwill added.

Or as Steve puts it, "Frankly, I feel like I am being bullied into accepting a system which is as flawed as Chip and PIN. At least they had the decency to make Chip and PIN mandatory so we knew where we stood."

®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.