Feeds

Net shoppers bullied into being Verified by Visa

When voluntary means mandatory

The Essential Guide to IT Transformation

One card issuer, MBNA, told Steve that you are only able to avoid enrolling by clicking "not at this time" three times. His main card is held with Egg but unfortunately his attempts to make himself understood by the bank have floundered.

"Every person I speak to has either said that the system is optional, or that they don't know whether the system is optional or not.

"They have taken my complaint to be 'Verified by Visa is insecure' but my complaint is that I have chosen NOT to enrol, since I do not believe it makes me any more secure. But because of the fraud prevention system my card is blocked every time I choose not to enrol in Verified by Visa."

Steve is constantly having to unlock his card because of his doubts over the system. Worse still he's never quite sure which merchants are signed up to the scheme.

"This seems like a strange way to implement a voluntary system. On most of the retailers' websites there is no clue that you are about to be challenged by Verified by Visa until you attempt to complete the transaction. This means that you trigger the "fraud protection" unintentionally. And when you have located a retailer who doesn't require Verified by Visa to complete a purchase, you can't because your account is on hold.

3rd Man's Goodwill said that uptake of Verified by Visa by both merchants and consumers is low. "Customers don't like it because they get taken to a third-party website to enter their information. They have a new password to remember. How it's implemented varies from bank to bank," he explained.

Worse still, in some cases resetting the password is all too easy. Fraudsters know this and go after these credentials which, once obtained, make it harder for consumers to deny responsibility for a fraudulent transaction. Phishing scams posing as Verified by Visa sites have sprung up targeting these login credentials. "We like to support anything that aims to cut plastic fraud but Verified by Visa is flawed. MasterCard SecureCode works in much the same way and is no better," Goodwill added.

Or as Steve puts it, "Frankly, I feel like I am being bullied into accepting a system which is as flawed as Chip and PIN. At least they had the decency to make Chip and PIN mandatory so we knew where we stood."

®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.