How secure are chip-based cards?
Source: Vistar Communications for Paladion , Author: Prashant Verma
Posted: Thu August 30, 2018 5:35 pm

UAE. Chip based cards having Wifi icon work on RFID or NFC technologies (but not on WiFi). It operates in nearby local field. This is like our MiFi based access card, which is flashed against a reading device to record our attendance or grant us door access.

The user of such a card walks near to the payment terminal (RFID or NFC reader) and flashes the card and a debit happens.
How this can be hacked?
A rouge reading device need to carried by hacker to sniff or record the authentication data from card (CVV number, expiry date etc). If you and me are doing a handshake, your wallet in your pocket has a NFC card and my pocket has a battery operated reader, your card emits and my reader sniffs. I can clone your card or use card auth data I recorded to transact fraudulently.
What can user do?
NFC protected wallets, that contain the emanation within the wallet (plenty of them available in ecommerce websites. Home remedy or hacks like wrap your nfc card in aluminium foil do work sometimes.
What can card issuers and payment processors do?
Secure the card data by adapting adequate protection of authentication and encryption data. Remember PCI DSS standards and apply them in the context of NFC and RFID.

NFC technology specific secure configurations need to be applied.

Photo Caption: Prashant Verma, AVP – Threat Management at Paladion



date:Posted: November 14, 2018
INTERNATIONAL. RPA software spending is on pace to total US$2.4 billion in 2022.
date:Posted: November 14, 2018
UAE Diversity & Inclusion in the Workplace Survey reveals strength in diversity and opportunities for improvement; 74% of women aspire to senior leadership roles.
date:Posted: November 13, 2018
UAE. Secrets management refers to the tools and methods for managing digital authentication credentials (secrets), including passwords, keys, APIs, and tokens.