Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, with credit card companies revealing double-digit increases in its use during the first quarter of 2020. Contactless payment was first used in the 1990s and currently with Covid companies and consumers are looking for ways to conduct business with as little physical interaction as possible.

Organisations have been steadily increasing reliance on digital options and implementing new regulations for all sorts of interactions. For example, event management asks patrons not to bring bags or purses and to empty their pockets at metal detectors in order to streamline traffic flow at gates and ticket booths.

Consumers are also minimising what they carry, which means less cash on hand. The more they can conduct business with their phone, the better, for convenience and efficiency. But given this shift to using our phones for payment, are organisations doing enough to ensure mobile security?

The Rising Popularity of Contactless Payment

Non-contact forms of payment have been put to use mostly by corporations. The move to digital payments has been slow for small and mid-size businesses (SMEs), which often lag behind enterprises when it comes to digital and cyber security enhancements.

Expect this to change as more customers feel that using their phone and contactless mobile payments is the safest way to exchange money.

Further, don’t expect that credit card companies are the only players in this contactless exchange. Apps like Venmo, Zelle and PayPal, as well as company-owned payment options, are more frequently preferred by consumers.

With Convenience Comes Risk

Contactless payment is convenient, but like any technology, it comes with both mobile security and data privacy risks. Because you don’t need a PIN, a lost credit card or stolen device potentially gives a criminal easy access to your account.

  • A phone without the proper security features in place makes it easy for anyone to ring up purchases without detection. Because many of these transactions happen without a receipt, it is difficult for the owner to prove the charges were fraudulent.
  • Contactless credit cards use radio frequency identification (RFID) to transmit the data, and hackers have been successful in making fake scanners or using card skimmers designed to steal data transmitted via RFID.
  • If a hacker gets the information from the card or wallet, they can create cloned cards. Mobile wallets, on the other hand, rely on near-field communication (NFC) that transmits data within a very close range. It remains one of the most secure ways to conduct financial transactions.

Since contactless payments can decrease fraud through more secure methods of transmission and mobile device locks, the biggest threat could be data privacy.

Contactless systems collect immense amounts of data from users and can use that information to track them. Any time you download an app to your smartphone, there is a risk of malware or man-in-the-middle (MitM) attacks that can access information stored on the device, bank account numbers, personal information or confidential work files to name a few types, as well as social engineering and phishing scams designed to steal sensitive data.

Mobile Security Decreases Risk

While consumers need to be aware of the risks involved with contactless mobile payments, organisations also need to mitigate potential risks on their side, especially if mobile devices within the corporation are used for both personal and business use.

Tapping Without Checking

Contactless payments are so simple to make that it’s easy to forget to check the amount before tapping. Research from card payments firm PaymentSense in 2017 showed that we’re more likely to be overcharged when we pay using contactless technology than any other way. They set up an experiment in London to check how good we are at spotting being charged the wrong amount.Their pop-up coffee stall accepted contactless payments but deliberately entered the wrong amount into the card machine. 

It found around 53% of shoppers were overcharged when using contactless payments compared to 41% when using cash. The research also found as many as 15% don’t request a receipt so we’re even less likely to notice we’ve been charged incorrectly.

Security Intelligence:       Cyware:           LoveMoney

You Might Also Read: 

Hackers Are Focused On Hijacking Payment Data:

 

« Australia To Spend Another A$1billion On Cyber Security
Hackers Targeting Turkey & Syria With Spyware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.