Security Risks of Contactless Payment

Consumers are driving the push towards contactless payment, with credit card companies revealing double-digit increases in its use during the first quarter of 2020. Contactless payment was first used in the 1990s and currently with Covid companies and consumers are looking for ways to conduct business with as little physical interaction as possible.

Organisations have been steadily increasing reliance on digital options and implementing new regulations for all sorts of interactions. For example, event management asks patrons not to bring bags or purses and to empty their pockets at metal detectors in order to streamline traffic flow at gates and ticket booths.

Consumers are also minimising what they carry, which means less cash on hand. The more they can conduct business with their phone, the better, for convenience and efficiency. But given this shift to using our phones for payment, are organisations doing enough to ensure mobile security?

The Rising Popularity of Contactless Payment

Non-contact forms of payment have been put to use mostly by corporations. The move to digital payments has been slow for small and mid-size businesses (SMEs), which often lag behind enterprises when it comes to digital and cyber security enhancements.

Expect this to change as more customers feel that using their phone and contactless mobile payments is the safest way to exchange money.

Further, don’t expect that credit card companies are the only players in this contactless exchange. Apps like Venmo, Zelle and PayPal, as well as company-owned payment options, are more frequently preferred by consumers.

With Convenience Comes Risk

Contactless payment is convenient, but like any technology, it comes with both mobile security and data privacy risks. Because you don’t need a PIN, a lost credit card or stolen device potentially gives a criminal easy access to your account.

  • A phone without the proper security features in place makes it easy for anyone to ring up purchases without detection. Because many of these transactions happen without a receipt, it is difficult for the owner to prove the charges were fraudulent.
  • Contactless credit cards use radio frequency identification (RFID) to transmit the data, and hackers have been successful in making fake scanners or using card skimmers designed to steal data transmitted via RFID.
  • If a hacker gets the information from the card or wallet, they can create cloned cards. Mobile wallets, on the other hand, rely on near-field communication (NFC) that transmits data within a very close range. It remains one of the most secure ways to conduct financial transactions.

Since contactless payments can decrease fraud through more secure methods of transmission and mobile device locks, the biggest threat could be data privacy.

Contactless systems collect immense amounts of data from users and can use that information to track them. Any time you download an app to your smartphone, there is a risk of malware or man-in-the-middle (MitM) attacks that can access information stored on the device, bank account numbers, personal information or confidential work files to name a few types, as well as social engineering and phishing scams designed to steal sensitive data.

Mobile Security Decreases Risk

While consumers need to be aware of the risks involved with contactless mobile payments, organisations also need to mitigate potential risks on their side, especially if mobile devices within the corporation are used for both personal and business use.

Tapping Without Checking

Contactless payments are so simple to make that it’s easy to forget to check the amount before tapping. Research from card payments firm PaymentSense in 2017 showed that we’re more likely to be overcharged when we pay using contactless technology than any other way. They set up an experiment in London to check how good we are at spotting being charged the wrong amount.Their pop-up coffee stall accepted contactless payments but deliberately entered the wrong amount into the card machine. 

It found around 53% of shoppers were overcharged when using contactless payments compared to 41% when using cash. The research also found as many as 15% don’t request a receipt so we’re even less likely to notice we’ve been charged incorrectly.

Security Intelligence:       Cyware:           LoveMoney

You Might Also Read: 

Hackers Are Focused On Hijacking Payment Data:

 

« Australia To Spend Another A$1billion On Cyber Security
Hackers Targeting Turkey & Syria With Spyware »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Nubeva Technologies

Nubeva Technologies

Nubeva provide a breakthrough TLS Decrypt solution with Symmetric Key Intercept to gain the visibility needed to monitor and secure network traffic.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.

GMO Cyber Security

GMO Cyber Security

GMO Cyber Security is an information security company that focuses mainly on vulnerability diagnosis. It is Japan's leading white hat hacker organisation.