Should I Use Contactless (NFC) Payment Cards?
This article was first published by Andrej Probst, an innovation manager, on Rozumy.sk, a technology blog covering innovation, management, banking and security.
Nowadays, almost all smartphones contain NFC (Near field communication) technology.
Contactless cards use this technology when they communicate with contactless payment terminals to exchange needed information and proceed with the transaction.
However, you can also do this by using your smartphone.
Let’s use an Android phone in our demonstration.
- First, we are going to install the Banking card reader NFC (EMV) from Google Play. (You may find many similar applications.)
- Next, Enable NFC on your phone and start the application.
- Then, place the card next to the phone and the phone will show us information in EMV format (Europay, Mastercard, Visa)
Card details:
- Card Number
- Expiry date
- Card type - e.g. Master card, Visa card
- Type of application – For instance debit Mastercard
- Number of possible PIN retries
Details of the card
Last n transactions:
- Sum
- Date of the transaction
Last n transactions of a card
The bank or the car manufacturer has the authority to decide what will be stored on the card. The data is usually regarding the latest translations. You use this data when you try to prove a claim.
How safe are contactless compared to contact cards?
Let’s look at how we use the contactless cards.
(We randomly chose $20 as the maximum amount allowed for PINless transaction.)
- Paying at a payment terminal by placing the card against the machine. If you want to access more than $20 will be required to enter your PIN.
- Withdrawing money from an ATM requires inserting the card into the machine and entering your PIN.
- Paying via the Internet requires your card number, expiry date and the CVV code.
Now, compare contact and the contactless cards in two scenarios.
Scenario 1: The thief has physical possession of your card
“Good” for him as he can pay up to $20 without needing to enter the PIN. Many banks set amount limits for PINless transactions. When you exceed this limit, you will be required to enter the PIN.
Without the PIN, the attacker can’t access your money via the ATM.
If the cardholder gets notified of this transaction, he can request to block the card.
Scenario 2: The thief accesses your card via NFC
In this scenario, the thief doesn’t have your card but scan it using NFC. (He will have to get really close.) He can get read your card number and the expiration date. Fortunately, doesn’t have CVV code, which is required for many online transactions.
The poor guy won't be able to access money from an ATM because he doesn’t have the PIN.
He might be able to know other information, for example, the time of the latest transactions. However, how is that information useful for a card thief?
What do you learn?
No fear
If you like and use classic contact cards, then you don’t need to be afraid of contactless cards. If someone manages to steal your card, you can lose the amount allowed for the transaction.
No worry If you're worried about people can copying your data via NFC, you can use a special casing which protects the card from electromagnetic signals. Even if someone manages to scan the info, he will still need the PIN number and/or CVV code. But please take note and contact and ask your bank to know the data left on your cards.
Did we answer your question? Please feel free to contact us and follow us on Twitter @TeskaLabs.
Photo credits: Depositphotos
Most Recent Articles
- A beginner-friendly intro to the Correlator for effective cybersecurity detection
- Inotify in ASAB Library
- From State Machine to Stateless Microservice
- Entangled ways of product development in the area of cybersecurity #3 - LogMan.io
- Entangled ways of product development in the area of cybersecurity #2 - BitSwan
You Might Be Interested in Reading These Articles
Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security
In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.
Published on July 26, 2016
Google has introduced new rules about how mobile app developers and companies deal with customer impact on apps across the board. What is it?
The new regulations call for increased transparency with regards to how apps make use of customer data. Developers need to ensure that the way they handle user data - from how they collect it to what it might be used for - is perfectly clear to all users. In Google’s words, developers must “limit the use of the data to the description in the disclosure”. In layman’s terms, this means that data use and privacy policies need to be clearly visible on app descriptions in the Google Play store, and not simply within the app itself.
Published on October 10, 2017
The Security Vulnerability That Puts Millions of Application Backends at Risk. Yours Included
FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.
Published on December 15, 2015