Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications

    Concerns About Contactless Card Security Could Slow Online Sales

    Written by

    Evan Schuman
    Published November 3, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A recent report that raised serious scientific questions about how secure the new contactless credit cards are could ultimately depress online sales, as consumers might doubt overall credit card security protections, according to retail analysts.

      The chief author of the report, Kevin Fu, a computer science professor at the University of Massachusetts, said it was easy for his team to scan names—and often credit card numbers and expiration dates—from consumers carrying contactless cards. “Weve demonstrated it walking by somebody in an elevator. You can skim all of their credit card information through their clothing, through their jeans, through their wallet,” Fu said.

      /zimages/4/28571.gifClick here to read more about the report.

      “Some fairly famous researchers decided not to look into the security of these credit cards because they heard they use encryption. Of course its going to be perfectly secure. Lets not put any time into looking at it. We were surprised at how easy it was to skim this kind of information.”

      Mark Rasch, a former federal prosecutor who is now a security consultant, said the degree to which the systems were penetrated is unexpected, but the fact that RFID- (radio-frequency identification) enabled credit cards are not secure is not a surprise.

      “Any time youre transmitting information, you run the risk that somebody else is going to intercept it and … retransmit it. Its always been a recognized security vulnerability of any transmittal type of system. What mitigates it principally is that it requires physical proximity to do it,” Rasch said. “Also, you generally have to do it as a one-off, one at a time. Its much harder to do it collectively. But what you can do is you can collect the transmittal information from a lot of people as they pass through.” As technology improves, Rasch said, thieves “could literally put something on a turnstile on a subway and just collect the information from just about everybody.”

      Fu added that an expected technique will be to secretly place small readers by building entrance panels since consumers are often told to place wallets against the panels to gain building entrance. A surreptitious reader could read all contactless credit cards while the authorized reader is looking for the security authentication device.

      Analysts agree that the simplest and most cost-effective way to address the contactless problem is to add some kind of a PIN or some other user-known authentication approach or password. The problem is that such an approach would defeat the entire convenience and efficiency advantage of a contactless card.

      Greg Buzek, founder and president of IHL Consulting Group, in Franklin, Tenn., said the move actually plays into the hands of MasterCard, which has said it will soon introduce a debit card program using just such an authentication system.

      The industrys initial response to RFID security fears was encryption, but the University of Massachusetts investigators didnt try to break the encryption. They merely passed it along.

      “The problem was that people put too much faith into encryption. Encryption is blocking someone from trying to get at the contents of the message,” Rasch said. “What this type of attack does is it says, I dont care what the contents of the message are. Im simply going to retransmit whatever the message was without knowing what it is. In other words, I dont want to be you. I just want to use your credit card information.”

      The very nature of RFID invites security problems, such as the ones these first-generation credit cards are experiencing, Rasch said.

      “This points out one of the problems with RFID. RFID is continuously transmitting. Its much less of a risk if its only transmitting at the point and time of authentication,” he said. “Theres still a risk that it might be a clone device. But if youre transmitting all the time, youre at risk all the time.”

      Rasch also said credit card players need to focus time and money on having the systems check each other instead of it being one way.

      “We spend a lot of time in RFID authenticating the card to the merchant. We need to spend an equal amount of time authenticating the merchant to the card. The idea is that I have an RFID card, which is saying, Im ready to buy something. Whos out there?” Rasch said. “What it should be saying is, Im ready to buy something. If youre an authorized, accredited merchant with a valid certificate, Ill exchange my information with you. It requires both. So you have some kind of a certificate built into the merchants request for information and there has to be a handshake between the two. You still would risk that somebodys going to get a valid merchants certificate and be able to suck up the data, but at least youll know where the compromise occurred and how it occurred and be able to mitigate the damages.”

      Fu added that such a system would bring with it “a lot of hidden costs and overhead.”

      Patti Freeman Evans, an analyst with Jupiter Research, in New York, said that the problems with contactless security perceptions could impact a lot more than merely those contactless cards. It could easily impact e-commerce sales as it plays off of existing consumer fears that its easy to get ripped off online because security is so lax.

      “This just feeds into all of the fears that people were having about this kind of technology and it undermines the credibility of the credit card security systems overall,” Evans said, adding that fraud concerns are “the biggest inhibitor to people transacting online. This just fuels the fire of consumer fears that they already have.”

      Retail Center Editor Evan Schuman can be reached at [email protected].

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on technologys impact on retail.

      Evan Schuman
      Evan Schuman
      Evan Schuman is the editor of CIOInsight.com's Retail industry center. He has covered retail technology issues since 1988 for Ziff-Davis, CMP Media, IDG, Penton, Lebhar-Friedman, VNU, BusinessWeek, Business 2.0 and United Press International, among others.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.