Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Experts: Don't use Apple Pay, CurrentC until crooks get a shot at them

Tim Greene | Nov. 6, 2014
Despite designers’ diligence, these payment systems haven’t been tested by real-world criminals

Criminals will of course try standard attacks -- buffer overflow, man-in-the-middle, SQL injection to see if they will work against some elements of the systems, Gorup says.

Attackers are essentially businesspeople and will focus their efforts based on potential returns, adds Olson. "Until NFC-based systems become responsible for a large proportion of in-store payments, criminals will likely take the path of least-resistance and focus on the old technology," he says.

Meanwhile, Polancich says there are more effective, less technical means of keeping your credit purchasing safe rather than fretting over cards vs. mobile payments. These include diligent monitoring of accounts and credit status, updating passwords, using complex passwords and finding out how intermediaries store and purge your credit information. "It takes a lot of work," he says, but, "being on the ball with that can save you years of misery" that can result from having your identity stolen.

Letting these technologies mature before using them may be the way to go from a security standpoint, Maiffret says. "Some of the best advice to give to consumers in this space is simply to wait a while until the technology has been more thoroughly put under the microscope by researchers," he says.


Previous Page  1  2 

Sign up for CIO Asia eNewsletters.