Infracore LLC Blog

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud--13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.

According to Hackers, Windows 10 Security Passes t...
Tip of the Week: How Tracking Your Net Worth Can B...
 

Comments 1

AgustinMMontgomery on Wednesday, 19 September 2018 14:48

You have to share this wonderful article about how to handle the mobile payments and speedypaper review make it easier for the users to use it. Give us more blogs related to this.

You have to share this wonderful article about how to handle the mobile payments and [url=https://ukessaysreviews.com/speedyessay-co-uk-review/]speedypaper review[/url] make it easier for the users to use it. Give us more blogs related to this.
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Hackers Google Malware Software Microsoft Innovation Internet Data Tech Term Smartphones Backup Hardware Email Hosted Solutions Windows 10 Browser Android Business Continuity Business VoIP Mobile Devices Computer IT Services Managed IT Services User Tips Alert Data Backup Small Business Cloud Computing Productivity Miscellaneous Smartphone Ransomware Outsourced IT Office Workplace Tips Communications Computers Business Management Disaster Recovery Artificial Intelligence Communication Efficiency Cybercrime Law Enforcement Data Recovery Router Managed IT Services Productivity Money Passwords Windows 10 Telephone Systems How To Password Applications Facebook Virtualization Social Media Windows Collaboration Cybersecurity Chrome Network Internet of Things Saving Money Quick Tips Upgrade App Health Office 365 Gadgets Social Engineering Work/Life Balance Server IT Support Data Protection Microsoft Office Vulnerability Hacking Information Spam Wi-Fi Bring Your Own Device Save Money Two-factor Authentication Holiday Mobile Device Management Private Cloud Connectivity Apps Phishing Google Drive HaaS Automation IT Support Data Security Office Tips Scam Data Breach Word Unsupported Software Comparison Big Data Remote Monitoring Website CES Computer Care End of Support Remote Computing History Managed IT Electronic Medical Records Content Management Samsung Windows 7 Flexibility Training Settings Paperless Office Bandwidth Entertainment BYOD Business Intelligence Legal PDF Data Storage Blockchain USB Value Mobility Automobile Update Managed Service Identity Theft Firewall Networking Infrastructure Virtual Assistant Encryption OneNote Managed Service Provider Employer-Employee Relationship IT Management Redundancy Data Management Government Avoiding Downtime Keyboard Charger Spam Blocking Telephone System Sports VPN Patch Management Mobile Device IT Plan Marketing Public Cloud Cleaning Operating System Fraud Worker Battery BDR NIST Thought Leadership Hiring/Firing webinar How to Data storage Staff Camera The Internet of Things Hybrid Cloud Cortana Network Congestion Screen Mirroring Augmented Reality Music Windows 10s Windows Server 2008 Worker Commute Amazon Authentication Gmail Politics Rootkit HBO Education Telecommuting Document Management Transportation Safety Root Cause Analysis Google Apps Cryptocurrency Employer Employee Relationship Conferencing Software Tips Black Market Specifications Books Assessment FENG Telephony Apple IT Consultant Cast Voice over Internet Protocol Remote Worker Wearable Technology Internet exploMicrosoft Amazon Web Services Servers Nanotechnology Botnet Scalability Recovery Recycling Outlook Computing Infrastructure Remote Work Practices Benefits Workers Safe Mode Addiction Computer Accessories Emails Wireless Internet Digital Signature Warranty Television Skype iPhone Leadership Wireless Wiring Solid State Drive Flash Advertising Online Shopping HVAC Smart Tech Meetings Travel eWaste Vendor Management Frequently Asked Questions Relocation User Error Machine Learning Hosted Computing Cache Bluetooth Millennials Wire Emergency Public Computer Start Menu Best Practice Save Time Monitor Multi-Factor Security HIPAA Unified Threat Management Troubleshooting Loyalty Audit Evernote Enterprise Content Management Smart Technology Current Events Information Technology Criminal MSP Excel Techology Users Credit Cards YouTube Inventory Password Manager IT solutions Physical Security Workforce Tools Content Search Trending Human Resources Mobile Computing SaaS Computer Fan Sync Wireless Charging Password Management Devices Two Factor Authentication Knowledge Data loss Instant Messaging Google Docs File Sharing Experience Tip of the week Virtual Reality Humor Internet Exlporer Access Control Business Mangement Risk Management Files Smart Office Accountants Downtime Video Games Audiobook Managing Stress Regulation Twitter Printers Thank You Congratulations Webinar Printer WiFi Mouse CrashOverride Company Culture Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Www.Office.Com/Setup | Microsoft http://Office.Com/Setup :- Office setup suite is an importan...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
Office Support Helpline - http://Www.Office.Com/ Setup :- Get started with your Microsoft Office Ins...
technicalsupport VoIP Delivers Benefits That a Traditional Phone System Can’t
13 October 2018
http://Office.Com/Setup | Office Com Setup :- We offer technical support for Microsoft office setup....