Infracore LLC Blog

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud--13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.

According to Hackers, Windows 10 Security Passes t...
Tip of the Week: How Tracking Your Net Worth Can B...

Comments 1

AgustinMMontgomery on Wednesday, 19 September 2018 14:48

You have to share this wonderful article about how to handle the mobile payments and speedypaper review make it easier for the users to use it. Give us more blogs related to this.

You have to share this wonderful article about how to handle the mobile payments and [url=]speedypaper review[/url] make it easier for the users to use it. Give us more blogs related to this.
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Hosted Solutions Microsoft Data Malware User Tips Hackers Productivity Software Innovation Mobile Devices Backup Internet Tech Term Smartphones Hardware Business Browser Windows 10 IT Services VoIP Business Continuity Smartphone Email Data Backup Communications Computer Android Cloud Computing Business Management Efficiency Data Recovery Disaster Recovery Outsourced IT Small Business Managed IT Services Alert Workplace Tips Artificial Intelligence Router Communication Managed IT Services Computers Ransomware Miscellaneous Chrome Office Network Internet of Things IT Support Law Enforcement Windows 10 Cybercrime Cybersecurity Passwords Health Social Media Gadgets Office 365 Password Applications Telephone Systems Facebook Virtualization Holiday How To Windows Productivity Money Collaboration Mobile Device Work/Life Balance Word Server Private Cloud Social Engineering App Google Drive Spam Wi-Fi Information Automation Saving Money Quick Tips Upgrade Phishing HaaS Scam Data Breach Office Tips Data Security BDR IT Support Microsoft Office Data Protection Hacking Voice over Internet Protocol Vulnerability Settings Bring Your Own Device Save Money Mobility Two-factor Authentication Managed Service Mobile Device Management Encryption Connectivity Keyboard Apps Marketing Telephone System PDF VPN Sports IT Plan Human Resources Cleaning Access Control Software as a Service Google Docs Battery Worker Operating System Fraud Managed Service Provider Big Data Unsupported Software Government Comparison Computer Care Remote Computing Remote Monitoring Website CES Managed IT Telephony Electronic Medical Records Public Cloud Flexibility Samsung Bandwidth Servers Content Management Training Windows 7 Botnet Entertainment Legal Paperless Office BYOD Business Intelligence Automobile USB Value Firewall Networking Data Storage End of Support Blockchain Machine Learning History Update Identity Theft OneNote Infrastructure Save Time Employer-Employee Relationship Virtual Assistant Data Management IT Management Charger Redundancy Patch Management Avoiding Downtime Spam Blocking Tools Password Manager Search Google Search IT solutions Physical Security iPhone Workforce SaaS Mouse Wireless Charging Instant Messaging Devices Two Factor Authentication Knowledge Password Management Security Cameras Advertising Trending Virtual Reality Experience Mobile Computing Computer Fan Sync Audiobook Data loss Relocation User Error Risk Management File Sharing Tip of the week Video Games Downtime Business Mangement How to Hiring/Firing Proactive IT Accountants Smart Office Administrator Monitor Cortana Thought Leadership Network Congestion NIST Hacker webinar Staff Worker Commute Music Camera The Internet of Things Amazon Authentication Transportation Safety Shortcuts Screen Mirroring Education Politics Rootkit Augmented Reality Windows 10s Windows Server 2008 Root Cause Analysis Gmail Black Market Employer Employee Relationship HBO Telecommuting Books Assessment Document Management Microchip Google Apps IT Consultant Cryptocurrency Smartwatch Conferencing Software Tips Specifications Wearable Technology FENG Amazon Web Services Scalability Nanotechnology Benefits Social Cast Humor Internet Exlporer Computing Infrastructure Remote Worker Search Engine Files Recovery Recycling Computer Accessories Outlook Remote Work Practices Television Skype Data storage Wireless Workers Addiction Leadership Safe Mode Employee Emails Hybrid Cloud Digital Signature Wireless Internet Warranty Online Shopping Smart Tech HVAC Vendor Vendor Management Wiring Solid State Drive Flash Public Computer Bing Meetings Travel eWaste Bluetooth Frequently Asked Questions Best Practice Hosted Computing Emergency Start Menu Cache Digital Signage Apple Millennials Troubleshooting Loyalty Wire Printer Information Technology Evernote Smart Technology Current Events Enterprise Content Management Display Internet exploMicrosoft Multi-Factor Security Techology HIPAA Users Unified Threat Management Audit YouTube Help Desk WiFi Criminal MSP Excel Credit Cards Inventory Content CrashOverride Company Culture Congratulations Compliance Managing Stress Regulation Net Neutrality Twitter Printers ISP Webinar Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JordaBale Tip of the Week: 10 Technology Practices To Improve Business As Usual
11 February 2019
Just to make your business more progressive you have to follow some techniques and tips. In this reg...
Gabrielle Kolios Microsoft Moves to Get a Piece of the Technology as a Service Market Share
08 February 2019
The company of the Microsoft has been really now understood the technology which have to be supposed...
AngusCousens Tip of the Week: How To Enable Flash In Google Chrome
06 February 2019
Google is another popular makeup brand. Ladies can get products for eye makeup also. They can use ht...
Cannedguds These 3 Industries are Being Fundamentally Changed by Smart Technology
29 January 2019
While I support the idea of automated or driverless cars in theory, at the moment they just simply m...
Joan Cameron Tip of the Week: 4 Tools that Provide Your Employees With Greater Flexibility
21 January 2019
These are very helpful tools with we can get rid from lots of unwanted efforts of work. Best essay w...