Infracore LLC Blog

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud--13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.

According to Hackers, Windows 10 Security Passes t...
Tip of the Week: How Tracking Your Net Worth Can B...

Comments 1

AgustinMMontgomery on Wednesday, 19 September 2018 14:48

You have to share this wonderful article about how to handle the mobile payments and speedypaper review make it easier for the users to use it. Give us more blogs related to this.

You have to share this wonderful article about how to handle the mobile payments and [url=]speedypaper review[/url] make it easier for the users to use it. Give us more blogs related to this.
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Google Hosted Solutions Microsoft Hackers Malware Innovation Software Data Hardware Business User Tips Internet Smartphones Backup Tech Term Business Continuity Browser Email Data Backup Mobile Devices Windows 10 Smartphone VoIP Computer Android IT Services Business Management Outsourced IT Cloud Computing Data Recovery Productivity Managed IT Services Alert Workplace Tips Communications Small Business Miscellaneous Chrome Ransomware Office Efficiency Managed IT Services Computers Disaster Recovery Cybercrime Communication Law Enforcement Network Artificial Intelligence How To Router Collaboration Cybersecurity Productivity Money Passwords Office 365 IT Support Password Applications Facebook Virtualization Social Media Internet of Things Windows Telephone Systems Windows 10 App Upgrade Information Health Word Gadgets Social Engineering Work/Life Balance Google Drive Spam Holiday Saving Money Server Quick Tips Keyboard IT Support Mobile Device Management Two-factor Authentication Microsoft Office Hacking Scam Data Breach Connectivity Wi-Fi Phishing Managed Service Mobility Data Security Private Cloud BDR Apps Bring Your Own Device Mobile Device Vulnerability Save Money HaaS Office Tips Data Protection Automation Voice over Internet Protocol Charger End of Support History OneNote Patch Management Business Intelligence Remote Computing Redundancy Blockchain Servers IT Management Spam Blocking Cleaning Update Flexibility Paperless Office Avoiding Downtime Identity Theft Worker Infrastructure Encryption Big Data Legal PDF IT Plan Operating System Computer Care Automobile VPN Virtual Assistant Human Resources Managed Service Provider Unsupported Software Samsung Google Docs Data Management Government Remote Monitoring Electronic Medical Records Fraud Training Sports Managed IT Bandwidth Telephone System Telephony Comparison Entertainment Windows 7 USB Value Website CES Software as a Service Public Cloud Marketing Settings Firewall Networking Battery BYOD Content Management Data Storage Employer-Employee Relationship Frequently Asked Questions Recovery Recycling Worker Commute Document Management Microchip Meetings Travel Smart Technology Current Events Remote Work Practices Workers Addiction Education Start Menu Digital Signature Cryptocurrency Smart Tech Black Market Remote Worker Audit SaaS Apple Online Shopping Excel Experience eWaste Search Engine Internet exploMicrosoft Two Factor Authentication Knowledge Hosted Computing Cache Computing Infrastructure Wireless Internet Warranty Tools Millennials Scalability Safe Mode IT solutions Physical Security Risk Management Evernote Wiring Computer Fan Sync Multi-Factor Security HIPAA HVAC iPhone Hiring/Firing Tip of the week Music WiFi Criminal Machine Learning Bing Advertising Data loss Network Congestion Credit Cards Inventory Wireless Politics Rootkit Password Manager Wire Printer Relocation User Error Downtime Transportation Safety Workforce Wireless Charging Devices Unified Threat Management The Internet of Things Books Assessment Trending Best Practice Enterprise Content Management webinar Employer Employee Relationship MSP Monitor Windows 10s Windows Server 2008 Wearable Technology YouTube Help Desk Screen Mirroring IT Consultant Access Control HBO Business Mangement Techology Users Mouse Root Cause Analysis Benefits Accountants Information Technology Cortana Thought Leadership Mobile Computing FENG Television Staff Content Password Management Conferencing Software Tips Computer Accessories File Sharing Cast Leadership Amazon Authentication Search Outlook Vendor Management Gmail Virtual Reality Smart Office Administrator Humor Internet Exlporer Botnet Telecommuting Instant Messaging Google Apps Camera Files Skype Emergency Public Computer Specifications Video Games Audiobook NIST Emails Bluetooth How to Augmented Reality Data storage Solid State Drive Flash Troubleshooting Loyalty Shortcuts Hybrid Cloud Save Time Amazon Web Services Nanotechnology Regulation Printers Webinar CrashOverride Thank You Congratulations Company Culture Compliance Twitter Managing Stress

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Chantale Bass Tip of the Week: How to Use Tabs to Their Full Potential
15 December 2018
Tabs we need to use only with the ways of the potentially uses from the internet use and also for th...
JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...
Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...