<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Credit card (in)security issues</title>
	<atom:link href="http://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1677105</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 22:32:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1677105</guid>
		<description><![CDATA[https://nfckill.com/products/nfc-kill]]></description>
		<content:encoded><![CDATA[<p><a href="https://nfckill.com/products/nfc-kill" rel="nofollow">https://nfckill.com/products/nfc-kill</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1627356</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Mar 2019 19:05:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1627356</guid>
		<description><![CDATA[Credit Card Chips Susceptible to Unwarranted NFC Communications
https://blog.hackster.io/credit-card-chips-susceptible-to-unwarranted-nfc-communications-b790402d20dc]]></description>
		<content:encoded><![CDATA[<p>Credit Card Chips Susceptible to Unwarranted NFC Communications<br />
<a href="https://blog.hackster.io/credit-card-chips-susceptible-to-unwarranted-nfc-communications-b790402d20dc" rel="nofollow">https://blog.hackster.io/credit-card-chips-susceptible-to-unwarranted-nfc-communications-b790402d20dc</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: tisu magic power</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1551498</link>
		<dc:creator><![CDATA[tisu magic power]]></dc:creator>
		<pubDate>Sat, 17 Jun 2017 10:13:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1551498</guid>
		<description><![CDATA[Just want to say your article is as surprising. The clarity on your publish is simply great and 
that i can assume you&#039;re knowledgeable in this subject.
Fine with your permission let me to take hold of your RSS feed to keep updated with approaching post.
Thanks 1,000,000 and please carry on the gratifying work.]]></description>
		<content:encoded><![CDATA[<p>Just want to say your article is as surprising. The clarity on your publish is simply great and<br />
that i can assume you&#8217;re knowledgeable in this subject.<br />
Fine with your permission let me to take hold of your RSS feed to keep updated with approaching post.<br />
Thanks 1,000,000 and please carry on the gratifying work.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1281880</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 06 Nov 2014 10:46:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1281880</guid>
		<description><![CDATA[Chip &amp; PIN vs. Chip &amp; Signature
http://krebsonsecurity.com/2014/10/chip-pin-vs-chip-signature/

The Obama administration recently issued an executive order requiring that federal agencies migrate to more secure chip-and-PIN based credit cards for all federal employees that are issued payment cards. The move marks a departure from the far more prevalent “chip-and-signature” standard, an approach that has been overwhelmingly adopted by a majority of U.S. banks that are currently issuing chip-based cards. This post seeks to explore some of the possible reasons for the disparity.

emvkeyChip-based cards are designed to be far more expensive and difficult for thieves to counterfeit than regular credit cards that most U.S. consumers have in their wallets. Non-chip cards store cardholder data on a magnetic stripe, which can be trivially copied and re-encoded onto virtually anything else with a magnetic stripe.

Magnetic-stripe based cards are the primary target for hackers who have been breaking into retailers like Target and Home Depot and installing malicious software on the cash registers: The data is quite valuable to crooks because it can be sold to thieves who encode the information onto new plastic and go shopping at big box stores for stuff they can easily resell for cash (think high-dollar gift cards and electronics).

The United States is the last of the G20 nations to move to more secure chip-based cards. Other countries that have made this shift have done so by government fiat mandating the use of chip-and-PIN. Requiring a PIN at each transaction addresses both the card counterfeiting problem, as well as the use of lost or stolen cards.

Here in the States, however, the movement to chip-based cards has evolved overwhelmingly toward the chip-and-signature approach. Naturally, if your chip-and-signature card is lost or stolen and used fraudulently, there is little likelihood that a $9-per-hour checkout clerk is going to bat an eyelash at a thief who signs your name when using your stolen card to buy stuff at retailers. Nor will a signature card stop thieves from using a counterfeit card at automated payment terminals (think gas pumps).

But just how broadly adopted is chip-and-signature versus chip-and-PIN in the United States? According to an unscientific poll that’s been running for the past two years at the travel forum Flyertalk, only a handful of major U.S. banks issue chip-and-PIN cards; most have pushed chip-and-signature.]]></description>
		<content:encoded><![CDATA[<p>Chip &amp; PIN vs. Chip &amp; Signature<br />
<a href="http://krebsonsecurity.com/2014/10/chip-pin-vs-chip-signature/" rel="nofollow">http://krebsonsecurity.com/2014/10/chip-pin-vs-chip-signature/</a></p>
<p>The Obama administration recently issued an executive order requiring that federal agencies migrate to more secure chip-and-PIN based credit cards for all federal employees that are issued payment cards. The move marks a departure from the far more prevalent “chip-and-signature” standard, an approach that has been overwhelmingly adopted by a majority of U.S. banks that are currently issuing chip-based cards. This post seeks to explore some of the possible reasons for the disparity.</p>
<p>emvkeyChip-based cards are designed to be far more expensive and difficult for thieves to counterfeit than regular credit cards that most U.S. consumers have in their wallets. Non-chip cards store cardholder data on a magnetic stripe, which can be trivially copied and re-encoded onto virtually anything else with a magnetic stripe.</p>
<p>Magnetic-stripe based cards are the primary target for hackers who have been breaking into retailers like Target and Home Depot and installing malicious software on the cash registers: The data is quite valuable to crooks because it can be sold to thieves who encode the information onto new plastic and go shopping at big box stores for stuff they can easily resell for cash (think high-dollar gift cards and electronics).</p>
<p>The United States is the last of the G20 nations to move to more secure chip-based cards. Other countries that have made this shift have done so by government fiat mandating the use of chip-and-PIN. Requiring a PIN at each transaction addresses both the card counterfeiting problem, as well as the use of lost or stolen cards.</p>
<p>Here in the States, however, the movement to chip-based cards has evolved overwhelmingly toward the chip-and-signature approach. Naturally, if your chip-and-signature card is lost or stolen and used fraudulently, there is little likelihood that a $9-per-hour checkout clerk is going to bat an eyelash at a thief who signs your name when using your stolen card to buy stuff at retailers. Nor will a signature card stop thieves from using a counterfeit card at automated payment terminals (think gas pumps).</p>
<p>But just how broadly adopted is chip-and-signature versus chip-and-PIN in the United States? According to an unscientific poll that’s been running for the past two years at the travel forum Flyertalk, only a handful of major U.S. banks issue chip-and-PIN cards; most have pushed chip-and-signature.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1273961</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 29 Oct 2014 10:04:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1273961</guid>
		<description><![CDATA[Kili Unveils 1-Stop Fix for Chip-Card Mandate
POS terminals that read all forms of payment
http://www.eetimes.com/document.asp?doc_id=1324404&amp;

While US retailers struggle to keep up with the transition of mobile payment systems partly prompted by new technologies like NFC-based contactless mobile payment solutions (i.e. ApplePay in iPhone 6), they face an even bigger challenge, as US card issuers drag them into the new world of EMV-compliant (Europay, MasterCard, and Visa) chip cards.

Under a new mandate, Oct. 1, 2015 will mark a liability shift from banks to merchants. After that date, any fraudulent card transactions will be the responsibility of merchants who failed to hook up a new point-of-sales terminal that can read chip cards. But if a new terminal is in place, the merchant’s off the hook. Liability reverts back to the bank that failed to issue chip cards.

In short, the switch to EMV is pressuring merchants and financial institutions to add new in-store technology and internal processing systems compliant with new liability rules. Taking advantage of these profound changes in mobile payment is Kili Technology of San Carlos, Calif., a developer of secure, low-cost payment processing solutions. Kili is a spin-off of SecureKey, a Canada-based identity and authentication provider, which developed its core technology over the last five years.

While targeting the replacement market for legacy POS terminals, Kili is also eyeing the so-called “on-the-go” mobile payment solutions increasingly in demand among small retailers and individual business owners like plumbers. Mobile payment systems such as Square have been rapidly gaining popularity. However, they are currently capable of processing only magnetic stripe cards.

Massabki sees most of the company&#039;s chip competitors, such as NXP Semiconductors, STMicroelectroincs, or Freescale, offering discrete solutions in the form of a family of devices such as NFC, smartcards, and security chips. In contrast, Kili takes pride in offering highly integrated mobile POS solution-on-a-chips such as K409B. Incorporated in the dual CPU core-based K409B are an NFC transceiver, a controller, a secure capacitive touch controller, an on-chip capacity touch analog front-end, memories, and analog power management.]]></description>
		<content:encoded><![CDATA[<p>Kili Unveils 1-Stop Fix for Chip-Card Mandate<br />
POS terminals that read all forms of payment<br />
<a href="http://www.eetimes.com/document.asp?doc_id=1324404&#038;amp" rel="nofollow">http://www.eetimes.com/document.asp?doc_id=1324404&#038;amp</a>;</p>
<p>While US retailers struggle to keep up with the transition of mobile payment systems partly prompted by new technologies like NFC-based contactless mobile payment solutions (i.e. ApplePay in iPhone 6), they face an even bigger challenge, as US card issuers drag them into the new world of EMV-compliant (Europay, MasterCard, and Visa) chip cards.</p>
<p>Under a new mandate, Oct. 1, 2015 will mark a liability shift from banks to merchants. After that date, any fraudulent card transactions will be the responsibility of merchants who failed to hook up a new point-of-sales terminal that can read chip cards. But if a new terminal is in place, the merchant’s off the hook. Liability reverts back to the bank that failed to issue chip cards.</p>
<p>In short, the switch to EMV is pressuring merchants and financial institutions to add new in-store technology and internal processing systems compliant with new liability rules. Taking advantage of these profound changes in mobile payment is Kili Technology of San Carlos, Calif., a developer of secure, low-cost payment processing solutions. Kili is a spin-off of SecureKey, a Canada-based identity and authentication provider, which developed its core technology over the last five years.</p>
<p>While targeting the replacement market for legacy POS terminals, Kili is also eyeing the so-called “on-the-go” mobile payment solutions increasingly in demand among small retailers and individual business owners like plumbers. Mobile payment systems such as Square have been rapidly gaining popularity. However, they are currently capable of processing only magnetic stripe cards.</p>
<p>Massabki sees most of the company&#8217;s chip competitors, such as NXP Semiconductors, STMicroelectroincs, or Freescale, offering discrete solutions in the form of a family of devices such as NFC, smartcards, and security chips. In contrast, Kili takes pride in offering highly integrated mobile POS solution-on-a-chips such as K409B. Incorporated in the dual CPU core-based K409B are an NFC transceiver, a controller, a secure capacitive touch controller, an on-chip capacity touch analog front-end, memories, and analog power management.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Judson</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1249356</link>
		<dc:creator><![CDATA[Judson]]></dc:creator>
		<pubDate>Sun, 05 Oct 2014 00:18:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1249356</guid>
		<description><![CDATA[Hello very cool web site!! Man .. Excellent .. Superb ..
I will bookmark your blog and take the feeds additionally?

I&#039;m satisfied to search out a lot of useful info here within the submit, 
we want develop extra techniques in this regard, thank you for 
sharing. . . . . .]]></description>
		<content:encoded><![CDATA[<p>Hello very cool web site!! Man .. Excellent .. Superb ..<br />
I will bookmark your blog and take the feeds additionally?</p>
<p>I&#8217;m satisfied to search out a lot of useful info here within the submit,<br />
we want develop extra techniques in this regard, thank you for<br />
sharing. . . . . .</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1245582</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Oct 2014 08:52:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1245582</guid>
		<description><![CDATA[How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks
http://www.wired.com/2014/09/ram-scrapers-how-they-work/

Attackers installed these RAM scrapers surreptitiously on the point-of-sale systems used to scan and process credit and debit card transactions at Albertson’s and Supervalu. The tools make it easy to steal card numbers by the millions as they pass through the system.

RAM scrapers—used recently in the Target and Home Depot breaches to net the hackers data on more than 100 million bank cards collectively—are not new. VISA issued a warning to retailers about their use in 2008. But they’ve become increasingly sophisticated and efficient at stealing massive caches of cards. 

They’ve also become more ubiquitous as developer kits for building them—from a starter stub that is easily customized from a menu of features—have pushed scrapers into the mainstream and made them accessible to a wider swath of hackers. Need something to exfiltrate data from your victim’s network to a server in Minsk? Check. Want a turnkey solution for managing your command-and-control server in Mumbai? The kits have got that covered, too.

RAM scrapers can be installed remotely on a Big-Box retailer’s network and deployed widely to dozens of stores in a franchise.]]></description>
		<content:encoded><![CDATA[<p>How RAM Scrapers Work: The Sneaky Tools Behind the Latest Credit Card Hacks<br />
<a href="http://www.wired.com/2014/09/ram-scrapers-how-they-work/" rel="nofollow">http://www.wired.com/2014/09/ram-scrapers-how-they-work/</a></p>
<p>Attackers installed these RAM scrapers surreptitiously on the point-of-sale systems used to scan and process credit and debit card transactions at Albertson’s and Supervalu. The tools make it easy to steal card numbers by the millions as they pass through the system.</p>
<p>RAM scrapers—used recently in the Target and Home Depot breaches to net the hackers data on more than 100 million bank cards collectively—are not new. VISA issued a warning to retailers about their use in 2008. But they’ve become increasingly sophisticated and efficient at stealing massive caches of cards. </p>
<p>They’ve also become more ubiquitous as developer kits for building them—from a starter stub that is easily customized from a menu of features—have pushed scrapers into the mainstream and made them accessible to a wider swath of hackers. Need something to exfiltrate data from your victim’s network to a server in Minsk? Check. Want a turnkey solution for managing your command-and-control server in Mumbai? The kits have got that covered, too.</p>
<p>RAM scrapers can be installed remotely on a Big-Box retailer’s network and deployed widely to dozens of stores in a franchise.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1244255</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 30 Sep 2014 09:37:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1244255</guid>
		<description><![CDATA[Payment security vastly improved when you DON&#039;T ENTER your BANK DETAILS
Entering randomly generated ‘tokens’ makes it safer – report
http://www.theregister.co.uk/2014/09/30/payments_security_vastly_improved_by_tokenisation_according_to_report/

Developments around &quot;tokenisation&quot; should help to “instil confidence in a payments environment challenged by more frequent data breaches” and fraud, according to a report released by the Federal Reserve Bank of Boston.

The June 2014 report from the US Federal Reserve&#039;s Mobile Payments Industry Workgroup (MPIW), which was released on 24 September (16-page/320KB PDF), defined tokenisation as the process of “randomly generating substitute value to replace sensitive information”.

The report said: “When used for financial transactions, tokens replace payment credentials, such as bank account and credit/debit card numbers. The ability to remove actual payment credentials from the transaction flow can improve the security of the payment and is a key benefit of tokenisation.”

However, the report said some “hurdles” remain before tokenisation receives broad adoption by industry, “particularly around standards and coordination of the different solutions”.

According to the report, “the key goal of tokenisation” is to protect the 13 to 19-digit primary account number (PAN) embossed on a plastic bank or credit card and encoded on the card’s magnetic strip. “The PAN identifies the card issuer in the first six digits, known as the bank identification number (BIN), as well as the individual cardholder account (generally the final four digits), and includes a check digit for authentication.”

Tokenisation “eliminates the need for merchants to store the full PAN on their network systems for exception processing or to resolve disputes”]]></description>
		<content:encoded><![CDATA[<p>Payment security vastly improved when you DON&#8217;T ENTER your BANK DETAILS<br />
Entering randomly generated ‘tokens’ makes it safer – report<br />
<a href="http://www.theregister.co.uk/2014/09/30/payments_security_vastly_improved_by_tokenisation_according_to_report/" rel="nofollow">http://www.theregister.co.uk/2014/09/30/payments_security_vastly_improved_by_tokenisation_according_to_report/</a></p>
<p>Developments around &#8220;tokenisation&#8221; should help to “instil confidence in a payments environment challenged by more frequent data breaches” and fraud, according to a report released by the Federal Reserve Bank of Boston.</p>
<p>The June 2014 report from the US Federal Reserve&#8217;s Mobile Payments Industry Workgroup (MPIW), which was released on 24 September (16-page/320KB PDF), defined tokenisation as the process of “randomly generating substitute value to replace sensitive information”.</p>
<p>The report said: “When used for financial transactions, tokens replace payment credentials, such as bank account and credit/debit card numbers. The ability to remove actual payment credentials from the transaction flow can improve the security of the payment and is a key benefit of tokenisation.”</p>
<p>However, the report said some “hurdles” remain before tokenisation receives broad adoption by industry, “particularly around standards and coordination of the different solutions”.</p>
<p>According to the report, “the key goal of tokenisation” is to protect the 13 to 19-digit primary account number (PAN) embossed on a plastic bank or credit card and encoded on the card’s magnetic strip. “The PAN identifies the card issuer in the first six digits, known as the bank identification number (BIN), as well as the individual cardholder account (generally the final four digits), and includes a check digit for authentication.”</p>
<p>Tokenisation “eliminates the need for merchants to store the full PAN on their network systems for exception processing or to resolve disputes”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Danh bai</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1238364</link>
		<dc:creator><![CDATA[Danh bai]]></dc:creator>
		<pubDate>Wed, 24 Sep 2014 04:27:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1238364</guid>
		<description><![CDATA[Good day very cool website!! Man .. Beautiful .. Wonderful ..
I&#039;ll bookmark your web site and take the feeds also? I&#039;m happy to find so 
many helpful info right here within the publish, we&#039;d like work out extra techniques 
on this regard, thanks for sharing. . . . . .]]></description>
		<content:encoded><![CDATA[<p>Good day very cool website!! Man .. Beautiful .. Wonderful ..<br />
I&#8217;ll bookmark your web site and take the feeds also? I&#8217;m happy to find so<br />
many helpful info right here within the publish, we&#8217;d like work out extra techniques<br />
on this regard, thanks for sharing. . . . . .</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Akilah</title>
		<link>https://www.epanorama.net/blog/2012/03/29/credit-card-insecurity-issues/comment-page-5/#comment-1237069</link>
		<dc:creator><![CDATA[Akilah]]></dc:creator>
		<pubDate>Tue, 23 Sep 2014 00:59:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=9795#comment-1237069</guid>
		<description><![CDATA[This page truly has all the information and facts I 
wanted about this subject and didn&#039;t know who 
to ask.]]></description>
		<content:encoded><![CDATA[<p>This page truly has all the information and facts I<br />
wanted about this subject and didn&#8217;t know who<br />
to ask.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
