Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud--13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Chrome Virtualization Saving Money Holiday Tech Term Gadgets Social Media Managed Service Managed IT Services Automation Microsoft Office Cybercrime Computers Facebook Artificial Intelligence Operating System Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Information Spam Covid-19 Office 365 Telephone Systems Alert Information Technology Managed Service Provider Remote Router BDR Bandwidth Social Engineering Recovery Employer-Employee Relationship Mobility Human Resources Encryption Applications Mobile Computing Remote Monitoring Data Breach Application Law Enforcement App History Big Data Password Money Blockchain Remote Computing Paperless Office Data Storage Patch Management Mobile Office Government Private Cloud Office Tips Training Managed IT VPN How To Apps Two-factor Authentication Flexibility Marketing Mouse Google Drive Vulnerability WiFi HaaS Windows 7 IT solutions Entertainment Word Website Infrastructure Budget Avoiding Downtime Voice over Internet Protocol Servers Wireless Data Security Bring Your Own Device Gmail Data Management Work/Life Balance Settings End of Support Virtual Reality Apple Education Physical Security Telephone System Staff Software as a Service Safety Vendor Social Conferencing Machine Learning Sports HIPAA Managed Services Redundancy Display Connectivity Remote Work User Error Scam Keyboard Meetings USB Employee/Employer Relationship RMM Vendor Management Risk Management Hacker Save Time Data Protection The Internet of Things Lithium-ion battery Cleaning Firewall Help Desk Access Control Virus Battery Printing Shadow IT Virtual Assistant SaaS Hiring/Firing Legal Authentication Unified Threat Management Computer Accessories Managed Services Provider Internet Exlporer Network Congestion eWaste Database Update PDF Remote Workers Business Intelligence Printer Processor Audit Bluetooth Proactive IT Worker Google Docs IT Management Identity Theft Wearable Technology Best Practice Hard Drive YouTube Retail Hard Drives Botnet Instant Messaging IT Plan Black Market Robot Excel IT Consultant Augmented Reality Fraud Biometrics Computing Unsupported Software Virtual Desktop Document Management Solid State Drive Wireless Technology Remote Worker Charger Humor How to Downtime Cryptocurrency DDoS Compliance OneNote Computer Care Data storage Digital Signage Current Events SharePoint Automobile Telephony Samsung Comparison CES Customer Service Computing Infrastructure Procurement Going Green Value Environment Workplace Strategy Net Neutrality Spam Blocking Business Technology Electronic Medical Records Content Management Fax Server Employees Techology Employee/Employer Relationships Screen Mirroring Laptop Printers Loyalty IT service Millennials Books Wireless Charging Windows 365 Frequently Asked Questions Customers ISP Smart Office ROI Windows 10s User PowerPoint Windows Media Player Audiobook Tablet Video Conferencing Mobile Sales Bitcoin Cast Touchpad Virtual Private Network Shortcuts Domains Workforce Emergency Cables Point of Sale Personal Tip of the week Cryptomining webinar Public Cloud Managing Stress IaaS Employer Employee Relationship Maintenance Politics Supply Chain Management Professional Services Advertising Bloatware Monitoring Batteries Project Management Assessment Nanotechnology Telecommuting Cameras Cortana Windows 8.1 Digitize Windows Server 2008 Notifications Windows Server 2008 R2 Digital Signature Tablets Tools Entrepreneur Customer relationships Warranty Television Google Apps Email Best Practices IT Assessment Relocation Manufacturing HVAC Analysis Shortcut Cost Management Computer Tips Video Games Managed IT Service Administrator Security Cameras Public Computer Devices Enterprise Content Management Transportation Printer Server Social Networking Virtual CIO Worker Commute OneDrive Regulations Biometric Security Computer Fan MSP Rootkit Accountants Experience Peripheral Credit Cards Digital Security Cameras Scalability Using Data Microchip Thought Leadership Password Management Running Cable Benefits Password Manager Business Owner Copiers 5G Workers FENG NarrowBand Multi-Factor Security Memory Quick Tip Ergonomics Search Search Engine Smartwatch IBM Twitter NIST Smart Technology Business Mangement Development Flash iPhone OLED Virtual Machine Smart Tech Trending PCI DSS Amazon 2FA Fiber Optics Software Tips Employee Supercomputer Addiction Recycling Science Messaging Sync Files Cabling Emails Hypervisor Chromecast Wiring Practices Policy Amazon Web Services Dark mode Trend Micro Consultant Cache Uninterrupted Power Supply Safe Mode Distributed Denial of Service Two Factor Authentication Analytics Criminal Customer Relationship Management SMS Colocation Default App Netflix Saving Time Root Cause Analysis GDPR Hosted Computing Analyitcs Procedure Online Shopping Programming dark theme Shopping HBO Monitor Google Search Knowledge Best Available Wireless Internet Music WIndows 7 File Sharing AI Skype IT Infrastructure FinTech Data loss Camera Bing Inventory Specifications Antivirus Troubleshooting Evernote Social Network Outlook Reputation Leadership Streaming Media Wire Investment Tech Support Travel Content Windows 8 Start Menu

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code