Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

The answer might lie in two-factor authentication.

Specifically, MasterCard wants to introduce biometric-based two-factor authentication to its system, starting with the UK this summer. The technology discussed is a “selfie” based system that allows users to take a picture through an application, which is then compared to an image stored. The idea is that selfie-authentication, and other methods of biometric technology like fingerprint scanning, can help to prevent credit card fraud.

More than anything else, MasterCard is attempting to limit how many legitimate transactions are being declined while users are traveling abroad. Apparently, this is a bigger problem than actual credit card fraud. As reported by The Financial Times, there’s roughly $118 billion worth of false declines every year, which is considerably more money lost than is the case with credit card fraud--13 times more, to be specific. By using biometrics technology, MasterCard is looking to handle both the fraud and false decline problems.

Of course, the question that needs to be asked is whether or not these technologies are secure for users. Phones, tablets, and other mobile devices can be hacked just as easily as any desktop infrastructure. ITProPortal offers some insight into what will be necessary for mobile payment systems to take off:

“User devices are notoriously prone to penetration by cyber criminals – whether that’s as a result of users adapting their devices or overriding device security parameters, or using unsecured public WiFi when transacting online. Which means biometric data will need to be encrypted to ensure it cannot be stolen – otherwise we open a whole new vector for identity theft. What’s more, rigorous PCI standards already exist to protect users and merchants, especially where liability is concerned should things go wrong. What’s not clear in this scenario is whether liability will shift – and to whom. Quite simply, we’re in new territory here.”

What’s most interesting here is the liability aspect; if a user isn’t securing the mobile device used for payment, can they be considered at fault for the theft of their data? If so, it completely changes the way that financial institutions and payment compliance works. Also, what happens if biometrics are hacked? You can’t exactly issue a new face or a fingerprint with a new credit card number. These are critical possibilities that need to be addressed before biometric two-factor authentication for mobile payment systems can be implemented.

What are your thoughts on mobile payment authentication using a selfie-based system? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Server Save Money Office Cloud Computing Windows 10 Passwords Social Media Chrome Gadgets Virtualization Tech Term Saving Money Holiday Automation Microsoft Office Managed IT Services Managed Service Facebook Operating System Cybercrime Computers Artificial Intelligence Networking IT Support Hacking Internet of Things Health Wi-Fi BYOD Mobile Device Management Telephone Systems Managed Service Provider Information Technology Information Remote Alert Spam Covid-19 Office 365 Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Applications App History Big Data Law Enforcement Data Breach Human Resources Mobile Computing Password Money Remote Monitoring Application Encryption Data Storage Patch Management Blockchain Office Tips Paperless Office Training Government VPN Private Cloud Managed IT Remote Computing Apps How To Mobile Office Google Drive Vulnerability Wireless Windows 7 Word Avoiding Downtime Gmail Servers Settings Infrastructure Voice over Internet Protocol Flexibility Marketing Two-factor Authentication Bring Your Own Device Data Security WiFi Data Management Work/Life Balance IT solutions Mouse Entertainment Website HaaS Budget Safety RMM Sports Risk Management HIPAA Hacker Redundancy Conferencing Keyboard Scam Staff Software as a Service The Internet of Things Telephone System Lithium-ion battery Machine Learning Connectivity Remote Work Vendor Management Firewall Save Time Virtual Reality Apple Vendor Cleaning Social Managed Services Display Data Protection User Error USB Meetings End of Support Education Physical Security Employee/Employer Relationship Excel Humor Robot Business Technology Content Management Computing Access Control Biometrics PDF Virtual Desktop Virtual Assistant Proactive IT Business Intelligence Authentication DDoS Worker Best Practice Audit YouTube IT Management Digital Signage SharePoint Black Market Update Botnet IT Plan Customer Service Google Docs Document Management Environment Virus Procurement Wireless Technology Unsupported Software Net Neutrality Identity Theft Solid State Drive Workplace Strategy How to Downtime Unified Threat Management Fax Server Help Desk Charger Computer Accessories Printing Compliance Data storage SaaS OneNote Computer Care Automobile Augmented Reality Current Events Fraud Telephony Managed Services Provider Network Congestion Samsung Computing Infrastructure Printer Remote Worker Going Green Database eWaste Bluetooth Cryptocurrency Value Remote Workers Electronic Medical Records Battery Processor Spam Blocking Comparison Shadow IT Legal Wearable Technology IT Consultant Retail Hiring/Firing Hard Drives Hard Drive CES Internet Exlporer Instant Messaging Copiers Tip of the week Wire 5G Running Cable webinar Evernote Emergency Employer Employee Relationship Travel Memory Quick Tip Professional Services Notifications Public Cloud Printers Smartwatch Assessment Millennials Ergonomics Development Windows Server 2008 Smart Office OLED Wireless Charging Consultant Relocation PCI DSS Tools Virtual Machine Virtual Private Network Fiber Optics Employee Television Workforce 2FA Analytics Video Games Science Messaging Cabling Cables Worker Commute Best Available Policy Hypervisor Project Management Trend Micro Nanotechnology Public Computer Telecommuting Experience WIndows 7 Dark mode Scalability SMS Regulations Default App Distributed Denial of Service Cortana Customer Relationship Management Transportation Computer Fan Digital Signature Rootkit Business Owner Analyitcs Procedure Saving Time Warranty NarrowBand Shopping Google Search Programming dark theme Benefits Search AI HVAC IT Infrastructure Workers Google Apps FENG Analysis Bing iPhone FinTech PowerPoint Administrator Social Network Windows Media Player Devices Antivirus IBM User Smart Technology Windows 8 Flash Enterprise Content Management Investment Accountants IT service Files Employees MSP Employee/Employer Relationships Microchip Chromecast Software Tips Thought Leadership ISP Supercomputer Credit Cards Managing Stress Windows 365 Tablet Video Conferencing Sync Password Management ROI Emails Password Manager Shortcuts Domains Multi-Factor Security Colocation Sales Cameras Uninterrupted Power Supply Bitcoin Search Engine Personal Twitter Cryptomining Point of Sale Maintenance Two Factor Authentication Monitor Supply Chain Management NIST IaaS Netflix Business Mangement Root Cause Analysis Smart Tech Trending Bloatware Monitoring Batteries Digitize HBO Addiction Knowledge Amazon Music Windows 8.1 Tablets Reputation Skype Streaming Media Windows Server 2008 R2 Recycling Data loss Practices Content Entrepreneur Customer relationships Printer Server Wiring Tech Support Email Best Practices Laptop IT Assessment Outlook Cache Manufacturing Leadership Amazon Web Services Troubleshooting Techology Shortcut Customers Start Menu Safe Mode Criminal Managed IT Service Screen Mirroring Hosted Computing Security Cameras Loyalty Audiobook Cost Management Computer Tips GDPR Virtual CIO Touchpad OneDrive Frequently Asked Questions Wireless Internet Biometric Security Online Shopping Social Networking Books Peripheral Mobile File Sharing Windows 10s Using Data Cast Inventory Specifications Politics Advertising Digital Security Cameras Camera

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code