Attacks/Breaches

7/23/2018
04:53 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SmartMetric, Report Reveals More Than 32% of Americans Affected by Credit Card Fraud While United States ID Theft Cost More Than $17 Billion

NEW YORK, July 23, 2018 (GLOBE NEWSWIRE) -- SmartMetric, Inc. (OTCQB:SMME) –  According to Javelin Strategy, the number of identity theft victims in the US rose to 16.7 million in 2017. The cost of all of that lost data amounts to over $17 billion.*

Credit Card Fraud - More than 32% of Americans complained about credit card fraud in 2016, according to the FTC.*

To fight the ongoing war against credit card fraud, SmartMetric has created a miniature fingerprint scanner that sits inside your chip credit/debit card. By simply touching a sensor on the surface of the card scans and matches the cardholders fingerprint and if a match with the prestored fingerprint inside the card, the card is then activated.  

“The scan, match, authentication and card activation takes less than a second according to SmartMetric’s President & CEO, Chaya Hendrick. Using the power of biometric security within the card itself allows for immediate user validation. I tremendous leap forward in card security said SmartMetric’s President.”

SmartMetric with its dealers and distributors in the USA, Europe and South America are now in talks with the some of the largest credit card issuers in the world. Because the SmartMetric biometric card uses existing industry standard payment chips it is easily deployable by Banks and does not require new systems or hardware.

According to industry published figures, there are now 7.186 billion chip cards issued by banks globally. This figure is based on reported figures for 2017.  Figures reported in Q4 of 2017 and represent the latest statistics for from American Express, Discover, JCB, Mastercard, Union Pay, and Visa, as reported by their member institutions globally.*

The SmartMetric biometric credit/debit card is designed specifically for use with Chip Cards. Inside the SmartMetric biometric card is a fully functional fingerprint scanner that uses the card holders pre-stored fingerprint inside the card to match and then activate the card based on the cardholder’s fingerprint biometrics.

Safer and more secure than a pin number, the cardholders fingerprint is used to activate their enhanced secure credit card, adding increased protection from credit and debit card thieves.  Using the power of biometric technology that is built into the credit/debit card, a card users fingerprint is used to unlock the card as it is inserted into a card reader at a retail store or an ATM. Simply touching the card, the card holders fingerprint is instantly scanned and matched with the prestored fingerprint inside the card. In less than a second the users biometrics are scanned and matched allowing the card to then function as it is inserted into the card reader.

“Touch your card and your fingerprint biometrics instantly unlock the card in less than a second. Safer than a password and so much easier and quicker than entering a PIN,” said today SmartMetric’s President and CEO, Chaya Hendrick.

The SmartMetric miniaturized biometric fingerprint scanning technology has been engineered and developed by SmartMetric. 

SmartMetric is a United States company with its head office in Las Vegas, Nevada. It has a team of advanced engineers in Tel Aviv, Israel and has mass manufacturing capacity in various parts of the world.  The company can now manufacture 1 million cards a month and has the capacity to increase this capacity significantly based on product demand.

The SmartMetric biometric card is protected by five (5) “issued” patents. Additional patents are pending.

To view a video of the SmartMetric card follow this link SmartMetric Biometric Card Video (older card type)

To contact the representative for the SmartMetric biometric credit/security card within the USA please contact PROTEC Secure Card, Tracey Breckenridge at [email protected]. To view their website, www.protecsecurecard.com 

For more information concerning the new biometric secured credit and security card for South America please contact HOGIER GARTNER CIA S.A., Alvaro Gartner Valencia at [email protected]  To view their website, www.hogier.com

* figures source: https://www.emvco.com/wp-content/uploads/2018/03/20180312_EMVCo_EMV_Chip_Deployment_Stats-20180327.pdf

https://www.comparitech.com/identity-theft-protection/identity-theft-statistics/#gref

Safe Harbor Statement: Forward-Looking Statements in this press release, which are not historical facts, are forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Also such forward-looking statements are within the meaning of that term in Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Our actual results, performance or achievements may differ materially from those expressed or implied by these forward-looking statements. In some cases, you can identify forward-looking statements by the use of words such as "may," "could," "expect," "intend," "plan," "seek," "anticipate," "believe," "estimate," "predict," "potential," "continue," "likely," "will," "would" and variations of these terms and similar expressions, or the negative of these terms or similar expressions. Such forward-looking statements are necessarily based upon estimates and assumptions that, while considered reasonable by us and our management, are inherently uncertain. Factors that may cause actual results to differ materially from current expectations include, among others, if we are unable to access the capital necessary to fund current operations or implement our plans for growth; changes in the competitive environment in our industry and the markets where we operate; our ability to access the capital markets; and other risks discussed in the Company's filings with the U.S. Securities and Exchange Commission, including our Annual Report on Form 10-K, which filings are available from the SEC. We caution you not to place undue reliance on any forward-looking statements, which are made as of the date of this press release. We undertake no obligation to update publicly any of these forward-looking statements to reflect actual results, new information or future events, changes in assumptions or changes in other factors affecting forward-looking statements, except to the extent required by applicable laws. If we update one or more forward-looking statements, no inference should be drawn that we will make additional updates with respect to those or other forward-looking statements.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20050
PUBLISHED: 2018-12-10
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method.
CVE-2018-20051
PUBLISHED: 2018-12-10
Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on.
CVE-2018-20029
PUBLISHED: 2018-12-10
The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6.4.6 on Windows 10 allows local users to cause a denial of service (BSOD) because uninitialized memory can be read.
CVE-2018-1279
PUBLISHED: 2018-12-10
Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on ...
CVE-2018-15800
PUBLISHED: 2018-12-10
Cloud Foundry Bits Service, versions prior to 2.18.0, includes an information disclosure vulnerability. A remote malicious user may execute a timing attack to brute-force the signing key, allowing them complete read and write access to the the Bits Service storage.