Attacks/Breaches

7/23/2018
04:53 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SmartMetric, Report Reveals More Than 32% of Americans Affected by Credit Card Fraud While United States ID Theft Cost More Than $17 Billion

NEW YORK, July 23, 2018 (GLOBE NEWSWIRE) -- SmartMetric, Inc. (OTCQB:SMME) –  According to Javelin Strategy, the number of identity theft victims in the US rose to 16.7 million in 2017. The cost of all of that lost data amounts to over $17 billion.*

Credit Card Fraud - More than 32% of Americans complained about credit card fraud in 2016, according to the FTC.*

To fight the ongoing war against credit card fraud, SmartMetric has created a miniature fingerprint scanner that sits inside your chip credit/debit card. By simply touching a sensor on the surface of the card scans and matches the cardholders fingerprint and if a match with the prestored fingerprint inside the card, the card is then activated.  

“The scan, match, authentication and card activation takes less than a second according to SmartMetric’s President & CEO, Chaya Hendrick. Using the power of biometric security within the card itself allows for immediate user validation. I tremendous leap forward in card security said SmartMetric’s President.”

SmartMetric with its dealers and distributors in the USA, Europe and South America are now in talks with the some of the largest credit card issuers in the world. Because the SmartMetric biometric card uses existing industry standard payment chips it is easily deployable by Banks and does not require new systems or hardware.

According to industry published figures, there are now 7.186 billion chip cards issued by banks globally. This figure is based on reported figures for 2017.  Figures reported in Q4 of 2017 and represent the latest statistics for from American Express, Discover, JCB, Mastercard, Union Pay, and Visa, as reported by their member institutions globally.*

The SmartMetric biometric credit/debit card is designed specifically for use with Chip Cards. Inside the SmartMetric biometric card is a fully functional fingerprint scanner that uses the card holders pre-stored fingerprint inside the card to match and then activate the card based on the cardholder’s fingerprint biometrics.

Safer and more secure than a pin number, the cardholders fingerprint is used to activate their enhanced secure credit card, adding increased protection from credit and debit card thieves.  Using the power of biometric technology that is built into the credit/debit card, a card users fingerprint is used to unlock the card as it is inserted into a card reader at a retail store or an ATM. Simply touching the card, the card holders fingerprint is instantly scanned and matched with the prestored fingerprint inside the card. In less than a second the users biometrics are scanned and matched allowing the card to then function as it is inserted into the card reader.

“Touch your card and your fingerprint biometrics instantly unlock the card in less than a second. Safer than a password and so much easier and quicker than entering a PIN,” said today SmartMetric’s President and CEO, Chaya Hendrick.

The SmartMetric miniaturized biometric fingerprint scanning technology has been engineered and developed by SmartMetric. 

SmartMetric is a United States company with its head office in Las Vegas, Nevada. It has a team of advanced engineers in Tel Aviv, Israel and has mass manufacturing capacity in various parts of the world.  The company can now manufacture 1 million cards a month and has the capacity to increase this capacity significantly based on product demand.

The SmartMetric biometric card is protected by five (5) “issued” patents. Additional patents are pending.

To view a video of the SmartMetric card follow this link SmartMetric Biometric Card Video (older card type)

To contact the representative for the SmartMetric biometric credit/security card within the USA please contact PROTEC Secure Card, Tracey Breckenridge at [email protected]. To view their website, www.protecsecurecard.com 

For more information concerning the new biometric secured credit and security card for South America please contact HOGIER GARTNER CIA S.A., Alvaro Gartner Valencia at [email protected]  To view their website, www.hogier.com

* figures source: https://www.emvco.com/wp-content/uploads/2018/03/20180312_EMVCo_EMV_Chip_Deployment_Stats-20180327.pdf

https://www.comparitech.com/identity-theft-protection/identity-theft-statistics/#gref

Safe Harbor Statement: Forward-Looking Statements in this press release, which are not historical facts, are forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Also such forward-looking statements are within the meaning of that term in Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Our actual results, performance or achievements may differ materially from those expressed or implied by these forward-looking statements. In some cases, you can identify forward-looking statements by the use of words such as "may," "could," "expect," "intend," "plan," "seek," "anticipate," "believe," "estimate," "predict," "potential," "continue," "likely," "will," "would" and variations of these terms and similar expressions, or the negative of these terms or similar expressions. Such forward-looking statements are necessarily based upon estimates and assumptions that, while considered reasonable by us and our management, are inherently uncertain. Factors that may cause actual results to differ materially from current expectations include, among others, if we are unable to access the capital necessary to fund current operations or implement our plans for growth; changes in the competitive environment in our industry and the markets where we operate; our ability to access the capital markets; and other risks discussed in the Company's filings with the U.S. Securities and Exchange Commission, including our Annual Report on Form 10-K, which filings are available from the SEC. We caution you not to place undue reliance on any forward-looking statements, which are made as of the date of this press release. We undertake no obligation to update publicly any of these forward-looking statements to reflect actual results, new information or future events, changes in assumptions or changes in other factors affecting forward-looking statements, except to the extent required by applicable laws. If we update one or more forward-looking statements, no inference should be drawn that we will make additional updates with respect to those or other forward-looking statements.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15504
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
CVE-2018-15505
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 a...
CVE-2018-15492
PUBLISHED: 2018-08-18
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2018-15494
PUBLISHED: 2018-08-18
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
CVE-2018-15495
PUBLISHED: 2018-08-18
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.