Attacks/Breaches

7/23/2018
04:53 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SmartMetric, Report Reveals More Than 32% of Americans Affected by Credit Card Fraud While United States ID Theft Cost More Than $17 Billion

NEW YORK, July 23, 2018 (GLOBE NEWSWIRE) -- SmartMetric, Inc. (OTCQB:SMME) –  According to Javelin Strategy, the number of identity theft victims in the US rose to 16.7 million in 2017. The cost of all of that lost data amounts to over $17 billion.*

Credit Card Fraud - More than 32% of Americans complained about credit card fraud in 2016, according to the FTC.*

To fight the ongoing war against credit card fraud, SmartMetric has created a miniature fingerprint scanner that sits inside your chip credit/debit card. By simply touching a sensor on the surface of the card scans and matches the cardholders fingerprint and if a match with the prestored fingerprint inside the card, the card is then activated.  

“The scan, match, authentication and card activation takes less than a second according to SmartMetric’s President & CEO, Chaya Hendrick. Using the power of biometric security within the card itself allows for immediate user validation. I tremendous leap forward in card security said SmartMetric’s President.”

SmartMetric with its dealers and distributors in the USA, Europe and South America are now in talks with the some of the largest credit card issuers in the world. Because the SmartMetric biometric card uses existing industry standard payment chips it is easily deployable by Banks and does not require new systems or hardware.

According to industry published figures, there are now 7.186 billion chip cards issued by banks globally. This figure is based on reported figures for 2017.  Figures reported in Q4 of 2017 and represent the latest statistics for from American Express, Discover, JCB, Mastercard, Union Pay, and Visa, as reported by their member institutions globally.*

The SmartMetric biometric credit/debit card is designed specifically for use with Chip Cards. Inside the SmartMetric biometric card is a fully functional fingerprint scanner that uses the card holders pre-stored fingerprint inside the card to match and then activate the card based on the cardholder’s fingerprint biometrics.

Safer and more secure than a pin number, the cardholders fingerprint is used to activate their enhanced secure credit card, adding increased protection from credit and debit card thieves.  Using the power of biometric technology that is built into the credit/debit card, a card users fingerprint is used to unlock the card as it is inserted into a card reader at a retail store or an ATM. Simply touching the card, the card holders fingerprint is instantly scanned and matched with the prestored fingerprint inside the card. In less than a second the users biometrics are scanned and matched allowing the card to then function as it is inserted into the card reader.

“Touch your card and your fingerprint biometrics instantly unlock the card in less than a second. Safer than a password and so much easier and quicker than entering a PIN,” said today SmartMetric’s President and CEO, Chaya Hendrick.

The SmartMetric miniaturized biometric fingerprint scanning technology has been engineered and developed by SmartMetric. 

SmartMetric is a United States company with its head office in Las Vegas, Nevada. It has a team of advanced engineers in Tel Aviv, Israel and has mass manufacturing capacity in various parts of the world.  The company can now manufacture 1 million cards a month and has the capacity to increase this capacity significantly based on product demand.

The SmartMetric biometric card is protected by five (5) “issued” patents. Additional patents are pending.

To view a video of the SmartMetric card follow this link SmartMetric Biometric Card Video (older card type)

To contact the representative for the SmartMetric biometric credit/security card within the USA please contact PROTEC Secure Card, Tracey Breckenridge at [email protected]. To view their website, www.protecsecurecard.com 

For more information concerning the new biometric secured credit and security card for South America please contact HOGIER GARTNER CIA S.A., Alvaro Gartner Valencia at [email protected]  To view their website, www.hogier.com

* figures source: https://www.emvco.com/wp-content/uploads/2018/03/20180312_EMVCo_EMV_Chip_Deployment_Stats-20180327.pdf

https://www.comparitech.com/identity-theft-protection/identity-theft-statistics/#gref

Safe Harbor Statement: Forward-Looking Statements in this press release, which are not historical facts, are forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Also such forward-looking statements are within the meaning of that term in Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. Our actual results, performance or achievements may differ materially from those expressed or implied by these forward-looking statements. In some cases, you can identify forward-looking statements by the use of words such as "may," "could," "expect," "intend," "plan," "seek," "anticipate," "believe," "estimate," "predict," "potential," "continue," "likely," "will," "would" and variations of these terms and similar expressions, or the negative of these terms or similar expressions. Such forward-looking statements are necessarily based upon estimates and assumptions that, while considered reasonable by us and our management, are inherently uncertain. Factors that may cause actual results to differ materially from current expectations include, among others, if we are unable to access the capital necessary to fund current operations or implement our plans for growth; changes in the competitive environment in our industry and the markets where we operate; our ability to access the capital markets; and other risks discussed in the Company's filings with the U.S. Securities and Exchange Commission, including our Annual Report on Form 10-K, which filings are available from the SEC. We caution you not to place undue reliance on any forward-looking statements, which are made as of the date of this press release. We undertake no obligation to update publicly any of these forward-looking statements to reflect actual results, new information or future events, changes in assumptions or changes in other factors affecting forward-looking statements, except to the extent required by applicable laws. If we update one or more forward-looking statements, no inference should be drawn that we will make additional updates with respect to those or other forward-looking statements.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17534
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
CVE-2018-17980
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
CVE-2018-18259
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
CVE-2018-18260
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
CVE-2018-17532
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.