Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
“Contactless” HCE Payments Promise Simplicity But Is It Secure?
Threaded  |  Newest First  |  Oldest First
JoshuaR663
JoshuaR663,
User Rank: Apprentice
9/2/2014 | 1:40:58 PM
SecureKey Briidge.net Connect
Is this technology (utilizing tokenization, it seems) a true viable option to secure HCE, even on a rooted phone? I see tokenization being part of the answer if it is done at the vendor/bank level, but I'm not sure how or where in the process SecureKey tokenizes data. Thoughts?
pcarrollvs
pcarrollvs,
User Rank: Author
9/5/2014 | 12:02:49 PM
Re: SecureKey Briidge.net Connect
Hello JoshuaR663. I don't know enough about SecureKey Bridge.net Connect to offer an opinion, and this would probably not be the right forum in any event :)

You mention the subject of Tokenization and you are correct that we can expect to see Tokenization being implemented alongside not just HCE but also EMV. However it's worth remembering that a primary objective of tokenization is to eliminate the need for sensitive card data to be stored at the merchant side. It can't prevent cards being cloned (skimmed) and doesn't add any additional validation on the legitimacy of the transaction. The card data still needs to be stored (by the processor/tokenization provider) and held for merchant payment purposes (matching of token with card data) at settlement.

Whilst tokenization is definitely a step forward as it does reduce sensitive payment data proliferation, there are a number of issues that are recognised by the industry. I intend to write a more detailed note on the subject of Tokenization in the near future. 
aws0513
aws0513,
User Rank: Ninja
9/2/2014 | 2:21:31 PM
Just a silly thought
As I was reading this article, I began to wonder if things would change if the governance bodies behind HCE and/or SE technologies standards were to be billed for any transactions where non-repudiation could not be fully established.

The silly model in my head is for every transaction, the governance body would get a small cut (the carrot).  But for every proven false transaction, the governance body would pay the full remediation cost for the transaction (the stick).  In other words, make good security profitable, but risk of fraud seem unpalatable to the organization responsible for validating the standard.

At the same time, allow the governance body to bill/fine those vendors that implement the technology standard in a manner that introduces vulnerabilities.

I know...  just plain silly.  Maybe I need to get another caffiene drink.

Good article, but I fear the industry till adopt HCE with the attitude that "What worse could happen compared to the current card based system?"
pcarrollvs
pcarrollvs,
User Rank: Author
9/3/2014 | 6:03:34 AM
Re: Just a silly thought
You raise a very interesting point aws0513. It's quite amazing that in today's world we actually budget for fraud! What incentive is there to get rid of fraud when it's in the budget? I like your value proposition, ie make good security profitable. The sad fact is that every one of us pay the price of poor security when we use our payment cards or our mobile at the checkout. And it's a significant cost indeed, as high as 160 basis points (1.6%) of the transaction value (and in some cases even higher). It's even sadder to know that that the technology exists today to virtually eliminate fraud at the checkout due to the ability to accurately place the legitimate cardholder/mobile user at the place of the transaction, in real-time, but in a totally privacy sensitive manner, yet there is reluctance by the industry to adopt/deploy such technologies. The big problem is that in big organizations, the silo effect kicks in, and the folk who budget for fraud are not aligned with with the division who could implement such technology, and unless you can reliably aggregate cost of fraud and cost of solution, the business value proposition becomes blurred. I for one would love to see the governing bodies take more action to force the industry to deploy such solutions, afterall, it is in all our interests, and the only individuals to benefit from industry procrastination are the fraudsters!
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/3/2014 | 7:58:10 AM
Re: Just a silly thought > fuzzy math of fraud
Interesting point about tying together the cost of fraud and the cost of a fraud solution. It seems like such an obvious connection. Are organizations really so balkanized that they can't put these basic facts together?
pcarrollvs
pcarrollvs,
User Rank: Author
9/3/2014 | 9:06:41 AM
Re: Just a silly thought > fuzzy math of fraud
It's an unfortunate fact Marilyn, and not without reason. Establishing the true cost of fraud to an organization is a complex process that spans many departments, since it's not just fraud losses that need to be taken into account, but also the cost of investigation and administration of fraud. Fraud can also affect legal fees and regulatory and compliance budgets, IT and Security as well, although in many cases it's highly likely that such costs are not classified as "fraud" in the budget, for obvious reasons. Not alone does this make the true cost of fraud to an organization difficult to calculate, but it also means that fraud costs may be under-reported as a consequence and create a misleading impression as to the level of fraud in any market. The implication of all of this is that it's ultimately only the fraudsters that benefit and the shocking truth is that it is the industry that is unwittingly assisting them. I believe that it is time for the relevant governing bodies to stand up and be counted. The only losers will be the fraudsters.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/3/2014 | 9:21:47 AM
Re: Just a silly thought > fuzzy math of fraud
Thanks, Pat. What you say makes perfect sense to me. Are there any industry estimates about how off the mark organizations are in their estimates of the true costs of fraud? For example, are they in the ball park of  2x higher? Does it depend on the industry? 
pcarrollvs
pcarrollvs,
User Rank: Author
9/3/2014 | 7:15:45 PM
Re: Just a silly thought > fuzzy math of fraud
Hi Marilyn, trying to get a handle on the true cost of fraud in any industry segement is notoriously difficult. Mention fraud losses to any financial institution and it's as though you have said a bad word... The industry is paranoid about the reputational damage that could ensue, and makes a concerted effort to downplay the impact on their institution. The problem is that unless you can measure it, you can't manage it. And measurement is all about understanding and knowledge. It the industry can't own up to its failings, what chance is there of solving the problem? In terms of your specific question, in the recent past some good studies have been carried out by research companies that have helped quantity the question around the true cost of fraud, and have highlighted that with card present fraud (eg ATM/POS), actual fraud losses make up about 30% of the total cost of fraud, whilst with card not present fraud (eg online), actual fraud losses make up approx 25% of the total cost of fraud.
aws0513
aws0513,
User Rank: Ninja
9/4/2014 | 11:53:25 AM
Re: Just a silly thought > fuzzy math of fraud
As Pat related, it is very difficult to identify how risk acceptance of fraud is implement within the financial industry.  I am sure there are documented formulas out there, but nobody seems to be willing to share that information readily.  Less so try to explain the reasoning behind the formulas.

My silly idea was basically because of this fact.  From all that I have encountered and observed, the financial industry has already accepted risk before they even begin to hand out money.  So all of the repercussions that could be developed in terms of fines and/or administrative action would also be rolled into that equation.

So why not make it profitable for someone to mitigate risk right out of the gate?  Establish a model where the governance body behind a security control that is widely implemented can actually benefit if the solution they provide is proven to have a high amount of risk mitigation while still providing a reasonable user experience.  I have a feeling that if this is done, there may be a huge opportunity for a governance body and a technology solution.

And that is the challenge...  the reasonable user experience.

Many financial organizations seem to view security controls as a barrier to obtaining new business.  This of course is partially due to public disdain for those activities that seem combersome or complicated...  and I get that.  But the other side of this equation is due to the rampant pressure for financial organizations to generate business... to make money while accepting a certain level of risk. 
To me it is like trying to prevent teens from engaging in sex.  The hormonal pressures are enormous.  Both sides of the equation want what the other has...  greatly.

 

 


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.