Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:04 AM
Dark Reading
Dark Reading
Products and Releases

New Line Of Stylish Secure Wallets Prevent Wireless 'Pickpocketing'

DataSafe wallets designed to fight credit card and identity theft

ANAHEIM HILLS, Calif., June 29 /PRNewswire/ -- California-based Kena Kai is launching a new line of colorful "high gloss" faux patent-leather wallets specifically designed to fight credit card theft and identity theft. These patent-pending and stylish DataSafe wallets utilize exclusive radio-frequency (RF) shielding material to protect the millions of new "contactless" credit cards that have been issued this year.

With the recent introduction of credit cards, passports, and now driver's licenses that contain an electronic wireless chip, sometimes referred to as an RFID (radio-frequency identification) chip, these critical and very personal tools in our daily life are now even more at risk. Most advances in technology come with tradeoffs, and this is no exception. While these new cards and passports do offer greater convenience they are also susceptible to new forms of theft, or "skimming" - the wireless access and/or copying of personal information stored on these cards - from a distance. Researchers from the University of Massachusetts have shown that they could access a credit card user's name, the number and the expiration from more than twenty feet away! Pickpockets no longer have to physically steal your wallet when they can access your data through a regular, unprotected wallet.

"Even though there are inherent security measures built into these new 'contactless' cards and ePassports, we recognize the public's concern regarding identity theft and 'fraud,' and have designed these wallets with multiple layers of RF shielding material that completely blocks unwanted access to your personal information," offered Geb Masterson, president of Kena Kai. "Without our exclusive DataSafe shielding technology your information is basically floating in air!"

Currently there are 50+ million RFID contactless credit cards in circulation that could be vulnerable to skimming attacks, which could harvest names and credit card details from passersby. According to the January 2010 "Survey of Consumer Payment Choice" by the Federal Reserve Bank of Boston, 21 percent of consumers currently have a contactless debit card while 26 percent have a contactless credit card.

"Without even removing their cards from wallets or pockets, consumers can potentially see their privacy and security compromised," Ari Juels, an author of the University of Massachusetts paper and researcher at RSA Labs, stated in a blog post. "A scanner in a crowded subway station might surreptitiously harvest credit card data from passersby."

The new DataSafe "Gloss" Collection will have a suggested retail of $70. The Collection will be available in five vibrant colors with contrasting accents and shiny gold zippers. The current line of wallets can be found at http://www.kenakai.com.

With a distinctive combination of style and innovation, Kena Kai designs unique items that leverage new technologies to better people's lives. High-resolution photos and additional information for the full DataSafe line can be obtained by emailing Nelleke Gort at [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-29
An unauthenticated privilege-escalation issue exists in the bbPress plugin before 2.6.5 for WordPress when New User Registration is enabled.
PUBLISHED: 2020-05-28
Initialization of the pcoip_credential_provider in Teradici PCoIP Standard Agent for Windows and PCoIP Graphics Agent for Windows versions 19.11.1 and earlier creates an insecure named pipe, which allows an attacker to intercept sensitive information or possibly elevate privileges via pre-installing...
PUBLISHED: 2020-05-28
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
PUBLISHED: 2020-05-28
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
PUBLISHED: 2020-05-28
Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...