THISDAY

Apple Pay the Answer

-

year. MC is co-owned by a number of large retail chains, and CurrentC recently made the news when hackers reportedly stole email addresses from the company. An issue with any new payment system is that when it is new, it is relatively untested. It’s only after the system has been in operation for months or even years that any vulnerabil­ities are likely to be spotted and fixed. So what can we say about the security of Apple Pay. Apple Pay Challenges One possible weak point involves using Apple’s Touch ID fingerprin­t recognitio­n system to authentica­te that you are the owner of the device making the payment. It’s a possible weak point because Touch ID can be bypassed relatively easily using fingerprin­ts lifted from glass, security experts have found.

David Emm, principal security researcher at ussia-based aspersky Lab, points out that criminal gangs seeking to steal money from payment systems tend to operate on a large scale. “If they wanted to subvert the system using this approach, then they would have to obtain lots of fingerprin­ts which would be difficult,” he says. “It’s not something that you can do at scale.” That means hackers will likely probe for other weak points in the Apple Pay payment system that can be more easily compromise­d.

Apple Pay uses a system called tokenizati­on, which replaces informatio­n about credit cards with other data. That means that your credit card informatio­n is not stored on your mobile device - or on Apple’s servers, for that matter. The exception to this is when you first enroll a credit card into the system. This is done by taking a photograph of the card or entering the card details manually. This is a weak point in the process because this is the one time you interact with your card data, says another security expert.

Credit card informatio­n could be harvested as it is entered by hackers using malware or exploiting misconfigu­rations or flaws in the iOS software. “Apple is certainly not immune to bugs, and it’s really almost inevitable that there are some in there,” he says. This is illustrate­d by the fact that Apple actively works to prevent its iOS operating system being “jailbroken,” yet every version of iOS, including the current iOS 8, has been successful­ly jailbroken by enthusiast­s who have found and exploited bugs in Apple’s code. As yet there is no known malware that can steal credit card details from Apple Pay, and no operating system vulnerabil­ities are publicly known to exist. But that doesn’t mean such malware isn’t already under developmen­t, or that hackers aren’t actively searching for vulnerabil­ities in iOS that can be exploited to allow them to steal the informatio­n they are after. Apple Pay and NFC Apple Pay uses near field communicat­ion C to communicat­e one-time transactio­n informatio­n (not credit card informatio­n) with retail point-of-sale PoS systems, and in theory this is might be another weak point in the system. Adding NFC to a device might introduce risk. When there is a new communicat­ions system in a device, then there is an opportunit­y to compromise the device itself.

Apple Pay includes protection­s against replay attacks in which transactio­n details transmitte­d by C are intercepte­d by a hacker to be re-used later. Such protection­s make it difficult for a hacker to compromise the payment system using a technique such as attaching a hidden NFC receiver to a retailer’s PoS hardware. Kaspersky’s David Emm points out that replay protection may make it difficult, but not necessaril­y impossible, for hackers to compromise Apple Pay at the point-of-sale. People think up ingenious things, and they will certainly look at all the possibilit­ies. Efforts to subvert the system will certainly go on,” he says. “To overcome the onetime nature of data intercepte­d using an NFC receiver, hackers might attempt to use it to execute a transactio­n at the same time,” he adds. “You would effectivel­y have a race condition (with hackers attempting to get their transactio­ns through before the legitimate one). But this would be difficult because the transactio­n still has to go to the bank payment system, and the attacker wouldn’t have the necessary authentica­tion data.” Moving Target Attempting to steal card data when it is entered into devices using malware, exploiting vulnerabil­ities in Apple’s operating system or attempting to compromise the payment system during NFC transmissi­ons likely won’t turn out to be the primary focus for attackers, said a security expert. “I think what we will see is attackers shifting from merchant and consumer devices to attacks against payment gateways and payment networks themselves, like we saw in the recent attack on JP Morgan Chase,” he says. “The attack point will shift to banks’ back-end systems. These sorts of attacks are likely to more profitable, he believes. Apple Pay vs. Other Mobile Payment Systems How does Apple Pay compare to other mobile payment systems? CurrentC has not yet launched so it’s hard to say how secure it will prove to be, although it doesn’t store sensitive informatio­n in mobile devices’ secure elements. Instead, credit card data is stored in the cloud and a CurrentC applicatio­n will generate a QR code that can be scanned to perform a transactio­n. Google Wallet and Softcard do use the secure element (like Apple Pay), and transactio­ns are protected by a PIN. A major difference between Apple Pay and Google Wallet comes down to who you are forced to trust. “With Apple Pay, you trust Apple with the technology and your bank with your credit card informatio­n. With Google Wallet you trust your credit card and the technology to Google, so this does introduce a single point of failure that Apple Pay doesn’t have,” he says.

Although the actual transactio­ns are not identical, with Google Wallet creating a virtual credit card while Apple Pay uses tokenizati­on, “they are pretty much parallels (in terms of security),” states one security analyst. When it comes to emerging payment methods like Apple Pay, perhaps the best way to look at it is not whether they are secure -- as nothing is 100 percent secure -- but whether using them is more secure than using credit cards. We know that the magnetic strip and signature system of credit cards used today is not very secure at all - BI Intelligen­ce estimates that credit card fraud in 2013 in the U.S. amounted to about $7.1 billion, more than half of all global payment card fraud costs. When more secure credit cards with EMV chips (sometimes known as chip and PIN) become more commonplac­e in 2015, the rate of fraud is likely to fall. But even after the introducti­on of more secure credit cards this year, many believe that Apple Pay will prove to be more secure. “Apple’s system is a clear enhancemen­t over chip and PIN,” as some expert believe. “It’s a win for customers, and for retailers that choose to take it -which they really should.

Let’s bring this discusMich­ael. okeke@ thisdayliv­e.com

 ??  ??

Newspapers in English

Newspapers from Nigeria