Hackers can use your credit card without PIN authentication by exploiting an all new vulnerability
Hackers have started exploiting this vulnerability to steal from user credit cards for their benefit.
Every time we make a payment using credit/debit cards, the EMV communication protocol is used for processing payments. Having been developed by Europay, Mastercard and Visa, etc. it is used for over 9 billion c1ards globally.
In a recent research, a new vulnerability was found in the EMV protocol. This vulnerability was used by hackers to launch various man in the middle (MITM) attacks. Using this vulnerability the hackers can intercept user transactions and steal from them.
The vulnerability can also be exploited by hackers to steal from credit cards without using the pin code. This is possible because of the lack of authentication & cryptography used in the cardholder verification method which makes it possible for the attacker to modify settings to suit their needs.
The second vulnerability allows an attacker to trick the merchant into thinking that an offline contactless transaction has been successful on the spot but later on it is revealed that it was declined. This leads to huge losses for the merchant and most of the times they go unnoticed at the moment.
These 2 vulnerabilities can be fixed by directly updating terminal systems globally instead of the EMV protocol itself. NPAV recommends users to always be careful and cautious while using cards for transactions and making contactless payments.
Install NPAV on your devices and stay protected from all kinds of cyber attacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)