{"id":5282,"date":"2019-07-08T15:03:35","date_gmt":"2019-07-08T12:03:35","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=5282"},"modified":"2023-11-06T21:27:21","modified_gmt":"2023-11-06T18:27:21","slug":"credit-card-fraud-though-the-air","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/credit-card-fraud-though-the-air\/","title":{"rendered":"How to Get Protected from RFID Credit Card Fraud"},"content":{"rendered":"\n<p><amp-fit-text layout=\"fixed-height\" min-font-size=\"6\" max-font-size=\"72\" height=\"80\">Remote stealing of money from bank cards embedded with RFID chips, which is also called an RFID credit card fraud, is <a rel=\"noreferrer noopener nofollow\" aria-label=\"quite common (opens in a new tab)\" href=\"https:\/\/www.lifelock.com\/learn-identity-theft-resources-id-theft-rfid-scanners.html\" target=\"_blank\">quite common<\/a> for all countries where people use RFID cards, especially for the US and Europe.&nbsp; Let&#8217;s try to figure out how this happens and what should you do to protect yourself from such attacks.<\/amp-fit-text><\/p>\n\n\n\n<p>The RFID technology simplifies the process of cashless payments and is used by international payment systems MasterCard (PayPass) and Visa (PayWave). The convenience of such cards is that when making a purchase for an amount not exceeding a bank-specified limit (in the EU &#8211; 25 euros, in the U.S. &#8211; $15, in the U.K. &#8211; 20 pounds, in Russia &#8211; 1000 rubles), the owner doesn\u2019t have to enter the PIN-code or leave a signature on the check.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" class=\"shadow-img aligncenter wp-image-5260 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/wireless-credit-card-identity-theft-1-1.jpg\" alt=\"RFID Credit Card Fraud\" width=\"645\" height=\"763\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/wireless-credit-card-identity-theft-1-1.jpg 645w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/wireless-credit-card-identity-theft-1-1-254x300.jpg 254w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/wireless-credit-card-identity-theft-1-1-610x722.jpg 610w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>A crooks\u2019 scenario is similar to that of car hijackers. Their task is to get closer, wait for the right moment and seize the necessary data promptly &#8211; whether it&#8217;s an intercepted signal of an electric lock or an RFID credit card fraud. To steal money from the bank cards remotely the crooks use improvised contactless readers, which work similar to a PoS-terminal \u2013 a legal RFID-reader, but they are much more functional.<\/p>\n\n\n\n<p>To obtain the necessary information the hackers need to move this reader to the card at a distance of 5-20 centimeters. The thus-obtained data is either saved or transmitted to the counterfeit cards for future use.<\/p>\n\n\n\n<p>Even if the card with an RFID-chip is PIN-protected, its number and expiration date are enough for illegal transactions or even creation of a counterfeit magnetic stripe of the card. Coming from the above, even if your wallet with credit cards is securely hidden from prying eyes and hands deep in a pocket or handbag, you can still \u2018get robbed\u2019 in a public transport, street crowd, or even at a cash register at a supermarket. Any owner of a card with a contactless payment technology can be attacked.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/the-most-common-ways-of-credit-card-fraud\/\">The Most Common Ways of Credit Card Fraud<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to get protected against RFID credit card fraud?<\/h2>\n\n\n\n<p>There are not so many ways to protect yourself from the RFID credit card fraud:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data protection experts advise using special bags and wallets with insulation.&nbsp;<\/li>\n\n\n\n<li>It is also possible to complicate the task for the hacker having put a few credit cards in one place.&nbsp;<\/li>\n\n\n\n<li>Moreover, a few years ago Betabrand clothing manufacturer and anti-virus company Symantec cooperated to design jeans and blazers with pockets made using a special silver RFID-blocking material that prevents the scanner rays from passing through. Ready Jeans with a front and back left pockets being \u2018under the Norton protection\u2019 cost $168, and enjoy great popularity in the U.S. A Jacket Work-it at the cost of $198 is a little bit less popular than denims, but it is only because jeans are a more unique garment than the expensive blazer.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"RFID-Blocking Jeans and Blazer | Betabrand &amp; Norton\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/G11xHMvhq3E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>It&#8217;s sad that even if using all the above mentioned costly data protection methods and complying with all safety rules, we cannot fully protect ourselves from <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/online-skimming\/\">online skimming<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a>, <a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">MITM attack<\/a>, etc. Thus, as a two-factor authentication provider, we also advise to be always cautious, careful and turn on two-factor authentication for every online bank operation you do in advance.<\/p>\n\n\n\n<p>Using 2FA for client authentication in a banking system or payment implies the need to confirm the legality of the operation with a one-time password (OTP) each time. Often one-time passwords are sent via e-mail, text messages, chatbots or push-messages, but it\u2019s more secure to use <a href=\"https:\/\/www.protectimus.com\/blog\/protectimus-new-otp-tokens\/\">hardware OTP tokens<\/a> or a special smartphone <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">2-factor authentication application<\/a> to generate one-time passwords.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2FA is a reliable weapon in the fight against identity and money theft, because even having got your credit card data, a scammer cannot use it for fraudulent purposes during online payments. Besides, two-factor authentication can help you avoid becoming a victim of fraud working as an alarm. For example, a mobile phone message with a one-time password to confirm the operation you did not commit will immediately warn you about an attempt to get unauthorized access to your account and thus prevent a bank card fraud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Read more:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/paypal-two-factor-authentication\/\">PayPal Two-Factor Authentication with Hardware Security Key<\/a><\/li>\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/li>\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/windows-computer-safety-tips\/\">10 Windows Computer Safety Tips<\/a><\/li>\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/phishing-vishing-smishing-pharming\/\">Phishing, Vishing, Smishing, Pharming \u2013 What Is the Difference<\/a><\/li>\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-protect-facebook-account-from-being-hacked\/\">How to Protect Facebook Account from Being Hacked<\/a><\/li>\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/non-sms-2fa-instagram\/\">Non-SMS Two-Factor Authentication for Instagram. Why Is It Good?<\/a><\/li>\n\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Remote stealing of money from bank cards embedded with RFID chips, which is also called an RFID credit card fraud, is quite common for all countries where people use RFID cards, especially for the US and Europe.&nbsp; Let&#8217;s try to figure out how this happens and what should you do to protect yourself from such [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[4,245],"class_list":["post-5282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-banks","tag-credit-card-fraud"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=5282"}],"version-history":[{"count":2,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5282\/revisions"}],"predecessor-version":[{"id":8633,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5282\/revisions\/8633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5261"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=5282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=5282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=5282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}