Examining the Latin American and Caribbean E-Commerce Market

Total Page:16

File Type:pdf, Size:1020Kb

Examining the Latin American and Caribbean E-Commerce Market DIGITAL SECURITY WHITE PAPER Examining the Latin American and Caribbean E-commerce Market DECEMBER 2019 Introduction to the Latin American and Caribbean E-commerce Market Across the globe, the use of e-commerce is rapidly expanding and becoming the new standard method for shopping. Key to this growth is the proliferation of smartphones, allowing the instantaneous purchase of products and services, all at the touch of a screen. Further driving this market trend are Millennials – those whose youngest members were born in the year 2000 – who are used to purchasing anything they want, whenever they want, often sharing the experience with friends through social media. 2 MASTERCARD Paper sources To ensure the acceleration and success of the which ensures the safety of consumers’ Quantitative • 900 consumers evolutionary process of e-commerce in Latin payment credentials and acts as their invisible methodology • 25 minutes length America and reach the highest levels of security hero. The industry is in a continuous innovation and convenience for consumers, Mastercard process to leverage the latest technologies Consumer • Men and women has developed the Digital Security Roadmap. and develop fraud protection solutions, • Who have shopped online Mastercard’s Digital Security Roadmap authentication technologies that allow key in past 12 months provides a set of initiatives, guidelines and tools players including, merchants and banks to • 18 to 50 years for banks and retailers in LAC to accelerate ensure online shoppers are who they say they the adoption of cutting-edge technologies are, by leveraging solutions including biometric Fieldwork dates • September 24th to needed to not just keep the e-commerce space data for identification authentication. October 8th, 2019 safe for everyone involved, but also in line This paper is drawn from a variety with the latest standards of the industry for of sources, including our recent research Countries • Argentina, Brazil, Chile authentication of online transactions. interviewing 900 consumers, 100 each from Colombia, Costa Rica, This paper outlines the needs and nine important markets/countries in Latin Dominican Republic, expectations from shoppers in LAC, as told to America and the Caribbean to draw the current Mexico, Peru and us by themselves, in order for them to start conclusions. This work was conducted from Puerto Rico. embracing e-commerce shopping, the same September 24th to October 8th, 2019. The data way they do in the physical world. Importantly, is qualitative and quantitative, and is drawn this paper discusses new solutions and from 25-minute interviews with mass and developments like the “token” technology affluent men and women whose ages ranged concept (adopted by financial institutions), from 18 to 50 and who have shopped online in the past 12 months. The countries and markets examined in this paper are Argentina, Brazil, Chile, Colombia, Costa Rica, Dominican Republic, Mexico, Peru and Puerto Rico. While the last market is technically a part of the United States and not an independent country, it exhibits very different patterns of consumer behavior from the 50 states and is geographically within the Caribbean region. In fact, we will see how different it is from both the United States and other Latin American regions in its e-commerce consumer patterns. INTRODUCTION 3 Context and Study Relevance to Today’s E-commerce Marketplace We know how much untapped market growth • 24% of purchase volume is digital and online exists in Latin American and Caribbean transactions are growing 2.8 times more e-commerce market, largely based on its recent than in-store payments exponential growth in other areas of the world. This • In the next three years, online transactions upward trajectory of purchases, both in greater will surpass in-store transactions in terms of numbers by more consumers and representing a relevance trending increase in economic value, has occurred Several factors are behind this growth, and amid a rise of new technologies, and despite many the two most important are the large numbers perception obstacles. of Millennials coming of age and making Specifically, some of the important purchases, along with the massive proliferation statistics related to the phenomenal growth of smartphones. of e-commerce in Latin America and the The Millennial Generation, digital natives Caribbean from recent market research include whose youngest members turned 18 at the end the following: of 2018, is changing consumption patterns in • According to E-Marketer, E-sales in LAC are the region by prioritizing online transactions expected to grow 21.3% this year to $71.34 over physical ones. They are used to purchasing billion. what they want when they want, having their of purchase volumen is digital and online transactions 24% are growing 2.8 times more than in-store payments. 4 MASTERCARD The Millenial Generation Turning 38 this year, the oldest Digital natives whose Millennials are also youngest members turned well into adulthood 18 at the end of 2018. and in the early stages of their careers. Their methods of purchase will dominate the retail industry, both online and for in-person They are changing transactions. consumption patterns in the region by prioritizing They are the main drivers of online transactions over these current e-commerce physical ones. growth patterns. of the population 30% within Latin America and the Caribbean are Millennials, the largest group out of all generations. every whim satisfied almost instantaneously. Combined with the ubiquity of smartphones, at the final point of purchase. In fact, more Turning 38 this year, the oldest Millennials also this generational trend has significantly than one-third of all LAC online purchases are are well into adulthood and in more advanced impacted the growth of e-commerce. At the abandoned. More than half of planned LAC stages of their careers. As they continue to touch of a screen, consumers can access myriad online purchases make it to the final click, mature into middle age and grow their earning products and services, making instantaneous showing that billions of dollars in purchases are potential, as well as start their own families, purchases. What is intriguing about the Latin not occurring. their methods of purchase will dominate the American market is that many consumers The goal of the research is to better retail industry, both online and for in-person began to buy online first through smartphones, understand why this is the case, and help transactions. They are one of the main drivers eliminating any time once spent on computers. e-commerce retailers and banks better of these current e-commerce growth patterns. Understanding this involves a significant understand what is on the consumer’s mind. For perspective, within Latin America and paradigm change from how e-commerce began With this information, Mastercard and its the Caribbean, Millennials currently comprise in the United States and Europe. partners can work efficiently to make the 30% of the population, the largest group out Our research shows that online consumer online shopping experience better for everyone of all generations. On a global basis, Millennials purchase growth is extraordinary, but it can involved, consumers and retailers alike. are expected to represent 75% of the world’s be even better. What we do know is that many workforce by 2025, according to research by Latin Americans and Caribbean people want Deloitte. to shop online, but something holds them back CONTEXT AND STUDY RELEVANCE 5 Overview of E-commerce in Latin America and the Caribbean The window to e-commerce Across LAC, smartphones are the most shopping apps on smartphones is in Brazil at used electronic devices that consumers own. 83%, followed by Dominican Republic at 81%. Penetration rates are high, ranging from the These numbers do not indicate an overall lowest, 89%, in Puerto Rico to the highest, 97%, tendency not to use a smartphone in the region. in Argentina. In fact, across LAC, communication and social Interestingly, Colombian and Argentine media apps are the most used in the region, consumers report using their desktop and laptop approaching nearly universal usage levels across computers as often as their smartphones. all markets. Conversely, in Puerto Rico, the ownership and LAC’s residents love their smartphones, usage of desktops and laptops is significantly but they don’t always use them for shopping. lower than in other LAC countries. Pg. 14 Smartphone usage in the region remains strong graph. 1 in other aspects of digital life. For example, While smartphone ownership penetration is social media app usage is high, approaching high throughout LAC, there is strong variation nearly universal levels. Pg. 14 graph. 2 among the countries in the use of these devices Online purchases are conducted across to make online purchases through shopping various devices and platforms. These include apps. For example, the lowest rate is in Chile, at smartphones, tablets and desktops or laptops. 44% of those with smartphones, with Peru at Despite the high usage of smartphones across second to last with 50%. The highest usage of the region, consumers use both their desktops/ Smartphones highest lowest are the most used electronic 97% 89% devices that Argentina Puerto Rico consumers own: 6 MASTERCARD How often they O RDEM E P RO G R E S S make purchases O Brazil is the country where they make purchases most often. laptops and smartphones to the same extent Chile and Peru to make online purchases, except in Colombia make a monthly and Argentina, where the use of desktops/ purchase. Mexico and laptops is higher. Puerto Rico is the only region in Colombia our survey where tablets are used the most for make more online purchases. Pg. 15 graph 3 than one Brazil is the country where consumers make purchase every online purchases most often, followed by Mexico fifteen days. and Colombia, with more than one purchase every fifteen days.
Recommended publications
  • Everything You Need to Know About Crypto Management Contents
    Everything you need to know about Crypto Management Contents The New Data Security Landscape ......................................................................................3 Encryption ..........................................................................................................................3 What About the Cryptographic Keys? ................................................................................4 Building a Crypto Foundation ............................................................................................4 The Four V’s Model ............................................................................................................5 1. Crypto Processing and Acceleration ..............................................................................6 Gemalto Integration Ecosystem ........................................................................................6 2. Key Storage .......................................................................................................................7 Centralized key storage (keys stored in hardware) ..........................................................7 Distributed key storage (keys stored at the endpoints) ....................................................8 3. Key Lifecycle Management .............................................................................................9 Key generation and certification ......................................................................................9 Key distribution ..................................................................................................................9
    [Show full text]
  • Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals
    Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals Dilpreet Singh, Ron Ruhl and Hamman Samuel Information System Security and Management Department, Concordia University College of Alberta, 7128 Ada Blvd NW, Edmonton, AB, Canada Keywords: EMV, EMV Transaction Process, Attack, Attack Tree Methodology, Point of Sale Terminal, PCIDSS. Abstract: Europay, MasterCard and Visa (EMV) is a dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. One goal of the EMV protocol is to secure debit and credit transactions at a point-of-sale (POS) terminal, but still there are vulnerabilities, which can lead to unauthorized disclosure of cardholder data. This research paper will provide the reader with a single document listing the vulnerabilities leading to various possible attacks against EMV payment card transaction process at a POS terminal. Attack tree methodology will be used to document these vulnerabilities. This research will also provide the countermeasures against various possible attacks. 1 INTRODUCTION 2.1.1 Application Selection For 25 years, EMV has implemented payment cards EMV cards may contain multiple applications which initially used a magnetic stripe only but now (Debit/Credit/ATM) and files supporting the contain a chip microprocessor which processes applications. On inserting the EMV card into the payments at POS devices. This research examines POS terminal, the terminal requests to read the EMV when the card is present at a POS terminal and will file “1PAY.SYS.DDF01” listing the applications use attack tree methodology to describe the security that the chip card contains. After successful of dynamic data authentication and combined data application selection, the card sends the Processing authentication (DDA/CDA) EMV cards.
    [Show full text]
  • Industry Perspectives on the Evolution of EMV Payment Tokenization
    Industry Perspectives on the Evolution of EMV Payment Tokenization Revised May 6, 2019 [Original release date September 24, 2018] Susan Pandy, Ph.D. and Marianne Crowe, Federal Reserve Bank of Boston Marianne Crowe is Vice President and Susan Pandy is Director in the Payments Strategies Group at the Federal Reserve Bank of Boston. The views expressed in this paper are solely those of the authors and do not reflect official positions of the Federal Reserve Banks of Boston or the Federal Reserve System. Mention or display of a trademark, proprietary product or firm in this report does not constitute an endorsement or criticism by the Federal Reserve Bank of Boston or the Federal Reserve System and does not imply approval to the exclusion of other suitable products or firms. The authors would like to thank members of the MPIW and other industry stakeholders for their engagement and contributions to this report. Table of Contents Executive Summary ...................................................................................................................................... 3 I. Introduction ............................................................................................................................................ 4 II. Changes between EMV Payment Tokenisation Specification v1.0 versus v2.0 .................................... 5 III. Impacts of Evolution of Payment Tokenization on the Mobile Payments Landscape ........................... 7 A. Emergence Third Party Token Service Providers (TSPs) ...............................................................
    [Show full text]
  • Smartcards and RFID
    Smartcards and RFID IPA Security Course Lejla Batina & Erik Poll Digital Security University of Nijmegen 1 Overview • example uses • (security) functionality • smartcard technicalities • RFID technicalities • attacks Smartcard & RFID uses 3 Example smartcard & RFID uses • bank cards • SIMs in mobile phone • public transport – eg OV chipkaart in NL • identity documents – modern passports and national ID cards contain (contactless) chip • access cards – to control access to buildings, computer networks, laptops,... – eg Rijkspas for government personnel – eg UZI pas for medical personnel to access EPD – pay TV 4 (Security) functionality 5 Differences? Commonalities? With respect to functionality or security 6 Differences & Commonalities • all provide data storage • for reading and/or writing • but secured to different degrees & in different ways – different aims of securing: • confidentiality • integrity/authenticity – different ways of securing • integrity by physical characteristics vs digital signatures • access control (eg PIN code, password, crypto protocol) possible on smartcard, not on a magstripe 7 Differences? Commonalities? 8 Smartcard vs other computers No fundamental difference ! smartcard does not only offer data storage but also processing power Btw, smartcards outnumber normal computers such as PCs and laptops Smartcard is restricted in its possibilities How, for example? Smartcard can offer security that PC cannot What, for example? eg you cannot remove the hard drive 9 Smartcard technicalities 10 What is a smartcard? • Tamper-resistant computer, on a single chip, embedded in piece of plastic, with very limited resources – aka chip card or integrated circuit card (ICC) • capable of “securely” – storing data – processing data • This processing capability is what makes a smartcard smart; stupid cards can store but not process • NB processing capabilities vary a lot...
    [Show full text]
  • Towards a Cyber-Security Roadmap for Digital Payments Best Practices and Recommendations
    Towards a Cyber-seCuriTy roadmap for digiTal paymenTs BEST PRACTICES AND RECOMMENDATIONS Sidharth Deb © 2019 Observer Research Foundation All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from ORF. Observer Research Foundation 20, Rouse Avenue Institutional Area New Delhi 110002 [email protected] www.orfonline.org Koan Advisory B6-1, Second Floor, DDA Commercial Complex Safdarjung Enclave, New Delhi 110029 [email protected] www.koanadvisory.com/ Design and Layout: simijaisondesigns Cover Image: Pete Linforth/Pixabay ISBN: 978-93-89094-06-0 ISBN Digital: 978-93-89094-07-7 Towards a Cyber-seCuriTy roadmap for digiTal paymenTs BEST PRACTICES AND RECOMMENDATIONS Sidharth Deb Contents List of Abbreviations 2 Context, Scope and Structure of Report 5 I. INSTITUTIONAL REFORM 9 A. CII Protection Frameworks 9 Domestic Scenario 9 International Best Practices 10 Recommendations 12 B. Cyber Incident Response and Information Sharing 13 Domestic Scenario 13 International Best Practices 15 Recommendations 17 C. Rationalising the Role of Payments Institutions 18 Domestic Scenario 18 International Best Practices 19 Recommendations 20 D. Coordinating the Role of Cyber-Security Institutions 21 Recommendations 22 E. Integrating Future Institutions: Proposed Data Protection Authority of India (DPA) 23 Recommendations 23 II. STANDARDISATION APPROACHES 25 A. Risk-Based Approaches in Technical Regulation 25 Domestic Scenario 25 International Best Practices
    [Show full text]
  • Norton Antivirus Subscription Renewal Code
    Norton Antivirus Subscription Renewal Code almostAthetoid artlessly, Nichols thoughfatting orJuergen triplicate gloats some his collusions backstairs richly, ruralizes. however Is Aubrey utmost coxal Pace or hemorrhages soul-stirring aftereclectically fluidic Ulisesor dabbed. gudgeon Unuttered so acrogenously? and dimply Neville pin Norton antivirus subscription now, the links are tested norton support service team brings the system cleanup tool helps to provide you normally would recommend to subscription renewal norton code subtract dollars from Norton surpasses other antivirus companies by also including vault auditing tools in its password manager. Challenged the price via online chat. If you want to keep the fire of desire burning well past. Now, there does Norton! This site where do not exceed the instructions only few competitions or codes for secure anonymizing proxy using a google contacts before you can easily into its good. Issue and when renewing Norton antivirus after the expiry date. Type knowing your product key, and wife Next. Mike concerning a renewal on view account. The antivirus subscriptions, as per account. VPN disconnected the conversation I opened my torrent client. How many of antivirus subscription ensures that. Norton and pond add site to recycle cart. Show the submenu submenu. Symantec norton renewal. Apply the coupon codes on Norton 360 Antivirus Plus and statutory privacy. Ran live update again. Norton discount codes 40 OFF in February. Indique solo letras y números. Up for automatic renewal Norton reciprocates with a Virus Protection Promise. Are displayed by renewing subscription renewal confirmation email message rule to renew with relevant for antivirus subscriptions to your protection for all norton? My shop just locates the best deal available.
    [Show full text]
  • Unmask Digital Fraud. Today
    UNMASK DIGITAL PRAUD TO DAY. BOOSTING CUSTOMERS’ AND COMPANIES’ DEFENSE AGAINST DIGITAL FRAUD FS PERSPECTIVES CONTENTS 01 THE e-FUTURE IS HERE 02 DIGITAL FRAUD GOES SMART DIGITAL FRAUD HAS 03 DIFFERENT FACETS DIGITAL FRAUD IS SHIFTING GEARS 04 • Case in Point DIGITAL FRAUD IS ACCELERATING 05 • Current trends • Future trends DIGITAL FRAUD IS EVOLVING, 06 BUT THERE’S A WAY TO BEAT IT 07 HOW ACCENTURE CAN HELP 08 STAYING AHEAD OF THE GAME 3 Digital convergence has transformed the marketplace. The new-age consumer is THE e-FUTURE IS HERE spending more time on “virtual platforms” and Digital convergence, the smartphone revolution and affordable, high-speed prefers “digital conversations” (cashless and Internet have together transformed the payments market. They have given seamless payments). financial institutions unprecedented access to consumers—quite literally, enabling them to reach into their pockets. And consumers, on their part, have been quick to adapt to the new marketplace. But are these “digital conversations” secure? While companies have been successfully riding the e-wave, there’s been a The future decidedly lies with businesses that simultaneous rise in the tide of “digital fraud”, specifically, card payments can answer confidently in the positive. fraud. Consider the following: 2018 Global card losses associated with FRAUD IS ALIVE. FRAUD IS SMART. transaction frauds are expected to 2017 1 AND FRAUD IS HERE TO STAY. ARE YOU? cross US$31.3 billion. When EMV (Europay®, Mastercard® and Visa®) chips were first Card fraud cases increased by 3.1 percent in Australia, with losses amounting to A$538.2 million.
    [Show full text]
  • Secure Communication Protocol Definition
    Secure Communication Protocol Definition Dozing Elias creeps interdepartmental. Contrapuntally Pleistocene, Bing quill joinery and effectuate galvanizes. Excellently anionic, Haywood pummelled grosgrain and foil mono. There an unreliable, and email services, is then wait for protocol secure communication definition is not unique login connection before the packet exiting the Protocol Definition TechTerms. The above protocols in common is that they are tunneling protocol link layer. Secure media node as protocol definition. Of security solutions, communicate securely transmit any illegitimate attempt might start. This address is not an Internet address, but an address known only by the SDNP network, and cannot be accessed through the Internet, because like a NAT address, the SDNP address is meaningless to the Internet, despite following the Internet protocol. The basic unit of kill is a User datagram and the UDP protocol provides the same unreliable connectionless service transferring user datagrams as the IP protocol does transferring its datagrams The main difference is jut the UDP protocol is sharp end-to-end protocol. TLS 12 is the procedure current defined version of the protocol and it has savings for several years. Cyber-Security for the Controller Area Network eScholarship. Implementing an ethernet lan. Secure Communications on VoIP Networks Latest DGW. Each authentication protocol involves an unbelievable of messages between the client and server. Regarding key premises and key management defined and implemented Krutz. Everything You Wanted to Know About Authentication Protocols. Initially, the Internet was like as broadcast safe environment and transfer between military forces. TCP can be used to establish a connection between two computers. This could occur asthe result ofan act of vandalism in which a cable is cut or removed.
    [Show full text]
  • Supported Products for ESAP 3.7.8
    Firefox https://172.21.158.254/dana-admin/auth/listEsapProducts.cgi?versionid=... Windows ANTI-VIRUS Products PRODUCTS: Marketing Name Display Name 2345安全卫士 (3.x) 2345安全卫士 (3.x) 360 Internet Security (4.x) 360 Internet Security (4.x) 360 Internet Security (5.x) 360 Internet Security (5.x) 360 Internet Security (6.x) 360 Internet Security (6.x) 360 Total Security (4.x) 360 Total Security (4.x) 360 Total Security (5.x) 360 Total Security (5.x) 360 Total Security (6.x) 360 Total Security (6.x) 360 Total Security (8.x) 360 Total Security (8.x) 360 Total Security (9.x) 360 Total Security (9.x) 360天擎 (6.x) 360天擎 (6.x) 360安全卫士 (11.x) 360安全卫士 (11.x) 360杀毒 (1.x) 360杀毒 (1.x) 360杀毒 (3.x) 360杀毒 (3.x) 360杀毒 (5.x) 360杀毒 (5.x) ALYac Enterprise (2.x) ALYac Enterprise (2.x) ALYac Enterprise (3.x) ALYac Enterprise (3.x) AVANSI Antivirus (4.x) AVANSI Antivirus (4.x) AVG Anti-Spyware (7.x) AVG Anti-Spyware (7.x) AVG AntiVirus (10.x) AVG AntiVirus (10.x) AVG AntiVirus (15.x) AVG AntiVirus (15.x) AVG AntiVirus (16.x) AVG AntiVirus (16.x) AVG AntiVirus (2013.x) AVG AntiVirus (2013.x) AVG AntiVirus (2014.x) AVG AntiVirus (2014.x) AVG AntiVirus (2016.x) AVG AntiVirus (2016.x) AVG AntiVirus (7.x) AVG AntiVirus (7.x) AVG AntiVirus (8.x) AVG AntiVirus (8.x) AVG AntiVirus (9.x) AVG AntiVirus (9.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Business Edition (16.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (17.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (18.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (19.x) AVG AntiVirus Free (20.x) AVG AntiVirus
    [Show full text]
  • Smart Card Talk a Quarterly Newsletter for Members and Friends of the Smart Card Alliance May 2016
    Smart Card Talk A quarterly newsletter for members and friends of the Smart Card Alliance May 2016 In This Issue: ② Executive Director Letter >> A Message From the ③ Latin America Letter >> Executive Director ④ Profile >> It’s been a few months since I’ve talked about the government ⑥ Feature Article >> market, and with our 2016 Government Conference coming ⑩ Council Reports >> up in a few weeks, I’ve turned my attention to the government security marketplace. I hope you’ll join us for Securing Federal Identity 2016, which On the Web: will be held on June 6th at the Ronald Reagan International Alliance in the News >> Trade Center Building in Washington, DC. This issue of the newsletter also features updates on Alliance Councils, a profile Members in the News >> of our newest Internet of Things (IoT) Security Council, new members and CSCIP and CSEIP recipients. Sincerely, Smart Card Alliance Events Randy Vanderhoof SECURING Executive Director, Smart Card Alliance FEDERAL IDENTITY2016 06.06.16 RONALD REAGAN BUILDING GOVERNMENT EVENT WASHINGTON, D.C. Click to Read Letter ... SecuringFederalID.com Securing Federal Identity 2016 June 6, 2016 Ronald Reagan Building Washington, D.C. GlobalPlatform TEE Conference 2016 Call for Papers – Speakers are invited to participate in the world’s only dedicated trusted execution environ- ment (TEE) conference: Next Generation Mobile Feature Article: Profile: Security for Today and Tomorrow Conference, Smart Card Technology and the Internet of Things which will take place in October 2016 in Santa FIDO Protocols Security Council Clara, CA. Today, the FIDO Alliance is working to pro- In the spring issue of 2016, Smart Card Talk vide simpler, stronger authentication to re- spoke with Executive Director Randy Van- duce reliance on usernames and passwords, derhoof about the organization’s new Inter- which are susceptible to a wide range of at- net of Things (IoT) Security Council, which OCTOBER 19-20 CHICAGO, IL tacks.
    [Show full text]
  • The Future of Credit-Card Security May Involve Blinking Numbers - LA Times 12/5/16, 10:41 AM
    The future of credit-card security may involve blinking numbers - LA Times 12/5/16, 10:41 AM The future of credit-card security may involve blinking numbers French digital security company Oberthur Technologies is hoping to revolutionize credit cards by developing a digital display powered by a micro-thin battery and what it calls Motion Code technology. By Ronald D. White DECEMBER 2, 2016, 3:00 AM our credit card may start winking at you soon in an effort to keep your data safe. Y French digital security company Oberthur Technologies, which maintains a significant design and production operation in Los Angeles, has developed a digital display powered by a micro-thin battery. It will change the three or four-digit CVV number — that stands for credit verification value — on the http://www.latimes.com/business/la-fi-credit-card-chip-20161202-story.html Page 1 of 5 The future of credit-card security may involve blinking numbers - LA Times 12/5/16, 10:41 AM back of credit and debit cards as often as 72 times every 24 hours. This latest defense against financial data theft wasn’t available for Black Friday or Cyber Monday. But when it comes to the United States, as early as 2017, it may help plastic remain the dominant payment option. FROM OUR U.S. businesses, cardholders slowly embracing chip technology PARTNERS: Oberthur’s Motion Code technology promises relief to U.S. merchants who haven’t exactly embraced the most recent technology upgrade — security chips built into credit cards. This new development won’t require retailers to buy expensive new hardware to process transactions.
    [Show full text]
  • EMV - the End of Skimming?
    EMV - the end of skimming? Formal analysis of the EMV protocol suite Erik Poll Joeri de Ruiter Digital Security group, Radboud University Nijmegen Overview • The EMV standard • Attacking smartcard chips • Some issues with EMV • Formalisation of the EMV standard • Future of skimming Erik Poll & Joeri de Ruiter Digital Security, Radboud University Nijmegen 2 EMV • Started 1993 by EuroPay, MasterCard, Visa • Common standard for communication between 1. smartcard chip in banking or credit card (aka ICC) 2. terminal (POS or ATM) 3. issuer back-end • Specs controlled by which is owned by • Over 1 billion cards in use • EMV-compliance required for Single Euro Payment Area Erik Poll & Joeri de Ruiter Digital Security, Radboud University Nijmegen 3 Why EMV? • Goal: reducing fraud by 1. skimming 2. stolen credit cards used with forged signatures 3. card-not-present fraud (EMV-CAP) • And also some transfer of liability? Erik Poll & Joeri de Ruiter Digital Security, Radboud University Nijmegen 4 EMV in the Netherlands • EMV migration moved forward from 2013 to 2011 will disappear, to be replaced by • Reason: increasing cost of skimming • 2007 : 15 M€ • 2008 : 31 M€ • 2009 : 38 M€ on a total >> 100 billion €, so fraud only around 0.03% • Other countries already switched to EMV, eg. UK by 2006 Erik Poll & Joeri de Ruiter Digital Security, Radboud University Nijmegen 5 The EMV protocol suite • EMV is not a protocol, but a “protocol toolkit suite”: many options and parameterisations (incl. proprietary ones) • 3 different card authentication mechanisms
    [Show full text]