Skip navigation EPAM
  • CONTACT US
  • Enter your search query or select one from the list of frequent searches below. Use up and down arrows to review and enter to select.

It Only Takes A Minute to Clone a Credit Card, Thanks to a 50-Year-Old Problem

Leigh-Anne Galloway

Head of Commercial Security Research
Research
  • Disclosure
  • Application Security

This research shows how card data from EMV chip and contactless interfaces can be intercepted and used to create a new magstripe card. This card can be used successfully to make payments. This is possible because of commonalities between magstripe, a fifty-year-old technology and EMV standards for chip inserted and contactless transactions.

Download the full research whitepaper now!

Get Whitepaper

Successfully submitted! Please check your email for the link to the whitepaper you requested.

Oops, something went wrong. Please try again.

If your download doesn't start automatically, please click

Validation failed! Please use the same browser and device that you used to fill out this form. You can also re-submit the form to receive a new download link.

Thank you for helping us keep your information up-to-date.

WhatWeDo.jpg

We Can Help

Our experts can help identify vulnerabilities and threats to keep your business secure.