Skip navigation EPAM
  • Enter your search query or select one from the list of frequent searches below. Use up and down arrows to review and enter to select.

It Only Takes A Minute to Clone a Credit Card, Thanks to a 50-Year-Old Problem

Leigh-Anne Galloway

Head of Commercial Security Research
Research
  • Disclosure
  • Application Security

This research shows how card data from EMV chip and contactless interfaces can be intercepted and used to create a new magstripe card. This card can be used successfully to make payments. This is possible because of commonalities between magstripe, a fifty-year-old technology and EMV standards for chip inserted and contactless transactions.

Click here to access the full research whitepaper.

WhatWeDo.jpg

We Can Help

Our experts can help identify vulnerabilities and threats to keep your business secure.