News

Secure Technology Alliance reveals defense method against CNP fraud

Thursday 9 July 2020 14:40 CET | News

The Secure Technology Alliance has released a white paper, which shows that cards with dynamic security code features might prevent card-not-present (CNP) fraud.

According to the press release, with the widespread implementation of EMV in the US, fraudsters have shifted their focus to CNP fraud, highlighting static card security codes as a critical weakness. Accordingly, the white paper discusses the benefits of dynamic security codes for issuers, merchants, and cardholders, and the implementation impact on payments stakeholders.

For many online transactions, merchants require the user to enter the security code printed on the card to validate that the card is in the possession of the cardholder. These static security codes, if stolen, present a vulnerability that can lead to CNP fraud and a loss of revenue for merchants and issuers. 

Therefore, cards with a dynamic security code present a possible defense against CNP fraud by having a display and generating a frequently changing code. This hinders the ability of a fraudster using a duplicate card or stolen card data. 

The study was developed by the Secure Technology Alliance Payments Council, with the involvement of members such as ABCorp, Ellipse, IDEMIA, Infineon Technologies, MULTOS International, Thales, Visa, and Worldpay.

More: Link


Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Keywords: Secure Technology Alliance, card-not-present, CNP, fraud, EMV, US, static card security codes, dynamic security codes, issuers, merchants, cardholders, online transactions, stolen card data, ABCorp, Ellipse, IDEMIA, Infineon Technologies, MULTOS International, Thales, Visa, Worldpay.
Categories: Securing Transactions | Digital Identity, Security & Online Fraud
Countries: World
This article is part of category

Securing Transactions