Visa Australia outlines EMV, risk based authentication program
- 03 August, 2012 10:54
Visa Australia country risk manager, Sasha Slevec.
International card provider, Visa, has confirmed that it will be introducing card security chip technology Europay, MasterCard and Visa (EMV) on its cards and upgrading automatic teller machines (ATMs) to be EMV capable by April 2013.
EMV is the global standard used by card providers for integrated circuit (IC) debit and credit cards used with point of sale (POS) terminals.
MasterCard Australia has also indicated that all of its cards, issued by Australian banks, and payment terminals would be upgraded to EMV by 2013. Eftpos Payments Australia will also be EMV compliant and introducing contactless card payment options that year.
Speaking at the Cyber Security Summit in Sydney, Visa Australia country risk manager, Sasha Slevec, told delegates that EMV capable ATMs would be ready by 1 April next year.
“We have some good pilots in the market under way with EMV chip enabled ATMs,” he said.
The EMV rollout is part of Visa’s long-term strategy to combat credit card fraud with upgraded chip security.
In addition, Slevec said that Visa’s online payment security system, Verified by Visa (VbV), which was first introduced in 2001, was recently upgraded to include risk based authentication.
The authentication comes into play when a Visa card holder is shopping online and the transaction is deemed high risk by the card company — expensive golf clubs, for example. The consumer is then asked to provide proof that they are the card holder. This authentication could be an online password, code or one time password sent via SMS to their phone.
However, if the transaction is deemed low risk, Visa card users will see the VbV logo advising that the user is being authenticated and will be sent back to their online purchase.
“Approximately 80 per cent of our Australian issuers have implemented or are in the process of implementing risk based authentication,” Slevec said.
“The card issuers in this country have very good fraud protection tools which have been developed over many years. These tools look for high risk transactions so it makes sense that this risk-based approach is going to find its way into the authentication space.”
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Securing the Promise of Virtualisation
For today’s enterprise, this whitepaper identifies three general areas of risk associated with risk; those that are traditionally areas of risk, the hazards that are exclusive to virtualisation and the more recent set of risks that are associated with newly formed hybrid environments. Read more to find out how to keep pace with evolving threats, quicker provisioning and dynamically mobile workloads.
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!