{"id":209593,"date":"2017-08-03T10:21:10","date_gmt":"2017-08-03T14:21:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning-counterfeiting-and-fraud-in-digital-payments-what-to-know-to-stay-safe-technology-zimbabwe\/"},"modified":"2017-08-03T10:21:10","modified_gmt":"2017-08-03T14:21:10","slug":"cloning-counterfeiting-and-fraud-in-digital-payments-what-to-know-to-stay-safe-technology-zimbabwe","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/cloning-counterfeiting-and-fraud-in-digital-payments-what-to-know-to-stay-safe-technology-zimbabwe\/","title":{"rendered":"Cloning, Counterfeiting and Fraud in digital payments  what to know to stay safe &#8211; Technology Zimbabwe"},"content":{"rendered":"<p><p>    The second topic being discussed at the Mobile money and    Digital payments conference at Meikles hotel is discussing    Cloning, Counterfeiting and Fraud in mobile money and digital    payments. The discussion was kick started by a presentation    from Jaqueline Malaba, the business development manager at Visa    Card.  <\/p>\n<p>    Her discussion touched on how digital payments are more    accessible now since 4.9 Billion devices were reported to be    connected in 2015. She also shared how its estimated that    around 25 billion devices will be connected to the internet by    2020. The talk then progressed to show how security and    innovation produce a complicated situation.  <\/p>\n<p>    With the rise in the number of different payment methods people    can use, how can people stay secure while transacting online?    She shared some of the techniques that could be used, for    example, not giving out too much personal information on social    media and also not directly entering your card details online    for transactions. A safer method according to her would be to    use a different platform like PayPal and then link your card to    that platform.  <\/p>\n<p>    In this case, youd then use your PayPal details to make an    online payment and protect your card details. After her    presentation, the panelists then started to discuss more on    this topic and what things are happening within the digital    payments ecosystem. Something that came out was the fact that    very few people are aware of how things are happening when they    transact using plastic or mobile money. Due to not having    enough information, people can be hacked easily as they dont    know how to protect themselves.  <\/p>\n<p>    The discussion then pointed out how our cards work, which    methods are safer and how to increase safety. There are    currently 2 types of cards that we are familiar with locally.    The first one is the good old card with a black strip at the    back which uses a magnetic strip for transactions. This type of    debit card is not that safe as most of your information is    stored on that strip and hackers can use devices called    skimmers to obtain that information. After obtaining that    information they can then sell it or use it to make fraud    payments.  <\/p>\n<p>    This vulnerability has been known worldwide for sometime and    recently, weve started to see some local banks stopping to use    such type of cards. The other type of card which is safer than    the previous one is called an EMV card. It is the one that some    local banks are migrating to as it uses a chip card technology    to process payments. The chip is encrypted and thus hackers    cant easily steal your information or clone your card.  <\/p>\n<p>    As the discussion went on, someone in the audience outlined    that they once processed a payment using that card without    actually having to enter their pin number. Just like what    Jacqueline outlined earlier, innovation + security =    complicated. Authur Matsaudza from Steward Bank, then explained    how this was possible. In a nutshell, there are two types of    transactions: card present transaction and card not present    transaction.  <\/p>\n<p>    The first one requires you to enter your pin while the other    one can work without your pin. The second one can work without    a pin because the card has a card number at the front and a    second card verification value at the back. Using these two    pieces of information, a transaction can be processed if    theyre entered into a point of sale machine or online.  <\/p>\n<p>    Upon these revelations, a suggestion given to stay safe when    transacting was to use what the finance sector calls3D    authentication. This is when your bank, your card and the    receivers bank work together to make sure that the transaction    was authorized by you. So each time a transaction has to be    processed, a one time pin has to be sent to you.  <\/p>\n<p>    Other measures offered where to never give a waiter at a    restaurant or anyone else your card for them to process the    payment especially if you have the EMV card due to the reason    outlined above. Banks still have to improve the safety of    transacting online or even physically using their cards. More    importantly, they should educate their customers on what can    actually happen to make them vulnerable and how they can secure    themselves.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.techzim.co.zw\/2017\/08\/cloning-counterfeiting-fraud-mobile-money-digital-payments-know-stay-safe\/\" title=\"Cloning, Counterfeiting and Fraud in digital payments  what to know to stay safe - Technology Zimbabwe\">Cloning, Counterfeiting and Fraud in digital payments  what to know to stay safe - Technology Zimbabwe<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The second topic being discussed at the Mobile money and Digital payments conference at Meikles hotel is discussing Cloning, Counterfeiting and Fraud in mobile money and digital payments. The discussion was kick started by a presentation from Jaqueline Malaba, the business development manager at Visa Card <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cloning\/cloning-counterfeiting-and-fraud-in-digital-payments-what-to-know-to-stay-safe-technology-zimbabwe\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187749],"tags":[],"class_list":["post-209593","post","type-post","status-publish","format-standard","hentry","category-cloning"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/209593"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=209593"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/209593\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=209593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=209593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=209593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}