Welcome!

News Feed Item

More Secure Shopping Ahead

MISSION, KS -- (Marketwired) -- 07/25/14 -- (Family Features) Following several high-profile security breaches in recent years, consumers have more reason than ever to be concerned about their privacy when using debit and credit cards. Fortunately, an effort is underway to implement new technology across the United States that will better protect shoppers and their private information.

The Europay, Mastercard and Visa (EMV) card is widely used overseas and can be found in the United States. You may have an EMV card in your wallet without knowing it. In fact, according to EMVCo, 45 percent of the total payment cards in circulation globally include EMV chip technology. New guidelines being rolled out in the United States will hold banks or retailers that have not implemented this new security liable for fraud, so by late 2015, consumers can expect to see these changes closer to home.

What is EMV?
The Smart Card Alliance describes EMV as a set of specifications for smart card payments and acceptance devices that provide strong transaction security features and capabilities not possible with traditional magnetic stripe cards. The EMV chip in the payment card is an embedded microprocessor that keeps your money and financial information from falling into the wrong hands.

What makes EMV more secure?
EMV offers greater security than the traditional magnetic stripe debit or credit cards. An important distinction is that data is stored on a chip rather than the familiar magnetic stripe, making it nearly impossible to counterfeit an EMV card.

"As opposed to magnetic strip technology commonly used in credit and debit cards throughout the country, the EMV chip is extremely difficult to crack by hackers," said Philippe Benitez, vice president of business development for secure transactions for Gemalto, a digital security company that provides the EMV technology. "The card also contains a unique 'stamp' that prevents your personal and financial information from being used fraudulently in the event that your card is stolen or lost."

From a technology perspective, EMV boosts security through:

The chip: A smart card chip is a small computer (or microprocessor) that has its own data storage, processing power and application software.

A unique code: EMV cards generate a unique code that is validated by your bank for each transaction and cannot be re-used. A transaction using a fake card with stolen data couldn't happen at an EMV terminal because it wouldn't be able to generate the proper code.

Advanced cryptography: EMV security is based on strong cryptography, which is used to generate the unique transaction code that allows the terminal to authenticate the card.

How will EMV change my shopping experience?
Instead of swiping your card, now you'll "dip" your card into the payment terminal, holding it in place to allow the transfer of data. Shoppers should expect that this process will take slightly longer than the traditional quick swipe of a magnetic card. EMV technology also enables contactless payments, so shoppers may instead "tap" their contactless EMV cards, which are just as secure and speed up the check-out experience.

Card issuers (your bank or credit company) will determine whether you are required to enter a pin or sign to verify your purchase.

Initially, cards will include both EMV and magnetic stripe technology, so you can be assured your card will work whether the retailer has adopted the new system or not.

For more information about EMV and how it will affect your future card-based purchases, visit www.thatsemv.com or www.gemalto.com/emv.

About Family Features Editorial Syndicate
This and other food and lifestyle content can be found at www.editors.familyfeatures.com. Family Features is a leading provider of free food and lifestyle content for use in print and online publications. Register with no obligation to access a variety of formatted and unformatted features, accompanying photos, and automatically updating Web content solutions.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2645412
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2645415

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
While many government agencies have embraced the idea of employing cloud computing as a tool for increasing the efficiency and flexibility of IT, many still struggle with large scale adoption. The challenge is mainly attributed to the federated structure of these agencies as well as the immaturity of brokerage and governance tools and models. Initiatives like FedRAMP are a great first step toward solving many of these challenges but there are a lot of unknowns that are yet to be tackled. In hi...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
The proper isolation of resources is essential for multi-tenant environments. The traditional approach to isolate resources is, however, rather heavyweight. In his session at 18th Cloud Expo, Igor Drobiazko, co-founder of elastic.io, drew upon his own experience with operating a Docker container-based infrastructure on a large scale and present a lightweight solution for resource isolation using microservices. He also discussed the implementation of microservices in data and application integrat...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, will explore the value of Kibana 4 for log analysis and will give a real live, hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He will examine three use cases: IT operations, business intelligence, and security and compliance. This is a hands-on session that will require participants to bring their own laptops, and we will provide the rest.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.