News Feed Item

More Secure Shopping Ahead

MISSION, KS -- (Marketwired) -- 07/25/14 -- (Family Features) Following several high-profile security breaches in recent years, consumers have more reason than ever to be concerned about their privacy when using debit and credit cards. Fortunately, an effort is underway to implement new technology across the United States that will better protect shoppers and their private information.

The Europay, Mastercard and Visa (EMV) card is widely used overseas and can be found in the United States. You may have an EMV card in your wallet without knowing it. In fact, according to EMVCo, 45 percent of the total payment cards in circulation globally include EMV chip technology. New guidelines being rolled out in the United States will hold banks or retailers that have not implemented this new security liable for fraud, so by late 2015, consumers can expect to see these changes closer to home.

What is EMV?
The Smart Card Alliance describes EMV as a set of specifications for smart card payments and acceptance devices that provide strong transaction security features and capabilities not possible with traditional magnetic stripe cards. The EMV chip in the payment card is an embedded microprocessor that keeps your money and financial information from falling into the wrong hands.

What makes EMV more secure?
EMV offers greater security than the traditional magnetic stripe debit or credit cards. An important distinction is that data is stored on a chip rather than the familiar magnetic stripe, making it nearly impossible to counterfeit an EMV card.

"As opposed to magnetic strip technology commonly used in credit and debit cards throughout the country, the EMV chip is extremely difficult to crack by hackers," said Philippe Benitez, vice president of business development for secure transactions for Gemalto, a digital security company that provides the EMV technology. "The card also contains a unique 'stamp' that prevents your personal and financial information from being used fraudulently in the event that your card is stolen or lost."

From a technology perspective, EMV boosts security through:

The chip: A smart card chip is a small computer (or microprocessor) that has its own data storage, processing power and application software.

A unique code: EMV cards generate a unique code that is validated by your bank for each transaction and cannot be re-used. A transaction using a fake card with stolen data couldn't happen at an EMV terminal because it wouldn't be able to generate the proper code.

Advanced cryptography: EMV security is based on strong cryptography, which is used to generate the unique transaction code that allows the terminal to authenticate the card.

How will EMV change my shopping experience?
Instead of swiping your card, now you'll "dip" your card into the payment terminal, holding it in place to allow the transfer of data. Shoppers should expect that this process will take slightly longer than the traditional quick swipe of a magnetic card. EMV technology also enables contactless payments, so shoppers may instead "tap" their contactless EMV cards, which are just as secure and speed up the check-out experience.

Card issuers (your bank or credit company) will determine whether you are required to enter a pin or sign to verify your purchase.

Initially, cards will include both EMV and magnetic stripe technology, so you can be assured your card will work whether the retailer has adopted the new system or not.

For more information about EMV and how it will affect your future card-based purchases, visit www.thatsemv.com or www.gemalto.com/emv.

About Family Features Editorial Syndicate
This and other food and lifestyle content can be found at www.editors.familyfeatures.com. Family Features is a leading provider of free food and lifestyle content for use in print and online publications. Register with no obligation to access a variety of formatted and unformatted features, accompanying photos, and automatically updating Web content solutions.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2645412
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2645415

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
SYS-CON Events announced today that Cemware will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Use MATLAB functions by just visiting website mathfreeon.com. MATLAB compatible, freely usable, online platform services. As of October 2016, 80,000 users from 180 countries are enjoying our platform service.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Established in 1998, Calsoft is a leading software product engineering Services Company specializing in Storage, Networking, Virtualization and Cloud business verticals. Calsoft provides End-to-End Product Development, Quality Assurance Sustenance, Solution Engineering and Professional Services expertise to assist customers in achieving their product development and business goals. The company's deep domain knowledge of Storage, Virtualization, Networking and Cloud verticals helps in delivering ...
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...