To tap or not to tap: Are NFC payments safer? (2024)

Magnetic stripe cards were all the rage 20 or so years ago, but their security was fragile, and the requirement for signatures often added to the hassle of transactions – not to mention, they lacked data encryption, making them vulnerable to skimming and cloning by criminals.

Chip-based cards emerged as a successor, offering enhanced security through data encryption. These cards required insertion into payment terminals (POS) and authentication with a PIN, marking a shift toward more secure transaction methods. From a security standpoint, chip-based cards were a clear advancement, as they required authentication and offered enhanced on-card security due to encryption. Nonetheless, these cards were still susceptible to cloning or information theft, though perpetrating such crimes was more challenging than with magnetic stripe cards.

The NFC standard

Near-field communication, or NFC, evolving from radio frequency identification (RFID), emerged as a new payment standard in the latter half of the 2010s. With this technology, the original chip-based cards have become even more useful, as instead of having to insert them into payment terminals and ATMs, all it takes is a tap onto an NFC-enabled payment device to transfer money.

What can be a payment device? Apart from contactless cards, phones can now also serve this function through services such as Apple Pay or Google Pay, which, after uploading your card details into the service, enable you to use your phone for payments.

To tap or not to tap: Are NFC payments safer? (1)

The process through which NFC payment works operates quite similarly to Bluetooth or other wireless communication systems, utilizing radio waves to activate and verify the information being transmitted. This data is then decoded by an antenna. Specifically, in the case of a payment, the terminal receives information from the phone, which it then processes and approves to facilitate the transaction.

Due to NFC’s very short range, it’s not useful for large data transfers. Unlike Wi-Fi or Bluetooth, it is slower and requires the two communicating devices to be in close proximity. This bears some resemblance to the infrared file transfers of the past, which worked similarly but were much less convenient and worked only half the time: You had to be very precise with how you placed your phones, and the sensors had to almost touch (here’s an old manual showcasing the function).

How secure is NFC?

Given that its primary application is facilitating contactless transactions, one might assume that it must be entirely secure, right?
It is, kind of. Compared to other methods of wireless communication, it is much harder to intercept due to the close proximity required for it to work, but that does not mean that it is imperceptible to some forms of cyberattacks.

One of the most common attack methods when it comes to wireless communication is man-in-the-middle (MITM) attacks. For them to work, there needs to be some tool (equipment, fake website, emails) intercepting communication between two devices/users, which then decrypts and relays the required data to the attacker. This is one of the reasons using public Wi-Fi is so dangerous; it does not take a lot to set up a fake hotspot with the same name as a business/city location, and since people do want to use them, a criminal can easily compromise communication coming from devices using those hotspots.

Do MITM attacks apply to NFC? Sort of. While it technically exists as a threat, it’s just not that viable, because of several reasons. Firstly, to “skim” NFC communication, a reader has to get quite close to the card/phone in order to read off the required data. Secondly, the hacker needs to have some special tool to do that as well. Honestly, it would be much easier just to outright steal your phone/card.

Potentially, payment terminals can be compromised. However, as opposed to regular card skimming, NFC communication is encrypted and tokenized – meaning that a card can hardly be duplicated thanks to its information being hidden.
However, do not assume that an opportunist would still not try to “bump” into you in order to obtain card details, and since wireless car key attacks also exist (which use similar RFID technology to work as NFC), credit cards and phones are still in danger.

Security should not be taken for granted

While it is true that NFC technology is more secure, especially when it comes to making payments, it doesn’t mean that it is infallible, as malicious actors can easily exploit certain vulnerabilities to get what they want.

For example, a researcher in 2021 demonstrated an attack in which he used an Android app to simply “wave” at NFC-enabled ATMs to compromise them. This was possible due to certain software bugs in those machines, which can very well be a reality for other forms of payment terminals as well.

System flaws and security holes will always exist, which is why even cyber insurance providers often underline vulnerability patching as a requirement for coverage.

What’s more, since NFC payments are inherently built based on the aspect of convenience, there is a lack of additional authentication (like a PIN) that a regular chip-based card would require, for example. So, If someone does steal your credit card, they can easily make fraudulent payments without them needing to input a code (up to a certain value), and depending on your set payment limits, the sums can be quite high.

Phone payments – are they more secure?

As mentioned before, NFC capabilities are also present on phones. But are they more secure? Since Apple Pay, Google Pay, and others require added security in the form of a PIN, fingerprint, face scan, or something else you might have available on your phone, there is indeed some added security. Also, both payment services only work when enabled, so there is less of a chance of someone just leisurely initiating a payment from you. Plus, using Apple or Google Pay does not transmit your account details, and, in case you lose your device, it is quite easy to remotely disable these services.

To tap or not to tap: Are NFC payments safer? (2)

Likewise, while smartwatches are great in many ways, enabling payments through them might be problematic, primarily due to the lack of additional authentication beyond a short PIN required to unlock the watch. The assumption is that the watch being on the owner's wrist serves as a form of authentication. However, considering that watches can be stolen and are often protected by just a four-digit PIN, this may not always be a sufficiently secure method for transactions.

How to make your contactless payments more secure

To end this article on a more positive note, there are ways you can make your contactless payments more secure. Here’s how:

  • Try RFID blockers – These are small cards or wallets that create a barrier between your card and the outside world, mitigating potential skimming attacks.
  • Set up low payment limits – This can be done through your bank or their software, wherein you can set a maximum limit on how much you can purchase through contactless payments.
  • Use phone payments – Even though these apps can have their flaws, they are still a bit more secure than contactless cards, thanks to additional authentication requirements.
  • Use cash – This probably doesn’t need an explanation. However, you may worry about carrying large amounts of money in your wallet, which can also be stolen.
  • Skip smartwatches – Due to lower security, enabling payments on smartwatches might pose potential problems.
  • Get a travel card – If you’re worried about the express payments angle, get a top-up travel card, if possible, instead of using your own credit card/phone as a means of paying for tickets.

And these are just some methods you can employ to have more secure payments. Of course, no security solution can give you a 100% guarantee, but even small, simple steps can go a long way toward making you less likely to experience misfortune.

Before you go: Mobile payment apps: How to stay safe when paying with your phone

To tap or not to tap: Are NFC payments safer? (2024)

FAQs

To tap or not to tap: Are NFC payments safer? ›

Tap-to-pay is less vulnerable to credit card skimming and other types of fraud since the card itself never touches the payment terminal for a transaction. “Skimming” involves using a hidden device to read and translate credit card data when a credit card is swiped to make a purchase.

Is paying with NFC safer? ›

NFC payments are generally considered secure. They often incorporate encryption to protect sensitive information such as credit card numbers. Additionally, many smartphones require authentication (such as a fingerprint scan or a passcode) before the payment is processed, adding another layer of security.

Is tap to pay more secure? ›

Contactless payments offer robust security measures, surpassing traditional magnetic strip cards. EMV chip technology and Dynamic Data Authentication (DDA) enhance protection against fraud.

Does tapping your phone for payment pose a security risk? ›

Contactless payments like those made by tapping a phone at a terminal are convenient but come with security concerns, such as data breaches and fraud. Enhancements in security are ongoing, with biometrics expected to play a significant role in future protections.

Is phone tap safer than card tap? ›

Payments made through mobile wallets, like Apple Pay® and Google Pay™, on smartphones or wearable technologies can benefit from the most fraud protection. Because legacy, contactless, and EMV credit cards can all be linked to NFC-enabled devices, this may be the safest strategy.

Is it OK to leave NFC on all the time? ›

Generally yes, NFC can be left on and operating range is around 5 cm. For added security, set up your phone so that it must be unlocked to complete a near field communication (NFC) transaction. To turn on this setting: Go to Settings .

Does tap to pay avoid skimmers? ›

Use tap to pay or contactless pay whenever you can. These methods are usually safer because the skimmer can't grab your card info like it can when you slide or dip. This uses Near Field Communication (NFC) technology, which only works over a very short distance (a few centimeters).

Can tap to pay be hacked? ›

Tap to pay can be safer than paying with a credit card chip or debit PIN. When you insert your chip or enter your information into a credit card reader, that information can be copied or hacked. With tap to pay, your contactless debit card or credit card never makes physical contact with the card reader.

Is it better to swipe or tap to pay? ›

In summary, compared to conventional credit card swiping, tap-to-pay systems provide improved security, convenience, and fraud protection, making them a significant improvement in payment technology.

What are the disadvantages of tap and pay? ›

Because contactless payments require neither PIN nor signature authorisation, lost or stolen contactless cards can be used to make fraudulent transactions.

Should I have NFC on or off? ›

Leaving NFC enabled on your phone does not significantly drain the battery, as the chip only activates when it's close to another NFC device. Therefore, you can keep it enabled to take advantage of its many benefits without worrying about excessive battery consumption.

Is NFC a security risk? ›

Despite its many advantages, NFC technology is not immune to security risks. Common vulnerabilities include data interception, unauthorized access, and malicious code injection, which allow cybercriminals to exploit NFC for their nefarious purposes.

Can someone access your phone through NFC? ›

In cases where an NFC device and the network it uses are properly secured, however, the chances of a hacker managing to carry out a data tampering attack via NFC are very low.

Is it safer to tap or swipe your credit card? ›

Is tapping to pay safer than swiping? Contactless payment technology is typically considered the safest since some of the methods thieves use to hack into your card become virtually impossible to facilitate.

Is paying by phone tap safe? ›

It is a safe and easy way to make in-person purchases with a card or mobile device. 'Contactless payments' are also known by other common terms and phrases. These include: Tap and pay.

Can NFC payments be skimmed? ›

Potentially, payment terminals can be compromised. However, as opposed to regular card skimming, NFC communication is encrypted and tokenized – meaning that a card can hardly be duplicated thanks to its information being hidden.

What is the disadvantage of NFC in mobile? ›

Disadvantages of NFC :

It can just work on more limited distances which are around 10-20 cm. It offers exceptionally low information move rates which are around 106 or 212 or 424 Kbps.

How safe are contactless payments? ›

Your data is encrypted and your details are kept safe during every transaction. The retailer must enter an amount into the payment terminal first, and then you need to hold your card very close to it. This means you can't accidentally spend money from walking by or being near the payment terminal.

Is NFC more secure than Bluetooth? ›

NFC is more secure than Bluetooth simply because of the close range requirement of the said technology. As you need your phones to be in contact with each other, there will be almost no interference and your data will be safely transferred.

Top Articles
Nonrenewable Energy
The cost of shipping is the biggest concern for customers and retailers, according to a new report
Craigslist San Francisco Bay
Best Team In 2K23 Myteam
Skip The Games Norfolk Virginia
Sitcoms Online Message Board
Mission Impossible 7 Showtimes Near Regal Bridgeport Village
MindWare : Customer Reviews : Hocus Pocus Magic Show Kit
24 Hour Walmart Detroit Mi
Grab this ice cream maker while it's discounted in Walmart's sale | Digital Trends
Moviesda3.Com
Tamilrockers Movies 2023 Download
History of Osceola County
Q Management Inc
Illinois VIN Check and Lookup
Zalog Forum
The Menu Showtimes Near Regal Edwards Ontario Mountain Village
V-Pay: Sicherheit, Kosten und Alternativen - BankingGeek
Axe Throwing Milford Nh
Everything you need to know about Costco Travel (and why I love it) - The Points Guy
Vigoro Mulch Safe For Dogs
Sizewise Stat Login
Yard Goats Score
Busted Campbell County
Conscious Cloud Dispensary Photos
Jobs Hiring Near Me Part Time For 15 Year Olds
Directions To Nearest T Mobile Store
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Busted Mugshots Paducah Ky
Abga Gestation Calculator
October 19 Sunset
Khatrimmaza
Sedano's Supermarkets Expands to Orlando - Sedano's Supermarkets
Panchitos Harlingen Tx
W B Crumel Funeral Home Obituaries
What Time Is First Light Tomorrow Morning
Sinai Sdn 2023
Kelly Ripa Necklace 2022
Bcy Testing Solution Columbia Sc
“To be able to” and “to be allowed to” – Ersatzformen von “can” | sofatutor.com
Beaufort SC Mugshots
'Guys, you're just gonna have to deal with it': Ja Rule on women dominating modern rap, the lyrics he's 'ashamed' of, Ashanti, and his long-awaited comeback
Amc.santa Anita
Fedex Passport Locations Near Me
Jammiah Broomfield Ig
Ucla Basketball Bruinzone
Tyco Forums
Deshuesadero El Pulpo
Craigslist Indpls Free
Fahrpläne, Preise und Anbieter von Bookaway
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 6370

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.