To tap or not to tap: Are NFC payments safer? (2024)

Magnetic stripe cards were all the rage 20 or so years ago, but their security was fragile, and the requirement for signatures often added to the hassle of transactions – not to mention, they lacked data encryption, making them vulnerable to skimming and cloning by criminals.

Chip-based cards emerged as a successor, offering enhanced security through data encryption. These cards required insertion into payment terminals (POS) and authentication with a PIN, marking a shift toward more secure transaction methods. From a security standpoint, chip-based cards were a clear advancement, as they required authentication and offered enhanced on-card security due to encryption. Nonetheless, these cards were still susceptible to cloning or information theft, though perpetrating such crimes was more challenging than with magnetic stripe cards.

The NFC standard

Near-field communication, or NFC, evolving from radio frequency identification (RFID), emerged as a new payment standard in the latter half of the 2010s. With this technology, the original chip-based cards have become even more useful, as instead of having to insert them into payment terminals and ATMs, all it takes is a tap onto an NFC-enabled payment device to transfer money.

What can be a payment device? Apart from contactless cards, phones can now also serve this function through services such as Apple Pay or Google Pay, which, after uploading your card details into the service, enable you to use your phone for payments.

To tap or not to tap: Are NFC payments safer? (1)

The process through which NFC payment works operates quite similarly to Bluetooth or other wireless communication systems, utilizing radio waves to activate and verify the information being transmitted. This data is then decoded by an antenna. Specifically, in the case of a payment, the terminal receives information from the phone, which it then processes and approves to facilitate the transaction.

Due to NFC’s very short range, it’s not useful for large data transfers. Unlike Wi-Fi or Bluetooth, it is slower and requires the two communicating devices to be in close proximity. This bears some resemblance to the infrared file transfers of the past, which worked similarly but were much less convenient and worked only half the time: You had to be very precise with how you placed your phones, and the sensors had to almost touch (here’s an old manual showcasing the function).

How secure is NFC?

Given that its primary application is facilitating contactless transactions, one might assume that it must be entirely secure, right?
It is, kind of. Compared to other methods of wireless communication, it is much harder to intercept due to the close proximity required for it to work, but that does not mean that it is imperceptible to some forms of cyberattacks.

One of the most common attack methods when it comes to wireless communication is man-in-the-middle (MITM) attacks. For them to work, there needs to be some tool (equipment, fake website, emails) intercepting communication between two devices/users, which then decrypts and relays the required data to the attacker. This is one of the reasons using public Wi-Fi is so dangerous; it does not take a lot to set up a fake hotspot with the same name as a business/city location, and since people do want to use them, a criminal can easily compromise communication coming from devices using those hotspots.

Do MITM attacks apply to NFC? Sort of. While it technically exists as a threat, it’s just not that viable, because of several reasons. Firstly, to “skim” NFC communication, a reader has to get quite close to the card/phone in order to read off the required data. Secondly, the hacker needs to have some special tool to do that as well. Honestly, it would be much easier just to outright steal your phone/card.

Potentially, payment terminals can be compromised. However, as opposed to regular card skimming, NFC communication is encrypted and tokenized – meaning that a card can hardly be duplicated thanks to its information being hidden.
However, do not assume that an opportunist would still not try to “bump” into you in order to obtain card details, and since wireless car key attacks also exist (which use similar RFID technology to work as NFC), credit cards and phones are still in danger.

Security should not be taken for granted

While it is true that NFC technology is more secure, especially when it comes to making payments, it doesn’t mean that it is infallible, as malicious actors can easily exploit certain vulnerabilities to get what they want.

For example, a researcher in 2021 demonstrated an attack in which he used an Android app to simply “wave” at NFC-enabled ATMs to compromise them. This was possible due to certain software bugs in those machines, which can very well be a reality for other forms of payment terminals as well.

System flaws and security holes will always exist, which is why even cyber insurance providers often underline vulnerability patching as a requirement for coverage.

What’s more, since NFC payments are inherently built based on the aspect of convenience, there is a lack of additional authentication (like a PIN) that a regular chip-based card would require, for example. So, If someone does steal your credit card, they can easily make fraudulent payments without them needing to input a code (up to a certain value), and depending on your set payment limits, the sums can be quite high.

Phone payments – are they more secure?

As mentioned before, NFC capabilities are also present on phones. But are they more secure? Since Apple Pay, Google Pay, and others require added security in the form of a PIN, fingerprint, face scan, or something else you might have available on your phone, there is indeed some added security. Also, both payment services only work when enabled, so there is less of a chance of someone just leisurely initiating a payment from you. Plus, using Apple or Google Pay does not transmit your account details, and, in case you lose your device, it is quite easy to remotely disable these services.

To tap or not to tap: Are NFC payments safer? (2)

Likewise, while smartwatches are great in many ways, enabling payments through them might be problematic, primarily due to the lack of additional authentication beyond a short PIN required to unlock the watch. The assumption is that the watch being on the owner's wrist serves as a form of authentication. However, considering that watches can be stolen and are often protected by just a four-digit PIN, this may not always be a sufficiently secure method for transactions.

How to make your contactless payments more secure

To end this article on a more positive note, there are ways you can make your contactless payments more secure. Here’s how:

  • Try RFID blockers – These are small cards or wallets that create a barrier between your card and the outside world, mitigating potential skimming attacks.
  • Set up low payment limits – This can be done through your bank or their software, wherein you can set a maximum limit on how much you can purchase through contactless payments.
  • Use phone payments – Even though these apps can have their flaws, they are still a bit more secure than contactless cards, thanks to additional authentication requirements.
  • Use cash – This probably doesn’t need an explanation. However, you may worry about carrying large amounts of money in your wallet, which can also be stolen.
  • Skip smartwatches – Due to lower security, enabling payments on smartwatches might pose potential problems.
  • Get a travel card – If you’re worried about the express payments angle, get a top-up travel card, if possible, instead of using your own credit card/phone as a means of paying for tickets.

And these are just some methods you can employ to have more secure payments. Of course, no security solution can give you a 100% guarantee, but even small, simple steps can go a long way toward making you less likely to experience misfortune.

Before you go: Mobile payment apps: How to stay safe when paying with your phone

To tap or not to tap: Are NFC payments safer? (2024)

FAQs

To tap or not to tap: Are NFC payments safer? ›

Tap-to-pay is less vulnerable to credit card skimming and other types of fraud since the card itself never touches the payment terminal for a transaction. “Skimming” involves using a hidden device to read and translate credit card data when a credit card is swiped to make a purchase.

Is paying with NFC safer? ›

NFC payments are generally considered secure. They often incorporate encryption to protect sensitive information such as credit card numbers. Additionally, many smartphones require authentication (such as a fingerprint scan or a passcode) before the payment is processed, adding another layer of security.

Is tap to pay more secure? ›

Contactless payments offer robust security measures, surpassing traditional magnetic strip cards. EMV chip technology and Dynamic Data Authentication (DDA) enhance protection against fraud.

Does tapping your phone for payment pose a security risk? ›

Contactless payments like those made by tapping a phone at a terminal are convenient but come with security concerns, such as data breaches and fraud. Enhancements in security are ongoing, with biometrics expected to play a significant role in future protections.

Is phone tap safer than card tap? ›

Payments made through mobile wallets, like Apple Pay® and Google Pay™, on smartphones or wearable technologies can benefit from the most fraud protection. Because legacy, contactless, and EMV credit cards can all be linked to NFC-enabled devices, this may be the safest strategy.

Is it OK to leave NFC on all the time? ›

Generally yes, NFC can be left on and operating range is around 5 cm. For added security, set up your phone so that it must be unlocked to complete a near field communication (NFC) transaction. To turn on this setting: Go to Settings .

Does tap to pay avoid skimmers? ›

Use tap to pay or contactless pay whenever you can. These methods are usually safer because the skimmer can't grab your card info like it can when you slide or dip. This uses Near Field Communication (NFC) technology, which only works over a very short distance (a few centimeters).

Can tap to pay be hacked? ›

Tap to pay can be safer than paying with a credit card chip or debit PIN. When you insert your chip or enter your information into a credit card reader, that information can be copied or hacked. With tap to pay, your contactless debit card or credit card never makes physical contact with the card reader.

Is it better to swipe or tap to pay? ›

In summary, compared to conventional credit card swiping, tap-to-pay systems provide improved security, convenience, and fraud protection, making them a significant improvement in payment technology.

What are the disadvantages of tap and pay? ›

Because contactless payments require neither PIN nor signature authorisation, lost or stolen contactless cards can be used to make fraudulent transactions.

Should I have NFC on or off? ›

Leaving NFC enabled on your phone does not significantly drain the battery, as the chip only activates when it's close to another NFC device. Therefore, you can keep it enabled to take advantage of its many benefits without worrying about excessive battery consumption.

Is NFC a security risk? ›

Despite its many advantages, NFC technology is not immune to security risks. Common vulnerabilities include data interception, unauthorized access, and malicious code injection, which allow cybercriminals to exploit NFC for their nefarious purposes.

Can someone access your phone through NFC? ›

In cases where an NFC device and the network it uses are properly secured, however, the chances of a hacker managing to carry out a data tampering attack via NFC are very low.

Is it safer to tap or swipe your credit card? ›

Is tapping to pay safer than swiping? Contactless payment technology is typically considered the safest since some of the methods thieves use to hack into your card become virtually impossible to facilitate.

Is paying by phone tap safe? ›

It is a safe and easy way to make in-person purchases with a card or mobile device. 'Contactless payments' are also known by other common terms and phrases. These include: Tap and pay.

Can NFC payments be skimmed? ›

Potentially, payment terminals can be compromised. However, as opposed to regular card skimming, NFC communication is encrypted and tokenized – meaning that a card can hardly be duplicated thanks to its information being hidden.

What is the disadvantage of NFC in mobile? ›

Disadvantages of NFC :

It can just work on more limited distances which are around 10-20 cm. It offers exceptionally low information move rates which are around 106 or 212 or 424 Kbps.

How safe are contactless payments? ›

Your data is encrypted and your details are kept safe during every transaction. The retailer must enter an amount into the payment terminal first, and then you need to hold your card very close to it. This means you can't accidentally spend money from walking by or being near the payment terminal.

Is NFC more secure than Bluetooth? ›

NFC is more secure than Bluetooth simply because of the close range requirement of the said technology. As you need your phones to be in contact with each other, there will be almost no interference and your data will be safely transferred.

Top Articles
Forex Account Hacking — Real Problem?
What is the 40% Tax Bracket? | The Accountancy Partnership
Lighthouse Diner Taylorsville Menu
Ds Cuts Saugus
Www.metaquest/Device Code
Overnight Cleaner Jobs
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Craigslist In Fredericksburg
Displays settings on Mac
Weather In Moon Township 10 Days
414-290-5379
Thayer Rasmussen Cause Of Death
New Mexico Craigslist Cars And Trucks - By Owner
Cpt 90677 Reimbursem*nt 2023
Driving Directions To Bed Bath & Beyond
Jellyfin Ps5
Cta Bus Tracker 77
Hermitcraft Texture Pack
Tinker Repo
Clare Briggs Guzman
Exl8000 Generator Battery
Best Sports Bars In Schaumburg Il
Directions To Nearest T Mobile Store
4 Times Rihanna Showed Solidarity for Social Movements Around the World
Divide Fusion Stretch Hoodie Daunenjacke für Herren | oliv
Gen 50 Kjv
Neteller Kasiinod
Noaa Marine Forecast Florida By Zone
Account Now Login In
Life Insurance Policies | New York Life
Rund um die SIM-Karte | ALDI TALK
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
Darrell Waltrip Off Road Center
Clark County Ky Busted Newspaper
2024 Ford Bronco Sport for sale - McDonough, GA - craigslist
Domina Scarlett Ct
2700 Yen To Usd
Verizon Outage Cuyahoga Falls Ohio
Directions To The Closest Auto Parts Store
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
Courses In Touch
Wilson Tire And Auto Service Gambrills Photos
Mybiglots Net Associates
Craigslist Woodward
Pixel Gun 3D Unblocked Games
Oakley Rae (Social Media Star) – Bio, Net Worth, Career, Age, Height, And More
Mountainstar Mychart Login
Every Type of Sentinel in the Marvel Universe
Quest Diagnostics Mt Morris Appointment
Sleep Outfitters Springhurst
Cool Math Games Bucketball
Southern Blotting: Principle, Steps, Applications | Microbe Online
Latest Posts
Article information

Author: Velia Krajcik

Last Updated:

Views: 6370

Rating: 4.3 / 5 (74 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Velia Krajcik

Birthday: 1996-07-27

Address: 520 Balistreri Mount, South Armand, OR 60528

Phone: +466880739437

Job: Future Retail Associate

Hobby: Polo, Scouting, Worldbuilding, Cosplaying, Photography, Rowing, Nordic skating

Introduction: My name is Velia Krajcik, I am a handsome, clean, lucky, gleaming, magnificent, proud, glorious person who loves writing and wants to share my knowledge and understanding with you.