Why there's a chip in your new credit and debit cards

You’ve likely seen this major, recent addition to your credit cards and debit cards. You might’ve suddenly had your bank reissue every card, and the new ones have a shiny, little square. And when you use them at certain stores, you have to insert your card into the reader instead of swiping it.

Those little shiny squares are called EMV chips, and they’re already on almost 400 million cards in the United States. That means three out of four cards in the U.S. are already chip-enabled.

Chip-enabled cards are the standard in most of the world, with big-name financial institutions behind them, including American Express, Discover, Mastercard and Visa. These companies have one big incentive to do a better job securing your card transactions: Money. In 2016 alone, an estimated $4 billion will be stolen from U.S. citizens by criminals duplicating the information on the standard magnetic strip found on the back of every card.

Plus, some of the worst credit card crimes in recent years exploited the payment machines where you swipe your card. Remember a few years ago when criminals hacked Target’s in-store credit card readers to steal information from up to 70 million people? Criminals used that same method over a five-month stretch at The Home Depot in 2014 to compromise credit card information for 56 million people.

EMV chips are intended to make it a lot tougher for criminals to steal your information and exploit retailers’ payment systems. Here’s how it works — and why it still isn’t as safe as you might hope.

EMV security

The EMV chip in your card protects you from criminals in a number of ways. If you’ve tried swiping a credit or debit card with an EMV chip in it, you know it doesn’t work with standard credit card readers, which read the magnetic stripe. The chip is different, and that includes the way your information is stored on them.

With a magnetic stripe, for instance, all your information is coded on it. If a counterfeiter steals it and copies it, he or she can use your information over and over. The EMV chip, however, doesn’t store your information; instead, the computer chip creates a unique transaction ID each time you use it. It uses encryption to securely hide your personal information, so even if hackers get the ID, it’s worthless to them.

Second, in most of the world, credit card issuers require cardholders to also input a PIN. That’s commonly referred to as the “chip-and-PIN” method. It’s a great way to keep your cards and information safe. When you use chip-and-PIN, the EMV chip creates a unique ID for that transaction. On top of that, you have to unlock your card with your PIN. Even if a criminal did get his or her hands on your card, they’d have a really tough time getting past your PIN.

Third, some EMV cards use near-field communication (NFC) to make financial transactions. You wave your card past an NFC reader or insert it into one and your money is transferred using radio wave technology from your card to the retailer. For criminals to steal your information, they’d have to be within a few inches of you and have an NFC reader with them. That’s doable, but it’s not something everyday criminals will take on.

EMV drawbacks

While credit and debit cards with EMV chips will better protect your information from theft, EMV, for the moment, is an imperfect system. Or, more precisely, it’s an imperfectly executed system. Here’s why:

Continue reading

20 popular router models are major security risks

In many homes, the router is the gateway to the wide and wild world of the internet. It’s that little gadget you connect your devices to for internet access. It’s an essential component in our internet-connected households and businesses.

Continue reading

Free vs. paid Internet security software - What's the difference?

We are always getting emails and comments asking why anyone would pay for security software when there are plenty of free options available, and that’s a good question. In fact, we’ve covered some excellent free security options in the past. So, what does paid software give you that free options don’t? What this Komando.com report to find out!

5 dangerous phone scams that are spreading now

Unsolicited phone calls from people you don’t know can be irritating. They always have horrible timing, too, like calling when you’re about to sit down for dinner.

Some of these calls aren’t just annoying — they’re also malicious. There’s been a rash of phone calls lately where scammers try to trick victims into giving them sensitive data that could lead to massive financial losses.

Continue reading

How to boost your Wi-Fi for $50

Wi-Fi is both a blessing and a curse. When it works well, you can easily use your gadgets anywhere in your house or office without wires tying you to one spot. When it doesn’t work right, it can be incredibly frustrating.

Continue reading

Password comedy

Everyone knows that strong passwords keep your data safe. But they can also be hard to remember! Stand-up comic Don Friesen sees the funny side of computer security.

If you see this hook in a toilet, leave ASAP and report it

New technology can be a wonderful thing. There have been so many advancements over the past couple of decades that have made life easier — smartphones, self-driving vehicles and virtual assistants, just to name a few.

Continue reading

Is your webcam open to peeping Toms?

You close your doors and curtains to keep snoops and peeping Toms out of your home. Unfortunately, any halfway-dedicated sneak with a little technology can get past both to see everything going on in your house.

No, we’re not talking about X-ray vision, thermal cameras or millimeter-wave scanners. It’s something a lot less expensive, and the peeper doesn’t even have to buy it; it’s already in your home.

Continue reading

The one way to know your iPad or iPhone has a virus

We used to think Apple’s iOS gadgets were pretty immune to viruses and malware. Sadly, over the past year, hackers have turned their attention to our mobile gear. Honestly, I’m not surprised at all. Why?

Stop and think about how much of your life is on your iPhone or iPad. Personal photos, contacts, your exact GPS location, your emails and probably much more are all on that handy little gadget you carry around.

Continue reading

5 dangerous Facebook scams spreading like fire now

Facebook has become a social media giant since it launched in 2004. The site is so popular, there are approximately 2 billion active monthly users worldwide. That’s amazing!

With that incredible number of active users, the site is bound to be a major target for cybercriminals. While a few of the scams you’ll find on the site are harmless, there are others that can actually cause serious problems.

Continue reading

3 ways to spot a malicious website

One of a hacker’s favorite tools for stealing your information is the phishing scam. Whether it’s through email, texts or on social media, sooner or later, you’ll run into messages that try to trick you into clicking on links to malicious websites.

Continue reading