Connect with us

Hi, what are you looking for?

DOGE0.070.84%SOL19.370.72%USDC1.000.01%BNB287.900.44%AVAX15.990.06%XLM0.080.37%
USDT1.000%XRP0.392.6%BCH121.000.75%DOT5.710.16%ADA0.320.37%LTC85.290.38%
THE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & LifestyleTHE BIZNOB – Global Business & Financial News – A Business Journal – Focus On Business Leaders, Technology – Enterpeneurship – Finance – Economy – Politics & Lifestyle

Technology

Technology

A leak in iPhone Application Visa Payment

Apple
Apple Phone - Images from pixabay stevepb Apple Phone - Images from pixabay stevepb
Apple
Apple Phone - Images from pixabay stevepb Apple Phone - Images from pixabay stevepb

Recently, there was a viral video where a user of iPhone showed how they earn through contactless Visa with a locked iPhone. He made a payment of almost $1000 to demonstrate the occasions.

Payment methods were very secure; the company behind the technology, Apple, blames the visa system. Visa, on the other hand, said that such malicious practices were modifications of external companies. The leak works with the ‘Express Transit’ mode, found in the iPhone’s wallet. This means all the blame goes to the silicon valley giant tech company, a report by BBC.

Express Transit

Apple made the ‘Express Transit’ payment method that allows their communities to pay using contactless payment. While making payments, one can decide not to unlock their iPhones. For example, while at the London Underground ticket barrier, you might decide to touch –in and out, and you’re done.

Researchers have found simple hacks on the Visa systems that allow smart hackers to steal money. Computer science departments discovered the attacks in Birmingham and Survey Universities. So the scientists decide to experiment and demonstrate how the action takes place. Here is a small preview of what usually happens.

The owner decides to place radio equipment near the iPhone. This makes the iPhone hangs to the nearest ticket barrier. While holding an Android phone with the same Visa software application sends signals from the nearest iPhones to the contactless terminal. It can be a shop or any criminal control point.

Unlocked iPhone

The iPhone doesn’t need to be unlocked. It only assumes it’s sending money to an external ticket barrier. The communication between the payment terminal and the iPhone is modified to make the phone think it is under unlocked circumstances. This allows it to make huge transactions to unauthorized a person. The user needs nothing like a fingerprint, face Id, pin, or any password.

The researchers demonstrated the example to BBC News by withdrawing $1000. The report said that the action can occur even when the iPhone’s victim is far away from the Android phone. Internet connection is the key. Even the transaction can even take place from one content to another. In the University of Survey’s lecture, Dr. Loana Boureanu was the leader of the research team.

What about a stolen iPhone?

The was the need to know if any external hackers were exploiting the attack. Because the demonstration only took place in the lab. A cyber security researcher in Pen Testing, Ken Munroe, talks to the BBC about the matter. He said it was fun working on such research. It has opened their eyes to how we view technology. However, there is a need to fix the issue as quickly as possible.

Even contactless credit card terminals have their leakages. But with the Visa and iPhone situation, it’s so risky. There is no need for a terminal barrier. A box of electronics can send signals and transact money at any point. Now, the worst occasion comes to lost iPhone. Yes, it’s always difficult to use a stolen iPhone, but remember the attack can occur while unlocking the gadget. The stolen phone made the attack easier.

The Birmingham and Survey researched told BBC that they had already approached the Visa and Apple companies over the matter a year ago. They are amazed because the company has taken immediate action to fill the gap. Visa replied that their cards were secure.

Also Read:

Apple defends itself

On the other hand, Apple told its users to block a lost phone using the iCloud software. Furthermore, they must take action to alert Visa to block any payments for some time. Steve Jobs’ company said Visa should collaborate to prevent the leak. For real, it’s unlikely that the attack will occur in the real world. But anyway, Visa bragged about their cards being protected by Visa zero liability.

A researcher at Birmingham University, Dr.Andrea Radu, said anything possible in the lab might occur in the real world. Although the attack has some complex technical situations, there is the possibility of smart hackers. Dr. Tom Chothia advised iPhone owners to disable their Visa payments.

The same team from two universities researched MasterCard and Samsung payments but found no leaks. Dr. Loana promised that the two methods were 100% secure and safe.


Comment Template

You May Also Like

Business

EU Takes Action: Investigation Initiated Against Apple, Meta, and Google The European Union (EU) has initiated investigations into several major tech companies, including Meta,...

Business

Antitrust Allegations: US Accuses Apple of Smartphone Market Monopoly The United States has filed a groundbreaking lawsuit against Apple, alleging the tech giant of...

Business

Norfolk County Council Triumphs Over Apple in £385m iPhone Dispute Apple has agreed to a settlement of $490 million (£385 million) to resolve a...

Business

3 Chip Power: Apple’s New MacBook Air Offers Enhanced Speed and Performance On March 4, Apple unveiled its latest offerings in the MacBook Air...

Notice: The Biznob uses cookies to provide necessary website functionality, improve your experience and analyze our traffic. By using our website, you agree to our Privacy Policy and our Cookie Policy.

Ok