Credit Card Guide
 
Follow Us  twitter facebook You Tube Google+
 
Credit Cards > Credit Card News > Credit Smarts > How easy is it to clone a credit card?



 
 

How easy is it to clone a credit card?

 
By
May 5, 2014
Ask Eva
tools
tools
email print comment
tools
SHARE

QDear Eva,

With all the data breaches in the news lately, there has been talk about crooks duplicating cards. Is it really that easy to duplicate a card? Sounds like a complicated process to me.  --Thomas

AHi Thomas,

Just as inventive fraudsters find ways to develop the technology needed to produce counterfeit money, they have technology to clone credit cards — the modern day version of fake dollar bills.

In fact, when it comes to credit cards, in some ways you are less protected than with dollar bills. The U.S. Treasury has set up a whole department — the Bureau of Engraving and Printing — to develop dollar bills that are so difficult to duplicate that fake bills are quickly detected. Ask Eva

When it comes to cloning credit cards, there are lots of technology options for fraudsters, and they are not hard to come by. Even a three-minute Google search revealed hacking forums where people – who proudly referred to a federal inmate number as proof they were real criminals – openly discussed these questions.

Basically, cloning a credit card is the same principle as creating a fake ID card.  In the U.S., credit card information is stored in a binary format on the magnetic stripe at the back of the credit card. You use a magnetizing tool to copy this digital information onto the fake credit card, much as you would copy information from a computer to a USB stick. Similar technology enables you to copy the physical characteristics of the card, complete with credit card number, name and CVV code.

Credit cards in Europe, as well as many Asian countries, use what is known as Chip and PIN technology, which offers greater protection against credit card cloning than U.S. cards' magnetic stripe technology.

With Chip and PIN cards, consumers have to enter their PIN at the point of sale. Even if someone compromises the card data and clones the card, they can't use it to make changes without the PIN.

Hackers, of course, are aware of U.S. card vulnerability. Experts believe overseas hackers orchestrated the recent theft of millions of credit card records from Target, highlighting the fact that weak security technology in the U.S. is attracting worldwide hacker attention to U.S. cards.

Card issuers in the U.S. are aggressively moving toward the EMV technology, requiring merchants to have processors that accept EMV cards by October 2015. Target has moved up its transition to EMV technology to September.

In the meantime, protect yourself by taking basic steps to protect your credit card information from being stolen in the first place. Never use your credit card on websites you don't know and trust. Also, look for the https:// preface in the URL to make sure the site uses SSL encryption.

In addition, credit card information can be stolen via credit card skimming devices at ATMs, restaurants and gas stations. At gas stations and ATMs, skimming devices can be attached to the ATM or gas pump, so look for anything that appears out of place. Finally, review your credit card account once a week to intercept fraudulent charges as early as possible.

Got a question for Eva? Send her an email.


Share 
 
     

 
 

VIEW RELATED STORIES

How to protect your credit in divorce - Jointly held credit accounts can trip up couples during divorce, so being proactive is critical to protect your financial health ...

What is the best way to pay off student loans? - Increasing your monthly payments on a student loan is a powerful way to reduce the time it will take to pay off the loan, and you'll save on interest ...

How to cancel subscription charges on your card - Small recurring bills showing up on your card statement -- known as "gray charges" -- can end up costing you hundreds of dollars a year ...

ALL CREDIT CARD NEWS & ADVICE ARCHIVES >>

 
     

 
  If you are commenting using a Facebook account, your profile information may be displayed with your comment depending on your privacy settings. By leaving the ‘Post to Facebook’ box selected, your comment will be published to your Facebook profile in addition to the space below.
 
     


 
Secure SSL Technology
Secure SSL
Technology
 
Twitter Facebook You Tube Google+
About Us Privacy Policy Editorial Team Terms of Use
Contact Us California Privacy Rights Media Relations Site Map

Close X