Card and Mobile Payment Threat Models
Mobile or digital wallets have recently overtaken credit cards as the most used payment method, raising the question of whether the existing threat models are accurate and applicable.
In this whitepaper you will learn the ways in which card-based payments work, and the differences between traditional payment cards and the mobile payment systems which are common today. From there, we will cover common architectures, threat models, and fraud and mitigating techniques relating to mobile payments.