How to protect a contactless bank card from being swiped. How to protect a plastic card from being swiped? What options for security wallets are on sale

Perhaps some of the tips will seem elementary to you, but it is with them that safety begins.

Card fraud methods

The fantasy of criminals is limitless. Literally every year, new, more sophisticated ways appear. Let's consider the main ones.

Credit card fraud is called carding.

Let's start with the "classics". You came to withdraw money through an ATM. Hurry up, enter your PIN code literally on the run, while chatting on the phone. You didn't even look at the inconspicuous guy in a baseball cap and dark glasses looking over your shoulder. But he was watching you very closely. He spied on and memorized the numbers that you entered. Further elementary GOP stop- and goodbye money.

Also, in the confusion, you may not see that in front of you is not a real ATM, but a fake. After all, the device is exactly like a real one. Stickers, instructions - everything is as it should be. Insert the card, enter the PIN-code, and the screen displays: "The device is faulty", "There was a system error", "Not enough funds" or something like that. Well, it happens. You go to look for another ATM. But before you find it, scammers will empty your account. After all, with the help phantom ATM they have already read all the necessary data about your card.

Often imitate ATM malfunction... For example, late at night you return home and decide to cash out your salary along the way. Insert the card, enter the PIN-code, the amount - everything is going great. The card collector handed over the card, but the tray where the money should appear does not open. Broken? Probably! It's dark around, you need to call the bank and figure out what happened. You walked away literally ten meters, and the nimble thieves have already peeled off the tape and took your money. Yes, the bills were not issued by simple sticky tape.

Another technique is called Lebanese loop... This is when a lasso from a film is inserted into the card reader. If you hit it, the card can no longer be pulled out. As a rule, there is an “assistant” right there and then: “Yesterday the ATM ate my card in the same way, I entered just such a combination and PIN-code, and everything worked.” You try, fail, and go to the bank for help. At this time, the good Samaritan takes the card and goes to empty it. He knows the PIN. You yourself have just introduced it openly. Remember?

However, the ATM can be real and even serviceable. This is not a problem if the attackers have skimmer... This is a device for reading information encoded on the magnetic stripe of the card. Physically, the skimmer is an overhead block attached to the card capture reader, while it looks like part of the ATM structure.

Left - ATM without skimmer, right - with skimmer

With the help of a transmitter, scammers receive information from the skimmer and produce fake cards. They will use the skimmed card, but the money will be debited from the original account. Hence the name of the method - skimming, from the English "skim the cream".

How do they find out the PIN? In addition to the skimmer, they have other devices. For example, overlay keyboard... It completely imitates the real one, but at the same time remembers the typed key combinations.


Keyboard overlay

Alternatively - a miniature camera aimed at the keyboard and disguised as a box with advertising brochures.


Hidden camera

A kind of skimming - shimming... Instead of bulky overlays, a thin, elegant card is used, which is inserted through the card reader directly into the ATM. Further, the scheme is the same as for skimming. But the degree of danger is higher: it is almost impossible to discern that there is a "bug" in the ATM. It is consoling, however, that making a shim is rather difficult - its thickness should not exceed 0.1 mm. Almost nanotechnology. :)

Phishing is a common method of online fraud. Most of you don't need to be told what it is. Perhaps someone even received a "letter from the bank" with a request to follow the link and clarify the details. Moreover, the phishing page looked like a real one, the same colors, fonts, logos, except for the annoying "typo" in the address bar.

Recently, a subtype of phishing has been spreading more and more - vishing... Simply put, phone divorce... Fraudsters simulate an autoinformation call. A frightening robotic voice informs you that your card is blocked, or has been attacked by hackers, or you urgently need to pay off a loan debt. For details, call such and such a number. You call, and the courteous "operator" asks you to "verify" the card number, its expiration date, verification code ... As soon as you dictate the last digit, you can say goodbye to your money. By the time you come to your senses, they will already be spent in some online store.

By the way, due to the fact that to use the card it is not necessary to have its physical presence, fraudsters are increasingly using the methods social engineering... So I was almost deceived.

I was selling furniture. I posted an ad with photographs on a well-known website. I indicated a number through which not a single authentication goes through. Soon a man called. He introduced himself as Vasily, an employee of a company that rents out apartments for rent. He said that they liked my sofa - they take it without looking! The money will be transferred to my card right now. No problem. I often buy on the Internet, for these purposes I have a special card. There was nothing to write off from it then, but to replenish it - please. But one number was not enough for the caller - the interlocutor asked for more validity period and CVV2. I didn’t name it, but Vasily was offended. He said who I was and where I had to go, and hung up.

Most of the cards are now tied to a phone number in order to confirm transactions or, for example, the entrance to the Internet bank using SMS messages. What cybercriminals do not do in order to get hold of the necessary SIM-card: they steal phones, intercept SMS, make duplicate SIM cards, and so on.

Safety rules when using cards

Having issued a debit or credit card at the bank, we receive a banking service agreement and an envelope with a PIN code. It is a pity that, in addition to this set, they do not attach a memo with basic safety rules for cardholders. It should include the following recommendations.

  • If possible, make yourself a hybrid card - with a chip and a magnetic stripe (unfortunately, cards with only a chip are almost never used in Russia). Such a card is better protected from hacking and counterfeiting by skimming.
  • Learn the PIN by heart. If there is no hope for memory, write it down on a piece of paper, but keep it separately from the card.
  • Never, under any circumstances, disclose to third parties the PIN-code and CVV2-code of the card, as well as its validity period and to whom it is registered. No bank will ask you for these details. And for crediting funds to your account, only the 16-digit number indicated on the front side of the card is enough.
  • Do not use the so-called payroll cards for payments in stores and for online purchases. It is better to transfer money from a card account to your personal account or set daily limits for all types of transactions performed.
  • Choose ATMs located inside bank offices or in guarded locations equipped with video surveillance systems.
  • Do not use suspicious ATM machines. And before inserting the card into the terminal, carefully examine it. Is there anything suspicious on the keyboard or in the card reader? Is there a strange advertising tray hanging nearby?
  • Feel free to cover the keyboard with your hand and ask especially curious friends in line to step aside. If you have any problems, do not use the advice of "random assistants" - without leaving anywhere, immediately call the bank and block the card.
  • If you have lost your card, as well as if you have reason to believe that third parties have learned its details, immediately contact the bank and block it.

The easiest way is to call. If you have the card in your hand, the support number can be seen on the back of the card. Typically, contact centers are open around the clock. If the card remains in the ATM and you do not know your bank's phone number, call the ATM maintenance company. The number must be indicated on the terminal.

Also, inquire about the possibilities and conditions of card insurance at your bank. Some lending institutions have special programs to protect clients from fraud and reimburse them.

Security rules when using banking

Without leaving home, you can use a large package of services. For example, pay something or transfer money to your or someone else's account.

Banking - remote banking services.

Internet and SMS banking are distinguished. The first one allows you to carry out transactions through the client's personal account on the bank's website or through the application, and the second involves informing about transactions via SMS messages.

To use banking without the risk of losing money, the following basic precautions must be followed.

  • Do not enter the Internet bank from other people's computers or from unsecured public networks. If this does happen, after the session is over, click "Exit" and clear the cache.
  • Install an antivirus on your personal computer and keep it up to date. Use modern versions of your browser and email programs.
  • Do not download files obtained from unverified sources, do not follow unreliable links. Do not open suspicious emails and immediately block the sender.
  • Do not enter any of your personal data unless necessary, in addition to your username and password.
  • Check the address bar. A secure HTTPS connection must be used. And the slightest mismatch with the bank's domain almost certainly means that you are on a phishing site.
  • Come up with a complex password to enter your personal account, and also use one-time passwords requested by banks to confirm actions in your personal account.

Remember! Banks do not send messages about blocking cards, and in a telephone conversation they do not ask for confidential information and codes associated with customer cards.

To save the SIM card to which the card is attached, promptly notify the bank when you receive suspicious messages and in no case call the numbers indicated in them. Inform the bank if you changed your number or lost your SIM card. Set a password on your phone and do not remove the block from the screen if someone else is watching your actions. And if the SIM card is issued to you personally, then prohibit its replacement by power of attorney.

What to do if scammers debited money from the card

Disputes between clients and banks are not uncommon. The first, having learned about the unauthorized debiting of funds from their accounts, ask to return their hard-earned money, and the second often shrug their shoulders: "You yourself told the scammers everything."

In 2011, Federal Law No. 161 “On the National Payment System” came into force, designed to streamline and change for the better the practice of providing payment services. In particular, he established the legal framework for the entire payment system as a whole and adjusted the rules for the implementation of non-cash payments, as well as the emission and use of electronic money.

In 2014, Article 9 of this Law came into force. The norm protects users of bank cards from fraud. The law establishes the presumption of innocence for customers. The bank is obliged to reimburse the amounts transferred from the client's account as a result of an operation not authorized by it, unless it is proven that the client himself violated the procedure for using the electronic means of payment.

From September 26, 2018, banks will be legally able to block customer cards if they suspect that fraudsters are transferring money from them. After blocking, the bank must inform the account owner about this, and he will have to either confirm the operation, or report an attempted theft.

In other words, the law distinguishes between the responsibility of the bank and the client.

  1. Has the bank informed the client about an unauthorized transaction? If not, the responsibility lies entirely with the bank. If reported, go to point number 2.
  2. Has the client informed the bank no later than the next business day after notification from the bank that this operation was performed without his (client's) consent? If not, the responsibility lies with the client. If you have informed, go to point number 3.
  3. Was the bank able to prove that the client violated the procedure for using electronic money? If so, the responsibility lies with the client. If not, the responsibility lies entirely with the bank and it is obliged to reimburse the client for the entire amount of the contested transaction.

A prerequisite for reimbursement of unauthorized funds debited is the notification of the bank about the use of the card without the consent of its holder.

Tell the bank that the card is being used by someone else, you need to no later than one day next to the day the customer discovered the fraud.

Meeting this deadline is very important. Delayed - you can not count on a refund.

In addition, the client must have proof of the notification on hand. We are talking about a second copy of an appeal to the bank with a note of acceptance made by an authorized employee, or a written notification of sending a valuable certified letter with a list of investments to the bank's address.

The appeal to the bank does not cancel or replace the appeal to the law enforcement agencies.

conclusions

So, a short algorithm of actions for illegal debiting of funds from a bank card is as follows:

  1. We do not panic, we call the bank and block the card. Plus, we ask the operator to name the account balance and the last completed transactions.
  2. During the day we run to the bank and write an application. Be sure to endorse your copy of the application with an authorized bank employee.
  3. If the employees of the credit institution in any way obstruct this and refuse to accept the application (the forms have run out, there is a technical break, and so on), we turn to the prosecutor's office.
  4. We write a statement to the police. Especially if you are faced with robbery or robbery.
  5. We are waiting for a refund.

If the bank refuses to refund the funds debited from the card, referring, for example, to a violation of the procedure for using electronic money, you can defend your rights in court.

Today it is impossible to imagine life without bank cards. We use them to pay for purchases in stores, communications and the Internet, utility bills. This is much more convenient than carrying cash in your wallet.

But along with such conveniences, there are also problems associated with fraud. Are there ways to help protect your funds from theft, and what should you do to avoid falling victim to cybercriminals?

Methods for protecting a bank card from fraudsters

It all starts with simple rules and precautions.

ATM machines

There are whole groups of professional criminals who steal money from bank cards - carders. The main ways to steal someone else's data through an ATM:

  • a special reader attached to the card slot;
  • using a fake keyboard that remembers the entered PIN code;
  • installation of a small hidden camera.

In order not to fall for the tricks of fraudsters, use mainly ATMs, which are located at banks. It is desirable that it be in a room where video surveillance is almost always carried out. If the money needs to be withdrawn urgently, and the nearest ATM is in a shopping center, carefully examine it - there should be no backlashes, gaps, suspicious buttons.

Online shopping

Make purchases only from those online stores that use a secure connection.

Otherwise, fraudsters can get hold of confidential information and withdraw money from the account. Modern browsers notify users if the connection is unsecured.

Make purchases only from those online stores that use a secure connection

SMS messages from unknown numbers

SMS and MMS messages can contain viruses that, once on your device, gain access to all information. Do not follow the links contained in them, do not take any actions that are described there. This can be, for example, notifications about blocking a card, which can be unblocked only by sending a PIN-code in a return message. Be sure to call the bank and find out if the card has really been blocked. But do not send the password under any circumstances.

Storing card data

Do not disclose your card details to anyone, never under any circumstances. If they call you and, posing as a bank employee, ask for a card number or password, do not rush to speak. Better play it safe and call the bank yourself. Never store your PIN in your wallet or pocket, never write it down anywhere. You just have to remember it.

Insurance

The purchase of an insurance policy will help to secure the money on the card. The service will cost approximately RUB 1,161. with a maximum amount of compensation of 60 thousand rubles. The most expensive policy costs 5,310 rubles. and covers potential losses of 350 thousand rubles. The policy is valid for 1 year.


Bank card insurance will cost from 1,161 to 5,310 thousand rubles per year

Connecting notifications

Do not skimp on paying for SMS notifications - this will make your life easier. Banks send notifications about any operations carried out with the card: transfer, replenishment, payment. It will cost about 50–70 rubles. per month. In addition, some banks have a push notification system that works over the Internet, provided that you have a mobile bank connected.

RFID protection

Fraudsters can scan other people's cards using a special device in order to later withdraw money from them. You can solve this problem with RFID protection. It is a plate installed in the wallet that blocks signals from the devices of fraudsters and thus prevents the reading of information.

Keeping money on the card is very convenient. But this is associated with certain risks, and if you do not follow the basic safety rules, then you will have to say goodbye to the accumulated funds very quickly. the site shares tips on how to protect your bank card from fraudsters.

How to protect a bank card from fraudsters

According to forensic experts, the volume of fraudulent transactions to write off customers' bank accounts annually exceeds 100 billion rubles - an astronomical figure. Fraudsters act cunningly, taking advantage of the flaws of the modern law enforcement system and its weak technical base - they write off small amounts of 70-100 rubles. Because of such a trifle, not everyone will go to the police, and if the figure is multiplied by a couple of hundred, then an impressive amount is obtained for a fraudster.

Remember privacy

Personal information protection - the basics that will protect and secure your card from fraudsters and reduce the risk of spending your own funds.

Do not give your PIN-code and details to strangers

This is one of the basic rules, which, despite all its obviousness, for some reason is not always observed.

The worst option is to write the PIN code on the card itself or on a piece of paper that is always next to it (for example, in the same case). In this case, the attacker will only have to go to the ATM and withdraw everything on the account if he receives your card at his disposal.

It is not a good idea to give your PIN to the store clerk, waiter, or neighbor boy (if you ask him to withdraw some money). Protecting the combination, which is actually the key to your wallet, should be done with special care.

If it so happened that the PIN code was compromised, then it is urgent to change it. A number of banks allow you to do this even by phone.

If you think that the data printed on plastic - the card's "validity" date, the owner's name and three digits on the other side (CVC-code) - are needed only for "reference" purposes, then you are mistaken. This data allows you to remotely identify the means of payment and make a payment on it.

If an attacker has the card itself or its full data, he will be able to withdraw money, as an option - through an online transfer to an anonymous wallet or by making a purchase in a fake online store.

Be careful when giving information to accept payment for a sale on the Internet. If you are offered to transfer money, transfer only the card number. The rest of the details are not required.

The CVC code must be carefully preserved. For online identification, it acts as a PIN. Never, under any circumstances, post a scan or photo of your card in the public domain.

Do not voice codes from SMS

This is also a classic. Fraudsters use various methods of social engineering to cash out their victim's card by hook or by crook.

For example, they contact the cardholder and announce to him that he has won the lottery. And now they, ostensibly for the enrollment of the prize, need full details. After a while, an SMS with a code is sent to the victim's phone, which the attackers also request. And the owner of the plastic is happy to announce it, not suspecting that he actually helped them make a transfer from his card to another, or even gave them access to his Internet bank.

If such a situation has occurred, and you start receiving SMS from your bank, do not rush to tell it to anyone, but carefully read which operation you are confirming.

Important: some especially "advanced" criminals can use a special technique to intercept SMS from a bank, so it's better not to tell anyone about your card details.

Don't save passwords on your computer

If you actively use remote banking on the Internet, follow a number of simple rules:

  • Do not agree to the browser prompting to save the password or card data. They can be removed from the server.
  • Do not save passwords on computers of unauthorized people (in Internet cafes, at friends, etc.) and even at work.
  • If unauthorized persons have access to passwords, change them immediately.
  • For preventive purposes, it is recommended to change passwords at least once every 2-3 months.

Be careful with contactless payments

One-touch payment is convenient, but not entirely safe. If the card is lost, anyone who finds plastic will be able to pay her in the store. Several hikes - and the balance is exhausted.

There are several ways to protect yourself from this:

  • Disable contactless payment, leaving only PIN-code authorization;
  • Set a limit on the amount of payment - by default it is 1000 rubles, lower it to 500 rubles, and even to 100.

Be sure to set up SMS notification. If you lose your card, you will find out immediately about unauthorized transactions.

If convenience is of paramount importance - use special protective cases for the card - they are inexpensive and protect reliably.


The most widespread theft of funds from bank cards PayPass was in the metro, where a huge crowd of people. Fraudsters buy readers that read information from a payment instrument and discreetly place it next to a bag or clothes; transactions of up to 1,000 rubles are successful. Be carefull!

Don't open suspicious MMS and links

If you have received a message on your smartphone from an unknown sender, especially with an enticing, "teaser" message, do not rush to open it. If you have opened it, do not follow the links, especially the short ones. There is a risk of launching viruses on your smartphone that intercept information and transmit it to their "owners".

Contrary to popular belief, even Apple could be attacked by such a virus.

The danger can come from everywhere: SMS, MMS, instant messengers. Stay alert!

Pay attention to the number and address of the sender

Familiar numbers are just as dangerous. Modern technologies do not stand still, and scammers have learned to "mimic" - more precisely, to fake messages and send them on behalf of official representatives.

For example, they can create the same email address as the Federal Tax Service, but with a change in one character in the name or with a different domain zone. The letter will contain a link leading to an infected resource, or a virus file will simply be attached.

Attackers can try to scare the client in order to extract the card details from him. For example, they will send him a message that a huge fine has been imposed on him or that he is being summoned to court. Or, on the contrary, they will report a "win" in the lottery.

Some scammers manage to acquire toll free numbers starting with 8-800 and start calling victims, posing as bank employees. It is very simple to check whether they call you on the hotline: just go to the official website of the bank and compare the numbers. If you receive a call from another, disconnect immediately.

Other criminals fake operator numbers. For example, instead of the number 900, a message may come from the number 9OO, in which instead of zeros there is an English O. Or instead of a small English l (e-mail), a capital I (ah) may be written in the name of Alfabank - in some fonts these letters are indistinguishable.

If the content of the email seems strange or suspicious, then the best thing to do is to simply ignore it.


Use proven ATMs

I will not describe in detail how fraudsters counterfeit cards by reading data from a magnetic tape using skimmers and other technical devices, as well as how they obtain PIN codes when using keyboard overlays. Let's just note: there is such an opportunity, but such devices on the "black market" are easy to get. Having received the data, the fraudster will be able to withdraw from the money without having the card itself.

Such devices are installed on ATMs located in crowded and poorly lit places - in underground passages, on streets, in the basements of large shopping centers, etc. The older the ATM model, the easier it is to install skimmers on it.

Therefore, in order to protect your money, it is best to withdraw money, pay for services or replenish your card account in terminals that are in the bank itself under the sight of many video cameras. Or in large shopping centers, where security guards look after the ATMs.


How to secure a bank card on the Internet

The lion's share of fraudulent transactions occurs on the worldwide web. The Internet still remains fertile ground for those who want to cash in, abuse the trust of ordinary users.

Use antivirus

Advice follows from the previous one. If you read mail from a computer, be sure to enable the e-mail check module in your antivirus settings. If from a smartphone, then purchase a special anti-virus program for mobile devices. The license is not expensive, but there are a lot of benefits from it.

The antivirus will not only prevent the download of questionable files, but will also protect you from openly fake emails.

Set up two-factor authentication

If possible, do additional identification by voice, face (photo) or fingerprint. Even if your smartphone gets to a stranger, and he somehow gains access to the bank's mobile application (for example, it uses hacking programs), then it will not be able to forge biometric data.


Log out of your Internet bank account

After the end of your online banking session, do not forget to click the Exit button. Especially if it's someone else's computer. Often there are cases of theft of funds, when the cardholder logged in to his personal account, but did not leave. And the one who sat down after him just sent himself his money.

Just closing the tab isn't enough either. If you return to the page, for example, through the History tab, the session will be restored back.

Some banks, for example, Tinkoff and Sberbank, automatically "log out" the client after 10 minutes of inactivity, even if he has not closed the tab - this helps to protect the account from unauthorized access. However, you should not rely on this. It is better to log out of the online account yourself.

Use virtual cards to pay

If possible, do not use your main bank card when paying for goods and services online. 3D-Secure technology reliably protects against data leakage, but you should definitely be insured.

To protect yourself, use backup options for online payments - for example, an un-embossed or spare card, and keep a minimum of money on it. Or even use a virtual stunt double. In this case, it will be easier to save funds.

Check back and call back

Be careful! At the slightest suspicion that you are being deceived, call the bank. Remember that real bank employees will not squeeze out any confidential data from you, but on the contrary, they will even start stopping you if you start dictating card details or reporting the value of the PIN code.

The maximum that they can ask you is passport data and a code word, as well as information that only you can know (for additional identification), for example, the available credit limit on the card.

Do not hesitate to cut off the caller and ask him for the name, surname and position. It may turn out that among the bank's employees there will be an unscrupulous employee.

Take an example from Sberbank - share information

The largest bank on the official page constantly updates information about new methods of fraud and promptly notifies its clients on how to secure their account. Follow his example - be sure to let your friends, parents and grandmother read this article. No one is immune from fraud, and in the age of high technologies, the tools of attackers are becoming more sophisticated. Keep track of your financial security and do not give fraudsters access to your money, simple actions will allow you to protect your bank card from fraudsters.

It is possible to protect your bank card from remote reading in several ways, which is important for regular users of plastic, which allows you to pay in most stores, as well as numerous other retail outlets without the need to enter a PIN code. A protective cover for a bank card from being swiped will become the safest, cheapest and most convenient way to avoid such problems!

Plastic bank cards are commonplace for ordinary people today. But now they are still more often issued together with a special technology that allows you to pay at all points of sale without inserting your card into a regular terminal. This plastic gets its new name - NFC - card. This novelty has appeared relatively recently. Its main feature of the card is the following fact - it is quite possible to pay with such a card for small purchases without the need to enter a PIN code. The very same sequence of all the actions carried out looks like this:

  • a person makes his purchase in the usual way;
  • evenly brings the card to a special electronic reader with its back side no closer than 5 centimeters;
  • then enters the PIN code if the purchase amount exceeds 1,000 rubles;
  • will receive a tangible sound confirmation of the completion and completion of the financial transaction.

This plastic is quite convenient. Plus, it's pretty easy to be able to get it in Russia. Cards of this type are actively issued by respectable payment systems VISA and Master Card, they are also stably produced in a number of domestic commercial and financial institutions, but a practical protective cover for a bank card will not be superfluous to protect your property!

The usual methods of fraud for modern contactless cards are completely irrelevant, because outsiders, as well as sellers, do not interact with plastics at all. The absence of such a serious need as to insert it into a conventional card collector will also exclude the possibility of copying data using any special devices that are installed in the terminals.

Contactless cards are now a fairly safe type of plastic. Now there is an unpleasant opportunity to become a classic victim of fraudsters, because the development of technology allows completely unscrupulous citizens to implement a special scanner, with the help of which it is possible to write off money from any contactless card by persons who are within a radius of 0.6-0.8 meters and for conducting financial transactions to a fraudster you will not need your card number or PIN - code.

On Yandex Market

The essence of the combination lies in the ability to read special signals that are produced by the card. A weak and unreliable consolation for cardholders is that the implementation of such actions will not allow fraudsters to withdraw large amounts of money, because without entering a PIN-code, it is possible to conduct transactions up to 1,000 rubles.

But the loss of even small money will be quite unpleasant for every person. Law-abiding citizens are often interested in what are the effective ways to protect cards from theft of funds. Here are the main methods to secure a plastic card:

  • non-counterfeit microchip;
  • regular automatic change of the bank number of the transaction being carried out for the implementation of payment - reducing the likelihood of your personal data being read by fraudsters;
  • the presence of a limit on transactions without using a PIN - code;
  • A shielding cover for bank cards is the most reliable way to protect a plastic card from reading all information due to a special coating that will prevent fraudsters from downloading information from your microchip through a scanner.

How does the shielding cover protect?

A shielding cover is a good option for preventing theft. Thanks to its special design, the plastic card will be perfectly protected from unauthorized access. It is an ordinary plastic case, but at its core it has the necessary metal layer, which allows it to skillfully absorb radio waves and block the possibility of radio communication between the card and the reader. Such a cover also perfectly helps and will keep your card intact and protect it from the possibility of mechanical damage or moisture on its surface.

RFID protected wallet

If you are uncomfortable wearing a plastic case, then you can instead purchase an rfid-protected leather wallet with the technology of placing various personal information on special built-in chips, which can be transferred to the appropriate scanner. Chips can be sewn into bank cards, passports, or other documents. The technology can be used by fraudsters, who can easily read the necessary data with a scanner at a distance or gain unauthorized access to your card.

To prevent any potential fraudsters from stealing your funds or using your personal information, the company offers to buy a wallet with an innovative STOP RFID function from popular collections. In the implementation of the manufacture of such purses, special radio-absorbing materials will be used, which most reliably block all the scanner signals when your wallet is closed.

A wallet with protection, these are the options:

  • Blocking from the possibility of any extraneous devices while your card is in the wallet.
  • The most reliable protection against demagnetization, even if you are near a source that emits strong magnetic or radio radiation.
  • Absolute protection of your phone from constant tracking - just by putting your mobile phone in a wallet with an active one, you can easily interrupt the signal - this useful function will perfectly prove itself during important confidential conversations or from unauthorized surveillance.

Buying a protective cover for a bank card will be a prerequisite for increasing the reliability of protection, because in the conditions of a dynamic city life, the consequences can be the most unexpected and unpleasant, and you will not even have an idea of ​​where and when the sum of money was withdrawn from you!

Foil card protection

It is not always affordable to buy a shielding cover for a bank card, because it is not always possible to find it on sale. It's great to replace a card-proof wallet with foil - just wrap your plastic card or think of a small case. Foil can adequately guarantee you the absence of unauthorized access!

Where can you buy a protective cover for a bank card

The best way to buy a protective rfid cover for credit cards is in specialized stores and be sure to check them to avoid defects or other inconsistencies. Be sure to consult with specialists who can consistently resolve all existing doubts! Despite the high cost, the offered covers will ensure your peace of mind and the absence of the need to contact the law enforcement agencies!

Protective RFID Case for Credit Cards on Yandex Market

Do you use contactless payments, RFID-tagged documents, or use your smartphone as a key? All data is at risk - but we will teach you how to avoid hacking.

Contactless technologies: convenient, fast, dangerous


Today everyone has plastic cards and documents with microchips based on near-field communication (NFC) or radio-frequency tags (RFID). Many credit and debit cards, driver's licenses, ID cards, passports, metro passes and more are equipped with them.

The contactless form of identification is really handy - especially if it's Apple Pay or a similar payment system. You don't even need to apply it to the terminal: brought it up to a sufficient distance for communication, confirmed the payment with a fingerprint, the payment went through.

Despite their convenience, both technologies contain many security holes that allow attackers to obtain sensitive data. In order to steal card data, passwords from a smartphone or copy a pass, you do not need to come close.

Why RFID is dangerous


RFID chips allow data to be read from a distance of up to several meters. All you need to link to the tag in the documents is to buy a ready-made device on eBay.

Short-range readers cost about $ 50, long-range ones - about a hundred. I will not give you links, and delivery to Russia may cause a problem with the special services. But the price allows even a student to experiment.

After reading, the attacker is left with a complete electronic copy of all information of the RFID tag. With its help, you can make a fake copy, or use other methods, depending on the type of the stolen document.

Terminals will treat the copy as the original. It is almost impossible to prove the opposite.

Why NFC is dangerous


NFC is actually a variation of RFID, although it has a shorter range - only a few centimeters. But this is only for factory, licensed devices.

Researchers from the British University of Surrey were able to read NFC data at a distance of up to 80 cm. Spanish hackers taught Android smartphones to turn into an NFC signal repeater spreading their own important data.

This approach allows you to make a payment directly through the owner's smartphone. But there are other ways as well.

For example, by connecting via NFC with another smartphone or commercially available reader using the app Banking card reader NFC(Android) you can get all the necessary data of the maps used in operations in the browser. Then it is enough to find a store that allows you to pay without entering the CSV code (and there are still such ones).

How to protect your money and data? Homemade options


In order to completely eliminate unwanted contacts with readers, the software may not be enough (more on this later).

Therefore, it is worth turning to the old-fashioned methods, and completely cutting off the path of radiation to your money cards. Two materials are ideal for this - water and metal.


Of course, it is difficult to carry cards in a bag with water. But a piece of regular food foil from a roll (suitable from a chocolate bar - but not from a pack of cigarettes) completely blocks RFID and NFC signals.

This is the most efficient and convenient way. It is enough to wrap the card in foil and remove it only at the moment of payment.

Afraid of being considered paranoid? Then ready-made solutions will come in handy.

How do responsible employees protect these data?


Many Western companies (I have no information about Russian ones) require employees to use special wallets and covers for documents with the corresponding “Protected from RFID” logo.

Identity Stronghold offers the largest selection of RFID blocking accessories. Some of their range is custom-made for the US government for government officials.


You can also find a cheaper option - on AliExpress there are a lot of different cases for cards, wallets with metal inserts. For example, such, or such. You can just search for the tag “NFC protected”.

How to prevent data theft


However, it is worth remembering that a metal wallet or card holder does not exclude the possibility of theft of card data.

1. Do not turn on NFC unnecessarily, do not keep it always on.

2. The same applies to other wireless interfaces - Bluetooth and Wi-Fi.

3. Check the activity of background processes, with frequent access to network interfaces of unsuitable applications - check your smartphone with an antivirus.

4. Do not install applications from unverified sources.