Skip to main content
  • White Paper

Card and Mobile Payment Threat Models

Explore threat models facing mobile wallets, including a review of card payments, mobile architectures, fraud statistics and mitigation techniques.

Person using a mobile phone for payment

Mobile or digital wallets have recently overtaken credit cards as the most used payment method, raising the question of whether the existing threat models are accurate and applicable.

In this white paper you will learn the ways in which card-based payments work, and the differences between traditional payment cards and the mobile payment systems which are common today. From there, we will cover common architectures, threat models, and fraud and mitigating techniques relating to mobile payments.

Card and Mobile Payment Threat Models

Related resources


Mobile Payment Security

Cybersecurity

Payment Security

Please complete the short form below to access the white paper.

Please wait…