Attacker then emulates the card and makes withdrawals or payments from victim’s account.

  • 𝕸𝖔𝖘𝖘@infosec.pub
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Seems like an easy workaround is to not use your phone as a payment method. Or am I misunderstanding the ars article (which, I must say, is very low quality in comparison to their usual ones)?