Skip to main content
  • White Paper

Card and Mobile Payment Threat Models

Explore threat models facing mobile wallets, including a review of card payments, mobile architectures, fraud statistics and mitigation techniques.

person using a mobile phone for payment

Mobile or digital wallets have recently overtaken credit cards as the most used payment method, raising the question of whether the existing threat models are accurate and applicable.

In this whitepaper you will learn the ways in which card-based payments work, and the differences between traditional payment cards and the mobile payment systems which are common today. From there, we will cover common architectures, threat models, and fraud and mitigating techniques relating to mobile payments.

Please complete the short form below to access the white paper.

Please wait…

Get in touch

Have questions, need specifics? Let's get this conversation started.

Help and support

How can we help?