Detecting NFC Relay and Ghost Tap Attacks Using Metadata and Real-Time Rules
Finextra
AUGUST 6, 2025
Often the attackers begin by stealing the card details and any required OTP (one-time password) to enroll the card into a mobile wallet. If a transaction originates from an unfamiliar device or a device not previously seen for that card or user, it’s a red flag. a device account number or wallet ID).
Let's personalize your content