How much will the security flaws in Google Wallet set back the transition to "digital wallets"?

AppDevGuy

The security flaw in Google Wallet apparently would allow pretty much anyone with access to your phone, once they got through the screen lock (if it is even used), to gain access to the contents of your prepaid Google card. I'm not sure how many people are using Google Wallet at this point, but this story has made the news on lots of tech sites and mainstream media outlets today. There is always a challenge to get a new method of payment or money management accepted. My grandparents still look at ATM cards with suspicion, and they've been around for what, 20 years. Will news of a security flaw set back attempts to move away from wallets and paper money to smartphone based transactions utilizing NFC (Near Field Communication)?

Topic: Security
Answer this Question

Answers

3 total
Vote Up (16)

Google wallet have become famous and users use it a lot these ,this is bad that many users are affected from it.

riffin
Vote Up (12)

Well, here is the thing.  The security flaw, at least as I understand it, allowed access to the funds in the Google Prepaid card IF, (and this is a big if) the owner lost the device AND (this is a big and) the owner didn't lock the screen.  In other words, just like you lost your wallet with cash and credit cards in it, and a miscreant pick it up and take advantage of it.  Sure that isn't ideal, but I'm not freaking out at my wallet manufacturer any more than I'm freaking out at Google over this.  I just don't consider it a major issue.  It requires two missteps from the owner to even expose the flaw to exploitation.  

 

I won't be surprised if this does slow down the move towards smartphone-as-a-wallet, even though I personally don't consider it a huge flaw.  Any increased focus on security is probably a positive development during this transitional period.  I hope that news of this flaw doesn't frighten off too many merchants and users from the digital wallet concept.  

jimlynch
Vote Up (11)

I think it might make people more cautious, and less inclined to try it. I don't use such things and, frankly, I have no interest in them. Each time a situation like this happens, the media will blare scary headlines and people will think that these sorts of services are dangerous and unsafe.

Eventually though, as time goes by and things get better and more polished, people will probably start using them. That's going to be a while though and, in the meantime, a lot of people will simply remain spectators and watch to see how these things are developed.

Somebody will come out with one that will be a winner though, it's just a matter of time.

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness