BACK

Videos

Video: Do you need a credit card RFID protector sleeve?

Summary

Thieves can theoretically capture data from your tap-to-pay card. The chance is small, but here’s what you can do about it.

The editorial content below is based solely on the objective assessment of our writers and is not driven by advertising dollars. However, we may receive compensation when you click on links to products from our partners. Learn more about our advertising policy.

The content on this page is accurate as of the posting date; however, some of the offers mentioned may have expired. Please see the bank’s website for the most current version of card offers; and please review our list of best credit cards, or use our CardMatch™ tool to find cards matched to your needs.

If you’re able keep your credit card in your wallet while paying, it probably contains a contactless payment antenna. The technology is called RFID, or radio frequency identification.

Security expert Craig Coats is in the business of testing the hackability of RFID cards to understand just how vulnerable the cards we use are to theft.

His office at Assero Security has all the equipment needed to skim credit card information and make counterfeit cards.

RFID cards never need to leave your wallet to be used. You just wave them over a reader to pay. But, just because they’re safely tucked away doesn’t mean their information can’t be stolen and copied onto new cards.

“This is an RFID card that we purchased over the Internet,” Coates explains, holding up a blank white card. “These are available for pennies online in bulk, and combined with a low-cost RFID reader-writer, that’s all one needs.”

Using one of these readers hidden in a backpack or briefcase, a thief can in theory skim the information from your RFID credit card just by standing close to you for a couple of seconds.

They can then pull up that information on their computer and encode it onto a new card.

“The finished product is a nice embossed card with raised numbers,” says Coats. “Looks official, feels official, and is ready to go.”

Though it may seem simple, this kind of theft comes with some obstacles.

First, the criminal needs to get within inches of the victim in order to read the card.

Second, most RFID credit cards use a different security code for each purchase, meaning the counterfeit card can only be used once. So is this a crime we really need to worry about?

“There are plenty of hackers out in the world doing this, but the odds that you or I will cross paths with them sometime in our lives is pretty long,” he says.

Still, Coats suggests protecting yourself just in case.

An RFID blocking wallet or sleeve contains a wire or foil mesh that blocks radio signals. Some cost less than $10.

“A little bit of money can buy a lot of peace of mind,” Coats says.

If you favor security over style, one of the best protections is good, old-fashioned aluminum foil. It might not be pretty but it keeps your information safe.

See related:Card shields protect against low risk of RFID theft, Fraud risk minimal on canceled RFID chip card, 6 credit-based conspiracy theories

What’s up next?

In Videos

Video: 4 ways students can build credit

Building a credit history while in college helps make life afterward a bit easier. Here are four tips to building credit as a student

Published: September 11, 2015

See more stories
Credit Card Rate Report Updated: June 19th, 2019
Business
15.61%
Airline
17.54%
Cash Back
17.68%
Reward
17.57%
Student
17.79%

Questions or comments?

Contact us

Editorial corrections policies

Learn more

Join the Discussion

We encourage an active and insightful conversation among our users. Please help us keep our community civil and respectful. For your safety, do not disclose confidential or personal information such as bank account numbers or social security numbers. Anything you post may be disclosed, published, transmitted or reused.

The editorial content on CreditCards.com is not sponsored by any bank or credit card issuer. The journalists in the editorial department are separate from the company’s business operations. The comments posted below are not provided, reviewed or approved by any company mentioned in our editorial content. Additionally, any companies mentioned in the content do not assume responsibility to ensure that all posts and/or questions are answered.