SlideShare a Scribd company logo
1 of 18
Download to read offline
SECURING YOUR
DIGITAL WALLET
by Lookout, Inc

YOUR SMARTPHONE IS WAY
MORE THAN JUST A PHONE.

Between texting, games, social media
and utility apps, your phone can
handle just about everything.
$
BUT DID YOU KNOW YOUR PHONE
CAN DOUBLE AS YOUR WALLET?

With mobile payment apps getting more and
more popular, you may never need to think
about an ATM ever again.
?
WAIT A MINUTE,
HOW DOES THAT WORK?

Once you connect an app to a credit card or bank
account, you can electronically pay retailers,
restaurants and even friends in just a few swipes.

GREAT!
SO WHAT DO I NEED TO KNOW?

Your money and personal information is valuable,
so it’s important that you know exactly how digital
wallet apps are accessing your information.

FIRST
PICK AN APP

There are dozens of apps out there designed to
make paying easy, so how do you choose which
digital wallet app is right for you?
Ask yourself...

WHAT ARE YOUR

WHAT DO THE

WHERE WILL YOU

FRIENDS USING?

REVIEWS SAY?

BE USING IT?

If you plan to use an
app to pay friends,
it’s easiest if you’re all
using the same thing.

You can find out a lot
about how easy the
app is to use and any
problems other users
have encountered.

If you want to pay for
goods in stores, check
to see which forms of
payment retailers near
you are accepting.

CHECK OUT OUR FAVORITES
Google is a household name, so it’s no surprise that it’s digital wallet app
would be among the most popular. You can get funds from debit cards, credit
cards, loyalty cards and gift cards, as well as redeem sales promotions by
tapping your phone on any PayPass-enabled terminal at checkout.
With thousands of retailers already using Square as a cash register, there’s a
good chance you’ve already made your first Square purchase. With Square
Wallet, you just have to say your name at checkout to pay for goods and
services. Or you can download Square Cash to pay friends and family.
Since the early days of eBay, PayPal has pioneered the idea that you don’t
have to provide your financial information directly to retailers, which is
especially useful on websites that are less-than-trustworthy. Now you can take
the same idea into the real world by using this app in lieu of credit cards.
If you often find yourself in the situation where you owe a friend a
few bucks for dinner or a cab but rarely carry the cash to settle your
debts, Venmo is the app for you. It ropes in your Facebook friends, so
finding the right people to pay (or charge) couldn’t be easier.
Coin is a little different in that you still have to carry around a physical payment tool
— but one credit card-sized device that stores your information in one place beats a
pocket full of plastic. Cycle through the cards you’ve stored on it until it shows the
one you want, then swipe Coin like a regular card. So where does your phone come
in? If Coin loses contact with your phone for a few minutes, it deactivates itself.

Learn more

SECOND
READ THE PERMISSIONS

Yeah, yeah we know that app permissions are long and can be tricky
to read, but the consequences of not knowing how digital wallet
apps are using or distributing your information can be serious.
USE YOUR INSTINCTS
If you’re unsure about why you’re providing an app with
certain information, don’t give it permission to access it. This is
especially true when sensitive financial data is at play.

THIRD
ENTER YOUR INFORMATION

Once you’re confident in the app and you’re sure that your
phone’s connection is secure, provide the app with the
personal information it needs to get the job done.

FINALLY
STAY PROTECTED

The best digital wallet apps do their best to keep your personal
and financial information under wraps, but it is ultimately your
responsibility to protect yourself from theft or fraud.
TIPS TO STAY SAFE
1. Get in the habit of changing your app password regularly
2. Set a passcode on your phone so it would be difficult for
anyone besides you to use your digital wallet apps
3. Monitor your bank statements to make sure that no
unexpected charges appear on your bill
For more mobile security tips, follow

More Related Content

More from Lookout

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the OlympicsLookout
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady AppsLookout
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise ProductsLookout
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for GoodLookout
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?Lookout
 
Dragon lady
Dragon ladyDragon lady
Dragon ladyLookout
 

More from Lookout (20)

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 
5 Types of Shady Apps
5 Types of Shady Apps5 Types of Shady Apps
5 Types of Shady Apps
 
10 Beautiful Enterprise Products
10 Beautiful Enterprise Products10 Beautiful Enterprise Products
10 Beautiful Enterprise Products
 
Hacking the Internet of Things for Good
Hacking the Internet of Things for GoodHacking the Internet of Things for Good
Hacking the Internet of Things for Good
 
What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Dragon lady
Dragon ladyDragon lady
Dragon lady
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Securing Your Digital Wallet

  • 2.  YOUR SMARTPHONE IS WAY MORE THAN JUST A PHONE. Between texting, games, social media and utility apps, your phone can handle just about everything.
  • 3. $ BUT DID YOU KNOW YOUR PHONE CAN DOUBLE AS YOUR WALLET? With mobile payment apps getting more and more popular, you may never need to think about an ATM ever again.
  • 4. ? WAIT A MINUTE, HOW DOES THAT WORK? Once you connect an app to a credit card or bank account, you can electronically pay retailers, restaurants and even friends in just a few swipes.
  • 5.  GREAT! SO WHAT DO I NEED TO KNOW? Your money and personal information is valuable, so it’s important that you know exactly how digital wallet apps are accessing your information.
  • 6.  FIRST PICK AN APP There are dozens of apps out there designed to make paying easy, so how do you choose which digital wallet app is right for you?
  • 7. Ask yourself... WHAT ARE YOUR WHAT DO THE WHERE WILL YOU FRIENDS USING? REVIEWS SAY? BE USING IT? If you plan to use an app to pay friends, it’s easiest if you’re all using the same thing. You can find out a lot about how easy the app is to use and any problems other users have encountered. If you want to pay for goods in stores, check to see which forms of payment retailers near you are accepting. CHECK OUT OUR FAVORITES
  • 8. Google is a household name, so it’s no surprise that it’s digital wallet app would be among the most popular. You can get funds from debit cards, credit cards, loyalty cards and gift cards, as well as redeem sales promotions by tapping your phone on any PayPass-enabled terminal at checkout.
  • 9. With thousands of retailers already using Square as a cash register, there’s a good chance you’ve already made your first Square purchase. With Square Wallet, you just have to say your name at checkout to pay for goods and services. Or you can download Square Cash to pay friends and family.
  • 10. Since the early days of eBay, PayPal has pioneered the idea that you don’t have to provide your financial information directly to retailers, which is especially useful on websites that are less-than-trustworthy. Now you can take the same idea into the real world by using this app in lieu of credit cards.
  • 11. If you often find yourself in the situation where you owe a friend a few bucks for dinner or a cab but rarely carry the cash to settle your debts, Venmo is the app for you. It ropes in your Facebook friends, so finding the right people to pay (or charge) couldn’t be easier.
  • 12. Coin is a little different in that you still have to carry around a physical payment tool — but one credit card-sized device that stores your information in one place beats a pocket full of plastic. Cycle through the cards you’ve stored on it until it shows the one you want, then swipe Coin like a regular card. So where does your phone come in? If Coin loses contact with your phone for a few minutes, it deactivates itself. Learn more
  • 13.  SECOND READ THE PERMISSIONS Yeah, yeah we know that app permissions are long and can be tricky to read, but the consequences of not knowing how digital wallet apps are using or distributing your information can be serious.
  • 14. USE YOUR INSTINCTS If you’re unsure about why you’re providing an app with certain information, don’t give it permission to access it. This is especially true when sensitive financial data is at play.
  • 15.  THIRD ENTER YOUR INFORMATION Once you’re confident in the app and you’re sure that your phone’s connection is secure, provide the app with the personal information it needs to get the job done.
  • 16.  FINALLY STAY PROTECTED The best digital wallet apps do their best to keep your personal and financial information under wraps, but it is ultimately your responsibility to protect yourself from theft or fraud.
  • 17. TIPS TO STAY SAFE 1. Get in the habit of changing your app password regularly 2. Set a passcode on your phone so it would be difficult for anyone besides you to use your digital wallet apps 3. Monitor your bank statements to make sure that no unexpected charges appear on your bill
  • 18. For more mobile security tips, follow