advertisement
advertisement

This is page 2 of:

Stolen POS Tablets? Apple Can Track Them

August 22nd, 2012

Ironically, wiping the device—something any thief would be likely to do with a stolen iPad before trying to sell it—forces the device to reconnect to Apple to reinstall iOS. That gives Apple the serial number of the stolen device and IP address it’s connected to. Even if it’s not wiped, a stolen iPad’s serial number is logged when it connects to Apple or iTunes for any other reason.

And it’s almost impossible to use an iPad without connecting to Apple or iTunes fairly regularly.

This turns that loss-prevention problem on its head. Very few pieces of equipment in a store are as easy to steal as an iPad. But there isn’t any other store equipment that, by design, reports what it is, where it is and what it’s doing.

That means if an in-store iPad is stolen, the biggest problem may be getting local police to call Apple. (In the Jobs case, local police investigated the burglary for a few days before calling in REACT the following Monday. REACT promptly called Apple.)

Unfortunately, Apple’s tracking ability only makes it easier to find a device that’s been stolen by a thief who just wants the hardware to resell. A thief who is interested in stealing any information on the iPad—whether that means card numbers (bad developers! no PCI for you!) or passwords and other information that could be used to connect to a store’s POS system—would probably know enough to first isolate the device from Wi-Fi or mobile signals, both to keep it from calling home and to prevent it from receiving a signal to wipe itself.

That’s where the real LP problem is now with in-store mobile devices.

One workaround: Write your POS app so that it’s always connected to the store’s system. If it can’t find the store’s Wi-Fi signal—and doesn’t get the correct response if it finds a Wi-Fi signal with the same name as the store’s signal—the app could tell the device to wipe itself. That should delete any at-risk information and also make the hardware useless until it connects to Apple to reload iOS, which in turn gives Apple the ability to track it.

Let’s be clear: This workaround is only for iPads that are being used as in-store mobile POS and not for iPads being used by executives, or even those issued to store managers for, say, personnel evaluations and to update CRM files. Those POS tablets should never have any personal or corporate files on them. (Would you ever condone someone putting a salary spreadsheet into an NCR POS, if such a thing was possible?)

And as long as the device is just loaded with the essential POS-related apps (which are stored on a server and can be easily reinstalled, the way you’d ghost any corporate-issued laptop), then having it wiped is not a huge problem.

The downside is that any time a tablet leaves the range of a store’s Wi-Fi signal—whether because it’s been stolen, walked out by an unthinking associate or put inside a metal desk—the tablet will self-wipe and have to be reloaded with all the necessary software, including the POS app. And any power failure that takes out the Wi-Fi access points would be very disruptive to in-store mobile POS.

Then again, so would a hacker gaining wireless access to the POS system. As LP problems go, it could be worse.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.