PCI Mobile Payment Application Security Standard

The PCI Security Standards Council has released an official statement on mobile payment applications — look for something from them next year. Nothing will be approved before then, but on the other hand they did not say mobile payment applications are prohibited.

The PCI SSC is committed to an ongoing evaluation of emerging payment technologies. The impact of mobile payment technology on the security of cardholder data will be a key focus for the Council in 2011.

Until such time that it has completed a comprehensive examination of the mobile communications device and mobile payment application landscape, the Council will not approve or list mobile payment applications used by merchants to accept and process payment for goods and services as validated PADSS applications unless all requirements can be satisfied as stated.

The payment cards themselves are running pilot programs with mobile payments, as I’ve mentioned before, so expect more updates in the near future.

The Compliance of Bagels

A New York Times review of Bagel articles brings to light a rich history of compliance.

The definition of a bagel is an obvious start.

A bagel is a round bread, with a hole in the middle, made of simple ingredients: high-gluten flour, salt, water, yeast and malt. Its dough is boiled, then baked, and the result should be a rich caramel color; it should not be pale and blond. A bagel should weigh four ounces or less and should make a slight cracking sound when you bite into it. A bagel should be eaten warm and, ideally, should be no more than four or five hours old when consumed. All else is not a bagel.

I dare you to find a specimen that meets even a few of these seven rules of bagel-ness. A true bagel is few and far between. I further dare you to put on a QBA (Qualified Bagel Assessor) hat and ask a bakery….

But wait, there is more. The first reference to a bagel, by Jews living in Poland, also came from compliance.

It is found…in regulations issued in Yiddish in 1610 by the Jewish Council of Krakow outlining how much Jewish households were permitted to spend in celebrating the circumcision of a baby boy — “to avoid making gentile neighbors envious, and also to make sure poorer Jews weren’t living above their means.”

Thou shalt not covet thy neighbor’s bagels.

And last, but not least, fast forward to the American bagel. It was tightly regulated by a union of New York bakers.

The rise of the bagel in New York is inextricably tied to that of a trade union, specifically Bagel Bakers Local 338, a federation of nearly 300 bagel craftsmen formed in Manhattan in the early 1900s.

Local 338 was by all accounts a tough and unswerving union, set up according to strict rules that limited new membership to the sons of current members.

Something tells me that a rule of hereditary bagel-making is not related to the quality of the bagel. Even if it was, it obviously did not work; today’s bagels do not comply with that or any of the above regulations.

Fun at BayThreat!

I will be giving presentation on cloud log management at BayThreat this weekend. Anton has posted a nice summary page on his blog where he also modestly claims his presentation will be “hilarious”.

What:

There’s a new information security conference in the South Bay at The Hacker Dojo, December 10th & 11th. Perfect for those of us with exhausted travel budgets. We’re an active community with tons of the smartest folks in the biz. It just makes sense that we would get a regional con of our own!

The theme for BayThreat is as simple as black & white: “Building & Breaking Security.” Two tracks, each tackling opposite sides of the security fence. As Security Professionals, it is up to us to take that dichotomy and mold it into the shades of gray we use to protect our environment.

Shades of the Gray Area

We’ve invited speakers from all over the Bay Area and beyond to a two day conference at the Hacker Dojo in Mountain View, CA. The Dojo is a familiar place for the security community, as it hosts the #DC650 meetings every month.

We’re excited to host speakers with security expertise from both sides of the fence. Early-acceptance speakers include Anton Chuvakin, Neel Mehta, Ryan Smith, Gal Shpantzer, Jim McLeod, Allen Gittelson, and Dan Kaminsky. The Call For Abstracts is now closed.

When: December 10-11, 2010

Where: Hacker Dojo, 140A South Whisman Rd, Mountain View, CA 94041 (map)

How much: nominal fee of (!) $45

Schedule: TBA here

NFC embedded in Google’s Nexus S

Google is the first, it seems, to embed a chip for NFC in a cell phone for the American market. The Official Google Blog says NFC comes with the Nexus S.

It also features…NFC (near field communication) hardware that lets you read information from NFC tags. NFC is a fast, versatile short-range wireless technology that can be embedded in all kinds of everyday objects like movie posters, stickers and t-shirts.

Actually, it will also come in handy as a payment system to replace or improve on payment cards, as I have mentioned before.