October 31, 2014 By Shane Schick 2 min read

Early users of a mobile payment app called CurrentC may discover their contact information and other information has already been lost to third parties, casting doubt on whether retailers can provide a secure alternative to Apple Pay.

Supported by the Merchants Customer Exchange (MCX), CurrentC was championed by Wal-Mart and other major retailers as a way to bypass the need to use credit cards and let consumers pay with their smartphones. However, Business Insider confirmed that some participants in the beta program have already been informed that their email addresses have been affected by a data breach, though the exact number of those affected was not reported.

As a detailed profile of CurrentC on Re/code noted, the app isn’t expected to be widely available until sometime next year, and it’s uncertain at this point whether the early loss of user data may push things even further. MCX consortium members hope the app proves more popular than Apple Pay because it would mean they wouldn’t incur the same credit card fees.

Though the CurrentC app itself was not hacked, the loss of email addresses may prompt people who are reluctant to adopt Apple Pay to consider other alternatives such as Google Wallet.

A comparative analysis of the two mobile payment systems on Tech Times pointed out that although Google Wallet uses a certain level of token-based security not unlike Apple Pay, it stores it in the cloud, which may make some consumers nervous after the recent high-profile incidents of cloud-based system hacking involving A-list celebrities.

Meanwhile, an editorial on Bloomberg View argued that Apple Pay, CurrentC and any other mobile payment apps could learn from PayPal, which thrived in the early days of e-commerce by helping retailers reduce fraud. That reputation for security may help PayPal in its quest to stay competitive with Apple Pay.

Then there’s Square, the firm co-founded by Twitter’s Jack Dorsey, which has recently opened up a marketplace for developers to create apps that integrate with its own service, according to The Next Web. If security becomes a differentiator for some of those apps, it may help Square look more compelling than Apple Pay, Google Wallet or CurrentC.

Ultimately, any data breach is bad news for all mobile payment providers, experts told Bank Systems & Technology. What it may mean is that consumers become so nervous about hackers that they avoid any new services altogether. The ultimate rival to Apple Pay and the rest could be an old-fashioned wallet full of credit cards.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today