Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
https://www.finextra.com/fullstory.asp?id=18325 Banks should offer solutions that consumers would readily take up because the solution solves the problem and because they feel secure and confident abo...
Well, I'm glad APACS pointed out that the rise in 'take-up' is because of making it mandatory for cardholders. Not all merchants use these solutions, so the security coverage for cardholders is quite ...
The numbers behind Google's processing are staggering. Indexing over one trillion URLs, the Internet search giant reported in January that it processes 20 Petabytes of data per day. My Word spellcheck...
A piece on The Register discusses how two well-known security researchers have scrapped a talk discussing some interesting new critical holes impacting anyone using a web browser. They cancelled fol...
Mobile phones support secure (encrypted) data transfer on the internet (the same as is used on computers). So the level of security for the internet traffic is at the very least equal to computers. F...
The iphone was an innovation. It was really different in feel and function to previous handsets. The Android doesn't appear to be such a great leap forward. Google's new Android phone has met with mix...
If you use a 'smart phone' well then it really isn't very secure at all. Probably less so than using the average PC to connect to the internet. Apart from the numerous features available to hackers to...
PCI DSS Dos Secure your network, deploy firewalls and disable unnecessary services and protocols. Even if you are a Card Present merchant, you most likely have internet connectivity which may in...
I agree with Marite Ferrero's comments but I also think this is a tough one simply because fraudsters - being fraudsters - will find a way anyway. However, that is not to say nothing should be done. ...
The news article just mentions changing the pincodes. Changing the pincodes is not enough. The card numbers can be used for card not present transactions. Will there be another lawsuit much like what...
It seem like every second day we hear about another security breach or data compromise involving usually tens of thousands of card numbers and often additional and even more sensitive information whic...
A report, from the U.S. Treasury Inspector General for Tax Administration, stated that a network scan from the IRS Computer Security Incident Response Center identified 2,093 potential web servers wit...