IoT devices are increasingly becoming a way to pay for goods and services, shifting the "internet of things" to the "internet of transactions." Gord Jamieson of Visa Canada discusses steps the card network is taking to ensure these payments are secure.
The scale of connectedness we're experiencing is unprecedented. The pace of change and technology advancement in recent years could be compared to another industrial revolution. But the connectedness that allowed us to bring the power and security of the Visa network to each transaction in real time, also created the...
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
If 2017 was the year of ransomware innovation, 2018 is well on its way to being known as the year of cryptocurrency mining malware. Numerous studies have found that the most seen malware attacks today are designed for cryptojacking. But while ransomware campaigns may be down, they're far from out.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
The global eCommerce market is booming and consumer electronics are leading the way. This year, online consumer electronics sales are expected to reach $108.4 billion in the US alone. Online sales present new challenges, including a rise in Card Not Present (CNP) fraud.
Download this infographic which aims to help...
While most online businesses recognize the importance of preventing chargebacks, there is less emphasis on merchant's ability to dispute and overturn certain chargebacks, to protect their hard-earned revenue.
This guide on chargeback disputes provides actionable tips for identifying candidates for dispute, gathering...
Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
South Korean cryptocurrency exchange Coinrail says hackers stole 30 percent of all of the cryptocurrency tokens it was storing, but many have been successfully frozen or recalled. Security experts say cryptocurrency exchanges remain poorly secured, so they're popular targets for hackers.
Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.
The alluring promise of gold inspired almost half-a-million to risk it all and rush to California in the mid-20th century in hopes of striking it rich. Although gold mining was fruitless for the most part, cunning opportunists profited off of desperate '49ers by selling synthetic gold or mines of no real value. A...
Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
Distributed deception technology does not provide a viable solution for defending ATM machines against attacks executed physically on the machines themselves. But it is arguably the most effective means of stopping the most damaging attacks - the ones executed against the larger ATM network or those enabled by...