Payment solutions provider Charge Anywhere is warning merchants and cardholders of a data breach that may have exposed information related to payment card transactions dating back as far as Nov. 5, 2009.
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
Cybercriminals are perfecting the automated systems they use to verify stolen debit and credit card data by exploiting charitable websites. Learn why these sites are so-called soft targets for hackers.
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.
While card issuers and payments acquirers are speeding up their EMV rollouts, Kate Larson of the Consumer Bankers Association says banks also should be implementing other technologies, including tokenization, in their efforts to fight fraud.
The stiff sentence of a cybercriminal for his role in an Internet-based scheme that trafficked in hacked payment card sends a strong message about the serious nature of ID theft. But experts say more tough sentences are needed to deter fraudsters.
While banking associations debate with merchant groups about cybersecurity responsibilities, SWACHA CEO Dennis Simmons says more attention must be paid to the role cardholders play in protecting their accounts.
Mobile banking adoption is growing and mobile malware threats are growing as well. With as much as 40 percent banking being done on the mobile channel, understanding the threats and securing the experience are key to reaping operational savings and customer satisfaction. This webinar will review:
Comptroller of the Currency Thomas Curry says "it's only fair" that merchants should be responsible for some of the expenses that result when their systems are breached. Now, security experts consider the implications of his comments.
Financial criminals breach hundreds of merchants each year, displaying a better understanding of how point-of-sale systems operate than even the technicians that maintain them. Security professionals must understand POS architecture, integrated payment processing and weaknesses in the technology, so they can better...
MasterCard is testing a biometric wristband that authenticates a user's identity for payment card transactions by monitoring their heartbeat. Payment experts weigh in on whether the technology has the potential for widespread use in preventing card fraud.
Poor post-breach communication can cause as much damage to a company's reputation as the cyber-incident itself, says Al Pascual, a senior analyst at Javelin Strategy & Research, who will speak at ISMG's Fraud Summit Dallas.