This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Just when payment card data seemed somewhat protected by EMV technology, hackers have found yet another way to steal information and gain access to PINs. In this week’s Hacker Tracker , PYMNTS was joined by Alex Cagnoni, CEO of Datablink , who shared some interesting insights on some of the latest news across the cybersecurity landscape.
Between accounttakeovers, business logic abuse, loyalty and reward points fraud and other cybersecurity attack methods, companies are not only suffering financial damages but brand image damages too. Not according to Angel Grant, director of Global Product Marketing and Strategy for cybersecurity firm RSA.
The trouble is, the global implementation of EMV authentication has led to a major uptick in instances of card-not-present (CNP) fraud in the eCommerce space. For its part, XOR recently released a preventative, data-driven resource to enable online retailers to combat CNP fraud and accounttakeover attempts on the back-end.
According to the latest edition of the PYMNTS Global Fraud Index – after a short lull post-EMV in the U.S., The good guys – the financial institutions, retailers and cybersecurity firms – have to be right every time, finding all available windows and making sure they are entirely locked at all times. The Many Ways To Play At Fraud.
Well, for one, accounttakeovers, which are on the rise. According to the October 2017 Global Fraud Index, a PYMNTS and Signifyd collaboration, accounttakeover has spiked 45 percent in Q2 2017 alone. The increase in accounttakeovers is symptomatic of the larger landscape of fraud.
Earlier this year, the Global Fraud Attack Index , a PYMNTS and Forter collaboration, found that online fraud attacks have jumped by 11 percent since the move to EMV in October. “The more accessibility to install and download bots there is, the more wary you need to be.”. However, just because botnets primarily stick to the low-hanging (i.e.,
As the growth of EMV adoption in the U.S. However, just because botnets primarily stick to the low-hanging (i.e., low-cost) fruit in eCommerce transactions, that’s certainly no reason to sleep on them.
Stolen data , even when attached to a card that is closed in the wake of fraud, can still be sold to criminals who might then try accounttakeover — or who could use composite IDs from various victims to build a false ID, gain access to credit and them steal money through there. One big reason?
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content