article thumbnail

Finastra Confirms Breach Amid Hacker’s 400GB Data Theft Claim

Fintech News

The company confirmed the incident to TechCrunch following a hacker’s claim of compromising Finastra ‘s internal file-transfer platform and subsequent attempts to sell the stolen data. ” The hacker selling the data alleges it originated from IBM Aspera, a widely used file-transfer software.

article thumbnail

Detecting NFC Relay and Ghost Tap Attacks Using Metadata and Real-Time Rules

Finextra

If a transaction originates from an unfamiliar device or a device not previously seen for that card or user, it’s a red flag. If a usually low-ticket, low-frequency merchant suddenly processes a rapid series of tap payments on the same card, it could be a compromised POS or a mule scenario. a device account number or wallet ID).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The rise of generative AI in payment security: A double-edged sword for data privacy

The Payments Association

However, as payment services rely more heavily on these AI technologies, they face a growing challenge: how to harness the power of LLMs without compromising data privacy. Payment data is inherently vulnerable because its compromise can have significant financial and personal consequences for consumers.

article thumbnail

RT2: A strategic transformation for UK payment providers

The Payments Association

This is more than 'coding to the spec'; different and new software is required by originating institutions, correspondent banks, intermediate banks, and even regulators or central banks to realise the advantages."

article thumbnail

PS25/12 – FCA Changes to the Safeguarding Regime for Payments and E-Money Firms

Finextra

This ensures that investment activities do not compromise liquidity. The changes introduced in PS25/12 represent one of the most significant tightening of safeguarding requirements for payment and e-money firms since the original PSRs and EMRs came into force.

article thumbnail

Tokenization vs Encryption: What’s Best for Secure Billing?

My Payment Savvy

.” In payment processing, when a customer enters their credit card number (like 4532-1234-5678-9012), the tokenization system immediately replaces it with a random string (like 7849-ABCD-2847-XKJF) that has no mathematical relationship to the original card number. Your systems only store meaningless tokens.

article thumbnail

The state of fraud in 2024: Key mid-year takeaways

The Payments Association

The data shows that without better cross-industry cooperation, it will be difficult to curb the tide of fraud that originates outside traditional banking systems. In 2023 alone, this partnership led to 149 arrests or interviews under caution and the recovery of nearly 25,000 compromised card numbers from criminal gangs.