article thumbnail

MagTek Introduces AES-256 Encryption with CMAC Authentication

The Nilson Report

The post MagTek Introduces AES-256 Encryption with CMAC Authentication appeared first on Nilson Report.

article thumbnail

If encryption keys are vulnerable, so is the point of sale

Payments Source

million from the banking division of the country's post office more than a year ago, it served as a stark reminder that encryption doesn't mean a thing if the key is left unprotected. When South African investigators last week revealed that fraudsters stole more than $3.2

article thumbnail

Meeting PCI Requirements for Encryption

Basis Theory

The Payments Card Industry Data Security Standard (PCI DSS) outlines hundreds of requirements for storing, processing, and transmitting cardholder data. Any business that accepts payments from any of the major card networks must comply with this standard.

PCI DSS 88
article thumbnail

Proposed US Law Could Hamper End-To-End Encryption

PYMNTS

legislation will reportedly be introduced in the weeks to come that could hamper the capacity of tech firms to provide end-to-end encryption, Reuters reported. . Federal law enforcement agencies, for their part, have reportedly said those encryptions hamper their probes.

article thumbnail

PCI updates data encryption standard to increase product availability

Payments Source

In updating its point-to-point encryption standard, the PCI Security Standards Council says the resulting simplified validation process for component and software providers will result in more products available for cardholder data protection.

article thumbnail

PCI DSS Requirement 4 – Changes from v3.2.1 to v4.0 Explained

VISTA InfoSec

Malicious individuals often exploit misconfigured wireless networks and vulnerabilities in outdated encryption and authentication protocols to gain access to cardholder data environments (CDE). Protection can be achieved by encrypting the data prior to transmission, the session during transmission, or both.

PCI DSS 130
article thumbnail

Data breaches are too strong for encryption

Payments Source

In the era of big data, a more thorough, data-centric approach is needed for security than the traditional encryption of the past, argues comforte AG's Jonathan Deveaux.