article thumbnail

PCI SSC Unveils Enhancements to its Point-to-Point Encryption (P2PE)® Program

PCI Security Standards

In a significant move, the PCI Security Standards Council (PCI SSC) has announced enhancements to its Point-to-Point Encryption (P2PE) Program for use with the currently published P2PE Standard v3.1,

article thumbnail

If encryption keys are vulnerable, so is the point of sale

Payments Source

million from the banking division of the country's post office more than a year ago, it served as a stark reminder that encryption doesn't mean a thing if the key is left unprotected. When South African investigators last week revealed that fraudsters stole more than $3.2

article thumbnail

Accenture and SandboxAQ partners to upgrade data encryption

The Paypers

Accenture and SandboxAQ have announced an expanding partnership to help strengthen data encryption for enterprises and protect against future threats.

article thumbnail

MagTek Introduces AES-256 Encryption with CMAC Authentication

The Nilson Report

The post MagTek Introduces AES-256 Encryption with CMAC Authentication appeared first on Nilson Report.

article thumbnail

Meeting PCI Requirements for Encryption

Basis Theory

The Payments Card Industry Data Security Standard (PCI DSS) outlines hundreds of requirements for storing, processing, and transmitting cardholder data. Any business that accepts payments from any of the major card networks must comply with this standard.

PCI DSS 88
article thumbnail

Proposed US Law Could Hamper End-To-End Encryption

PYMNTS

legislation will reportedly be introduced in the weeks to come that could hamper the capacity of tech firms to provide end-to-end encryption, Reuters reported. . Federal law enforcement agencies, for their part, have reportedly said those encryptions hamper their probes.

article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

Attackers can exploit weak security settings, such as the absence of meeting passwords , the use of default or easily guessable credentials, and the lack of end-to-end encryption. Ransomware, a type of malware, is particularly destructive as it encrypts the victim’s data and demands a ransom for its release.

Risk 242