Remove vulnerabilities-threats insider-threats
article thumbnail

PAAY Partners With Bluefin To Further Secure eCommerce Transactions

PYMNTS

This leaves payment data vulnerable while inside the web page before it is transmitted. Hackers have exposed this vulnerability extensively over the years,” Miles added. “PAAY provides strong authentication at the front door and Bluefin encrypts and tokenizes the data at the point of interaction on the web.

article thumbnail

New Report: How Behavioral Analytics Help FIs Block Fraud At The ITM

PYMNTS

The security of person-to-person transactions is also constantly under threat, driving six of the United Kingdom’s largest banking groups — Barclays Group , HSBC Group , Lloyds Banking Group , Nationwide Building Society , RBS Group and Santander Group — to adopt a new system called Confirmation of Payee.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

’Tis The Season … For POS System Attacks?

PYMNTS

Carolyn Crandall, CMO of Attivo Networks , joined this week’s Hacker Tracker to share the vulnerabilities impacting POS systems and discuss whether massive data breaches are on the horizon in the months ahead. The most common types of threat actions used by hackers include brute force, the use of stolen credentials and offline cracking.

article thumbnail

Deep Dive: The Fight To Stop Biometric Spoofing

PYMNTS

Fraudsters, hackers and other cybercriminals are unfortunately working to circumvent these defenses and access valuable user data, but biometrics providers are creating measures to anticipate and counter the latest threats. Threats To Digital ID Security. Passive detection relies on internal algorithms to detect threats.

article thumbnail

New Strain Of Ransomware Striking US, European Firms 

PYMNTS

The threat actors realized they can amplify their impact by targeting specific companies such as managed service providers,” said Bennett. Sodinokibi usually attacks through the victims’ systems or suppliers, with outsourced IT service providers being especially vulnerable.

article thumbnail

How To Fight Fraud Without Cheapening Consumer Experiences

PYMNTS

“It’s fairly new,” Dhawan said of this particular fraud and hacking threat. That leaves such companies vulnerable to weaknesses in such code — gaps that may be widespread and well-exploited by fraudsters. Across all industries,” Dhawan said, “we were surprised at how much of this information was vulnerable.”.

article thumbnail

Worried About Digital Fraud Now? Just Wait For The Implants.

PYMNTS

There may come a day, a generation or two from now, when stories about the data breaches and other hacking threats faced by payments and commerce operators in 2018 seem quaint — or, at the least, like relatively primitive foreshadowing of a new type of digital criminality. Security Vulnerabilities. The main areas of security risk?