What's the toughest challenge the U.S. faces when it comes to EMV? Randy Vanderhoof of the EMV Migration Forum points to getting POS software and terminals certified for EMV transactions. Find out what other hurdles he identifies.
While the new Apple Pay system is slated to debut next month in the United States, payment card brands say the system eventually will expand to some of the other 66 countries that already accept contactless payments.
Helping merchants deal with the growing threat of POS malware is one of the biggest challenges facing Troy Leach, CTO of the PCI Security Standards Council, who says the BlackPOS malware threat, in particular, "is keeping me up at night."
Today's sophisticated fraud threats are daunting. But security adviser Neira Jones is more concerned about financial institutions' lack of preparedness to face these threats. A London Fraud Summit preview.
Google says just 2 percent of the recent dump of nearly 5 million credentials to Russian cybercrime forums contained valid Gmail username and password combinations. But anyone who reused the same passwords on other sites remains at risk from hackers.
The PCI Security Standards Council has released an update to its guidance for merchants on protecting against card skimming attacks in POS environments that spells out best practices for addressing the latest attack scenarios.
Security experts are advising Google users to change their passwords in the wake of almost 5 million usernames and passwords surfacing on Russian cybercrime forums. But some of the stolen data may be several years old.
Apple has announced a new payment feature known as Apple Pay for its latest iPhones that uses NFC technology to conduct transactions. Security and payment experts say the move eventually could help improve payment security.
Now that Home Depot has confirmed its payments breach, industry experts weigh the possibility that the home-improvement giant's attack is linked to earlier breaches at Target, Sally Beauty and P.F. Chang's.
What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.