Accenture announced Monday (April 3) that it has completed its acquisition of the iDefense Security Intelligence Services business from VeriSign. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe...
Assessing the identity of an individual behind any online transaction or onboarding process is a difficult task, especially in today’s digitally powered world where cybercrime and data breaches have made personal data and credentials even easier for fraudsters to get their hands on. Evaluating the...
At one point or another, almost every organization’s cybersecurity is breached. Big or small, it seems that no one is immune from cyberattacks. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no...
After a lengthy legal process with the Federal Trade Commission (FTC), the Netspend Corporation has come to an agreement. The company, which serves those without a bank, specializes in providing prepaid Visa debit cards. Get the Full Story Complete the form to unlock this article...
It can be difficult to know how to handle cybercriminals and their malicious attacks, especially when many people don’t have a foundational knowledge on what cybersecurity is all about. In this week’s Hacker Tracker, Bottomline Technologies’ Ed Adshead-Grant shares his take on a few of...
A federal judge ruled that Wells Fargo will face litigation for breach of contract and conflict of interest claims related to risky residential mortgage-backed securities, Reuters reported. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...
Though anyone can gain access to the dark net using Tor software, the illicit and unregulated part of the internet is not for the faint of heart. Being that it’s so unstructured, the dark web is not a place where one can go without knowing...
The good news about EMV is that it has drastically dropped the instance for cloned-card fraud that was far more endemic in the mag stripe era. The not as good news is that fraudsters were not discouraged — they simply switched their focus to card-not-present...
The revelations from WikiLeaks about the U.S. government’s hacking tools are reported to have sent Cisco reeling earlier this month, Reuters reported. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins...