Girl Scouts will soon get the chance to earn their first ever cyber security badges. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS...
FindFace started as a futuristic social technology for identifying strangers by scanning their faces with a smartphone camera. Two years later, the facial recognition technology is the best in the world (yep, even better than Google’s) and is being used for public safety, law enforcement and...
Buckle Inc. reported Friday, June 16, that it had discovered malware on certain retail store location point of sale systems. The company believes that exposure of cardholder data that could be used to create counterfeit cards – including names, addresses, emails and Social Security numbers...
In June of 2017, it’s kind of impossible to talk about hackers without talking about Russia. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily...
Should global payments be a point of friction for ISVs with an international reach? Paysafe’s SVP of sales and business development, Carla Erlick, explains to PYMNTS how expanding reach and scale need not create barriers between ISVs, merchants and their customers.
From retail to healthcare, enterprises seek to validate identities in real time. With the emergence of mobile and the continued push by payments as an activity into the digital realm, companies must balance customer service and security. Get the Full Story Complete the form to...
IEEE, the world’s largest technical professional organization dedicated to advancing technology for humanity, announced in a press release the launch of a new IEEE Standards Association (IEEE-SA) Industry Connections program: Digital Inclusion through Trust and Agency. Get the Full Story Complete the form to unlock this article and enjoy...
Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing this form, you agree to receive marketing communications from PYMNTS...
A group known as the Shadow Brokers published on Good Friday a set of confidential hacking tools used by the NSA to exploit software vulnerabilities in Microsoft Windows software. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...