Ransom may seem like a concept from a bygone era: Rich heiresses held for a bag of money. An outdated concept that happens infrequently today, right? Wrong. The reality is ransom has gone high-tech, and it’s more lucrative than ever. The new targets? Businesses, organizations,...
Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing this form, you agree to receive marketing communications from PYMNTS...
For companies that may have been breached, don’t fret — you may not lose your customers. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter,...
When comparing the cybersecurity performance of U.S. federal, state and local government agencies to 17 major private industries, the public entities held strong in last place. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS...
There’s a rush of on-demand startups joining the marketplace, but there’s just one problem: Who is going to make sure they vet those new hires/companies that are brought on? Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...
Tensions between Washington and Silicon Valley may heat up with the circulation of the latest proposal from lawmakers that would force private companies to unlock encrypted devices and technology at the request of a court order. Get the Full Story Complete the form to unlock...
For all intents and purposes, it’s an excellent time to be a hacker. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today....
If there’s one thing online shopping provides that in-store browsing doesn’t, it’s the opportunity to find the right product at the right price. But evidence is emerging that the right price might just be designed to look that way. Get the Full Story Complete the...
In order to access the San Bernardino terrorist’s locked iPhone, the FBI reportedly called on the help of professional hackers. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....