The U.S. filed criminal charges against a man accused of hacking into the bank and credit card accounts of celebrities from February 2012 to January 2015. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS...
Usually, successful companies will retain the services of a public relations firm to deal with the fallout of a product recall or some negative news coverage. Last week, though, Alibaba found out that, sometimes, what’s in need of damage control is your own CEO. Get...
There’s a common misconception about data thieves that because their chosen methods are perceived to be high-tech, their behaviors will always be similarly sophisticated as well. However, much like breaking and entering in the real world, hackers are always going to take the path of...
Cloud cybersecurity provider SecurityScorecard announced on Thursday (June 23) that it locked down $20 million in Series B funding. The financing round was led by GV (formerly Google Ventures) with participation from existing investors, the company said in a statement. Get the Full Story Complete...
The number of business users impacted by ransomware is on the rise. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By...
NCR Corporation, a consumer transaction technologies provider, announced on Thursday (June 23) that it released a new and more secure version of its transaction processing solution, Authentic. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...
Merrill Lynch found itself in hot water with the Securities and Exchange Commission and, as a result, will be paying out $415 million on accusations that the firm misused customer cash. Get the Full Story Complete the form to unlock this article and enjoy unlimited free...
It was the cyberheist heard around the world — and one that’s been creating quite the stir since it happened in February. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional...
A recent guest blog presented by G2 Web Services explores the obligations acquirers and third parties have when it comes to filing a Suspicious Activity Reporting (SAR) form if there is any suspicion of transaction laundering. Get the Full Story Complete the form to unlock...