Yearly Archives: 2016

Mobile’s role in ID verification for age-restricted merchants

Mobile identity verification is a topic that the industry often overlooks, but Michael Hagen from Mitek shares some thoughts on why it’s important for certain merchants. Sourced through Scoop.it from: http://www.mobilepaymentstoday.com

Posted in Uncategorized

April 5 for 5: Criminals seek to exploit mobile payments

It’s time for a look back at April’s most-read articles on Mobile Payments Today. Sourced through Scoop.it from: http://www.mobilepaymentstoday.com

Posted in Uncategorized

Inventory Management Via Internet Of Things | PYMNTS.com

In an omnichannel world, knowing what product is available where can mean the difference between massive profits and shuttered stores. Sourced through Scoop.it from: http://www.pymnts.com

Posted in Uncategorized

How One Cybercrime Gang Is Ratcheting Up PoS Attacks | Cyber Security & Digital Forensics

With magnetic-stripe payment card transactions gradually starting to disappear in the US, cybercriminals have been on a tear with PoS attacks against retail and hospitality targets that haven’t yet adopted EMV card payment, FireEye researchers say. Sourced through Scoop.it from:

Posted in Uncategorized

Online transaction fraud to reach $25 billion by 2020 – Help Net Security

Online transaction fraud will reach $25.6 billion by 2020. By the end of the decade, $4 in every $1,000 of online payments will be fraudulent. Sourced through Scoop.it from: http://www.helpnetsecurity.com

Posted in Uncategorized

Key Factors for your eCommerce Website Security Against Cyber Hacks – Web Design Ledger

Data encryption is the key to prevent cyber hacks. It’s important that all the data transferred between the company’s web server and customer’s website must have encryption to avoid phishing attack. Sourced through Scoop.it from: webdesignledger.com

Posted in Uncategorized

How to protect our PII and sensitive information from fraud

Sensitive information comes in many forms of nonpublic and personally identifiable information. How do organizations protect this information from attacks, fraud, threats and other nefarious activities? Sourced through Scoop.it from: http://www.ibmbigdatahub.com

Posted in Uncategorized

New Facebook Sharing Options: What Marketers Need to Know

Do you want more people to share your content on Facebook? Are you taking advantage of Facebook’s sharing features? Facebook offers a variety of new buttons and plugins that make it easier than ever for readers to share and engage

Posted in Uncategorized

5 Things You Need to Know about Facebook’s Next 10 Years

At Facebook’s annual developer conference this week, CEO Mark Zuckerberg outlined audacious goals for the social network’s next decade.   FREE Business Plan Template here: http://bit.l/1aKy7km Here’s how he plans to keep the more than 1 billion people that use

Posted in Uncategorized

Rocky Road for Payment Cos. with China NGO Law | PYMNTS.com

What happens when the greenfield of all greenfield opportunities suddenly has a fence thrown up around it? News last week that China’s government has put in Sourced through Scoop.it from: http://www.pymnts.com

Posted in Uncategorized