Pay By Sound: It’s Back!
Sound travels at 767 miles per hour, so if you want a faster contactless payment, audio waves aren’t a bad vehicle for it. But harnessing audio waves for payments purposes is easier said than done,...
View ArticleWe Heart It Announces Data Breach From 2013
We Heart It, the image sharing website, disclosed late last week that there was a potential cybersecurity breach that may have impacted more than 8 million accounts. In a blog post, the company...
View ArticleForever 21’s POS Hack Went Unnoticed For 8 Months
Forever 21 has provided an update on a payment card data breach that it first reported in mid-November. According to the national clothing retailer, encryption technology on some of its point-of-sale...
View ArticleGEOBRIDGE: Unlocking The Key To Cryptographic Key Management
In payments security, the key is the key. Encryption and the digital keys that allow firms to scramble and descramble data are permanent parts of the payments landscape. There’s a personal element to...
View ArticleIt’s A Small (Connected By Payments) World After All
According to the latest edition of the Payments Powering Platforms tracker, in the next four or five years, consumers globally will be making nearly 70 billion payments per year via online platforms....
View ArticleA Quantum Leap For Data Security
Change sometimes comes to technology at the speed of light. Literally. In news that bowed from the Moscow Institute of Physics and Technology in March, strides are being made in developing a high-speed...
View ArticleCaring Is Sharing (Data)
Everyone wants to rule the data world, but — as Gerhard Oosthuizen, CTO at Entersekt, recently pointed out — it’s not just about having the data; it’s about knowing how to use it. FinTech companies are...
View ArticleHow Dallas Cowboys’ Lewis Neal Wants Companies To Tackle Data Security
This one may be familiar: Wide receiver and cryptographer walk into a bar and … set the data security landscape on its ear. No? Haven’t heard that one, hmm? Since sports analogies abound in all corners...
View ArticleMoving Beyond Tokenization’s ‘Automagic’ Buzz
Beware complacency in anything, but especially in data security. Technology has a way of lulling people into a false sense of security, promising a “set it and forget it” process that can be dangerous....
View ArticleAustralia Readies Encryption Rule That Could Fine Apple
The Australian government on Tuesday (Aug. 14) put forth a new law that would call on technology companies, including Apple, to provide access to encrypted data if they receive a warrant. According to...
View ArticleFive At Five: Apple Faces New Fine Rule In Australia
Welcome to Five at Five, your late look at the day’s payments and commerce news. Today’s coverage includes Australian plans to gain access to encrypted data, along with a funding boost for blockchain....
View ArticleCoinbase Acquires Distributed Systems To Work On Identity Solutions
Coinbase, the cryptocurrency exchange operator, announced Wednesday (Aug. 15) that it has acquired Distributed Systems, a company that has been working on decentralized identity solutions. In a blog...
View ArticleDOJ Pressures Facebook To Break Messenger Encryption
The U.S. Department of Justice wants Facebook to break the encryption in its Messenger app as part of a criminal investigation into the MS-13 gang. While the case in a federal court in California is...
View ArticleF-Secure Researchers Find Security Weakness In All Modern PCs
F-Secure, the security firm, announced Thursday (Sept. 13) that consultants for the company have found a weakness in all modern computers that hackers could use to steal encryption keys and other data....
View ArticleHow Cutting-Edge Tokens Can Help Retailers Find More Profit In Data
Data is one thing — a valuable commodity that makes information the oil of the digital age. However, keeping track of data in a way that enables secure storage, efficient access and analysis,...
View ArticleCanada’s Largest ISP Suffers Website Glitch
Internet provider Altima Telecom — one of the largest independent Canadian internet service providers, serving Montreal and Toronto — had to repair a flaw that could have given hackers access to its...
View ArticleGEOBRIDGE Launches Remote Administration For KeyBRIDGE
GEOBRIDGE has announced that remote administration for its KeyBRIDGE and TokenBRIDGE products will become available in Q4 of 2018. GEOBRIDGE offers cryptographic key management with an eye on what it...
View ArticleChristie’s Brings Blockchain To The World Of Art
While much has been said and written about the blockchain in recent years – good and bad – generally speaking, few have ever really considered it as an artistic venture. In the sense that anything...
View ArticleBluefin And TokenEx Partner To Expand Data Security
Bluefin, the PCI-validated point-to-point encryption (P2PE) solutions company announced on Wednesday (Oct. 17) that it has partnered with TokenEx for data security. In a press release, the companies...
View ArticleWhy Yesterday Is The Key To Building mPOS’ Future
Before 2009, when Square launched in the U.S., the world of payments wasn’t terribly friendly terrain for small and micro-businesses looking to accept credit cards. The process was convoluted, and the...
View Article