The Ultimate Guide to Credit Cards
Wednesday, December 6, 2023

All articles tagged Security (31)

IdentityIQ Scam Report Highlights the Financial Impacts of AI Voice-Cloning and Phishing Scams

IdentityIQ Scam Report Highlights the Financial Impacts of AI Voice-Cloning and Phishing Scams

No news is good news, right? People often forget about their credit reports until they make a major purchase, like a car or home. Then they may find anomalies or signs of identity theft with probable financial fallout. AI-based phishing and voice-cloning scams are increasingly the culprit, says identity theft protection and credit report monitoring provider IdentityIQ in its 2022 Scam Report. Along with an alarming increase in payment app fraud, the report chronicles... read more »

Sudo by Anonyome Labs: Enabling Secure Digital Tools That Protect Identities and Transactions

Sudo by Anonyome Labs: Enabling Secure Digital Tools That Protect Identities and Transactions

With so many everyday interactions moving online, consumers need privacy protection that works without sacrificing convenience. Solutions from Anonyome Labs protect data through limited-disclosure digital identities known as Sudos. Businesses seamlessly integrate with the Sudo Platform to protect their end users, while the MySudo app offers a suite of consumer-facing tools, including virtual cards for secure online transactions. Anonyome Labs aims to offer leading-edge... read more »

How to Get a Virtual Credit Card Number (Dec. 2023)

How to Get a Virtual Credit Card Number (Dec. 2023)

While the implementation of chipped EMV credit cards has eliminated a large portion of card-present (CP) fraud, the amount of card-not-present (CNP) — read: online — credit card fraud has steadily risen over the last few years. In an effort to combat CNP fraud, card issuers and third-party companies have developed what are called virtual credit cards. Designed for use when shopping online, virtual credit cards are randomly generated, single-use credit card numbers that can limit... read more »

The U.S. Overseas Security Advisory Council Protects American Businesses and Private Entities Operating Abroad from Emerging Threats

The U.S. Overseas Security Advisory Council Protects American Businesses and Private Entities Operating Abroad from Emerging Threats

The rise of the COVID-19 global emergency highlights the importance of international cooperation and the role of governmental organizations in protecting the public. One such organization is the U.S. Overseas Security Advisory Council (OSAC), created in 1985 to establish a mechanism for regular communication between the public and private sectors concerning developments in overseas security. Information and analysis from OSAC analysts helps more than 5,000 constituent... read more »

Darktrace: An AI Cybersecurity Platform that Serves as the Immune System for Enterprise Business Data by Fighting Off Threats

Darktrace: An AI Cybersecurity Platform that Serves as the Immune System for Enterprise Business Data by Fighting Off Threats

Cyberthreats are more prevalent and advanced than ever, especially within the finance industry where trillions of dollars move around the world in complex infrastructures. Darktrace offers a whole new approach to cybersecurity with its Enterprise Immune System, which is modeled after the human immune system. Rather than expending effort on outdated perimeter security systems, Darktrace attacks threats quickly within the system with its Antigena solution. Meanwhile,... read more »

Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords

Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords

Anybody using a computer or mobile device has created a username or password at some point. For years, this has been the standard for online security and authentication, but experts say this approach is no longer sufficient. YubiKey, from Yubico, is a multifactor authentication product that boosts authentication security while maintaining convenience for its users. The YubiKey simply plugs into a USB port or uses near-field-communication technology for supported... read more »

BlockSafe Technologies Protects Crypto Wallets, Exchanges, and Private Blockchains

BlockSafe Technologies Protects Crypto Wallets, Exchanges, and Private Blockchains

StrikeForce Technologies has been a player in the cybersecurity industry for nearly two decades. With the advent of blockchain technology and cryptocurrency, Founder George Waller realized these new industries suffered from security vulnerabilities that could be solved with technology his company had developed and used. The application of this technology is realized through BlockSafe Technologies, which applies high-level authentication and security approaches to crypto... read more »

Cryptomator Secures Sensitive Financial Data Using Cloud-Based, Open-Source Encryption that Works Across Platforms

Cryptomator Secures Sensitive Financial Data Using Cloud-Based, Open-Source Encryption that Works Across Platforms

Cryptomator is an affordable client-side data encryption solution that keeps valuable consumer data safe. The software securely stores informationthat users control in the cloud rather than on devices. And Cryptomator is more accessible than other solutions because its desktop version is free, and it only charges a small fee for using its mobile app. And even if a hacker accesses a user’s vault, Cryptomator’s encrypted files are useless without the proper key to... read more »

HYPR Authentication Platform Eliminates Passwords to Provide the Ultimate Security for Mobile-First Financial Enterprises

HYPR Authentication Platform Eliminates Passwords to Provide the Ultimate Security for Mobile-First Financial Enterprises

In a Nutshell: Large-scale security breaches are on the rise, leaving businesses vulnerable and in need of a security solution that will keep user information safe. Enter HYPR, a decentralized authentication platform that addresses the root problem of hacks — password storage. HYPR helps financial corporations such as Mastercard, secure user credentials by storing them safely on mobile devices. Providing one of the first true password-less security solutions, HYPR easily integrates... read more »

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data

Sensitive information is shared constantly in today’s connected world. That's why Microsoft’s homomorphic technology boosts security by enabling computations to take place on encrypted data, so it never needs to be decrypted, which opens it up to vulnerabilities. Now, Microsoft has released its easy-to-use Simple Encrypted Arithmetic Library (SEAL) for free use, and financial institutions are among the types of companies that can benefit most from this type of... read more »

Kingston Encrypted USB Drives: Hardware Data Protection for Today’s Mobile Workforce

Kingston Encrypted USB Drives: Hardware Data Protection for Today’s Mobile Workforce

Modern technology allows more workers to do their jobs on the go, but the devices they use to store and transfer data can expose businesses to significant breaches. Kingston Technology is well aware of the dangers posed by even the smallest hardware, and its line of encrypted USB devices protects both companies and their mobile workforces. As retailers continually heighten focus on cybersecurity, they need to stay informed on how to protect all points of data access.... read more »

Stay Ahead of Fraud — RSA® Analyzes Purchase Patterns to Help Retailers Detect & Respond to Potential Threats

Stay Ahead of Fraud — RSA® Analyzes Purchase Patterns to Help Retailers Detect & Respond to Potential Threats

Keeping pace with fraud is a tough challenge for retailers because cyber criminals are constantly looking for vulnerable access points to exploit. RSA works to lock cyber criminals out completely by offering businesses protection at every turn. RSA’s proprietary fraud prevention technologies use web session intelligence and behavioral analysis as a factor in determining whether a transaction may be fraudulent. By enlisting RSA, companies can also keep data and other... read more »

How StackPath’s Intelligent Machine Learning Protects Financial Institutions Against Cyberattacks

How StackPath’s Intelligent Machine Learning Protects Financial Institutions Against Cyberattacks

 Cybercrime and the theft of sensitive user data is on the rise, with attacks becoming larger and more frequent in recent years. The perpetrators of these attacks are increasingly well-funded, organized groups that earn millions of dollars from their criminal enterprise. With the stakes so high, it requires increasingly more sophisticated cybersecurity measures to prevent these thefts. StackPath is a platform of inherently secure edge services—including CDN, web... read more »

Blur from Privacy Company Abine Keeps Your Personal Financial Data Safe by Blocking an Average of 175,000 Online Trackers Annually

Blur from Privacy Company Abine Keeps Your Personal Financial Data Safe by Blocking an Average of 175,000 Online Trackers Annually

Any time you visit a website, companies you’ve never heard of use embedded trackers to collect information related to your browsing and purchase history, your interests, and other personal information you input into signup boxes or search engines. Data brokers use the information to categorize consumers and sell the data to outside agencies for marketing purposes. Abine created its Blur and DeleteMe security solutions to not only block the intrusion of trackers, but to... read more »

Entrust Datacard’s Unseen Security Layers Enable Digital Banking with Near-Zero-Factor Authentication

Entrust Datacard’s Unseen Security Layers Enable Digital Banking with Near-Zero-Factor Authentication

Financial customers are regularly treated to new technology and banking features that provide speed and convenience and make maintaining an account easier than ever. But with new services comes added hoops customers must jump through to prove their identity before accessing an account. Multi-factor authentication usually requires providing passwords, answering secret questions, supplying facial and fingerprint scanning, or typing in codes sent to an email or phone... read more »

AlienVault Unified Security Management Platform Provides Threat Detection and Response to Finserv Clients to Monitor and Manage Cyberthreats

AlienVault Unified Security Management Platform Provides Threat Detection and Response to Finserv Clients to Monitor and Manage Cyberthreats

In a Nutshell: An increase in sophisticated cyberattacks involving ransomware and malicious hacking is giving rise to the number of defense solutions available on the market. While businesses have many options to protect their networks, most require multiple products that work independently of each other instead of in unison. AlienVault’s Unified Security Management™ (USM) platform aims to provide essential capabilities within a single console. USM works within network, host, and... read more »

BeyondTrust’s PowerBroker Solutions Stop Privilege Abuse to Prevent Data Breaches and Protect Finserv Clients

BeyondTrust’s PowerBroker Solutions Stop Privilege Abuse to Prevent Data Breaches and Protect Finserv Clients

2017 marked an all-time high number of data breaches, with 1,579 total incidents exposing more than 200 million consumer records. Nearly all of these breaches were caused by the vulnerability and exploitation of a network or stolen credentials that provided access to restricted areas. PowerBroker privileged access management solutions by BeyondTrust address nearly every vulnerability that cybercriminals look for. The solutions tackle password management, privilege... read more »

SCOTTeVEST’s Proprietary RFID Armor™ Material Adds a Hidden Functionality to Its Men’s and Women’s Clothing to Protect Your Credit Cards

SCOTTeVEST’s Proprietary RFID Armor™ Material Adds a Hidden Functionality to Its Men’s and Women’s Clothing to Protect Your Credit Cards

In a Nutshell: Radio frequency identification or RFID skimmers that thieves use to read and store information on a credit, debit, or passport card in a matter of seconds aren't yet as prevalent in the US as they are in Europe and other countries. That didn't stop SCOTTeVEST, a manufacturer of comfortable clothing with as many as 26 hidden pockets, from adding a pocket on certain vests, jackets, and hoodies lined with a proprietary RFID Armor material that blocks the 13.56 GHz... read more »

KeePass Earns Our Editor’s Choice™ Award as the Top Password Manager for Financial Apps & Services

KeePass Earns Our Editor’s Choice™ Award as the Top Password Manager for Financial Apps & Services

The average consumer has around 27 unique passwords they must remember to access important information like email, banking, brokerage, and credit card accounts. Many password vault programs exist on cloud technology that places control of your sensitive data in the hands of someone else's technology. KeePass uses the highest level of encryption security to store an unlimited number of passwords either online or offline with the use of a master password or security file.... read more »

The Bonita Platform from Bonitasoft Earns Our Editor’s Choice™ Award for Providing Finserv Dev Teams with Open-Source Tools to Create Engaging User Interfaces

The Bonita Platform from Bonitasoft Earns Our Editor’s Choice™ Award for Providing Finserv Dev Teams with Open-Source Tools to Create Engaging User Interfaces

Finserv companies across the globe are undergoing digital transformations that change the way customers and employees each engage with the business. A specialist in open-source business process management and digital transformation software, Bonitasoft provides free access to a limited version of its open-source development solution, Bonita. An annual subscription fee enables the full power of the recently released Bonita 7.6, used by Finserv companies to design... read more »

Arxan Keeps Mobile Banking and Payment Applications Safe with Security Solutions that Detect, Defend, and Deter Threats

Arxan Keeps Mobile Banking and Payment Applications Safe with Security Solutions that Detect, Defend, and Deter Threats

Traditional hacker attacks and viruses sought access to sensitive information on personal and business computers. But cybercriminals have shifted their attention to cellphone technology with the rise in mobile banking. Recent discoveries like the WPA2 Wi-Fi network vulnerability and the Janus Vulnerability for Android devices show that mobile application attacks are on the rise. To combat this trend, Arxan’s industry-leading mobile security solutions provide protection... read more »

Trustwave’s Value of Data Study Finds Major Variances on the Black Market Value of Critical Financial Information

Trustwave’s Value of Data Study Finds Major Variances on the Black Market Value of Critical Financial Information

Most consumers think of credit card information as the most valuable personal data to cyber thieves. But strategies put in place by card issuers to lock a credit card the instant fraud is suspected makes it a valuable commodity for only a brief period of time. A recent study by Trustwave found that medical records and personal identifiable information — like Social Security and driver’s license numbers, gender, race/ethnicity, and birth date — are more valuable... read more »

Balancing Consumer Privacy and Advertising: How the DAA Helps Both Sides Win

Balancing Consumer Privacy and Advertising: How the DAA Helps Both Sides Win

The internet has become our default tool for gathering information, maintaining social relationships, consuming entertainment, and for many of us, it’s enabling our livelihoods. But the idea that the internet is free is a myth. There is a cost to providing, maintaining, and delivering all of the information and tools we use, and that cost is borne by advertisers. In return, advertisers and their partners gather data about some of our online behavior in an effort to... read more »

8 Best EMV Chip Credit Cards with Security (Dec. 2023)

8 Best EMV Chip Credit Cards with Security (Dec. 2023)

I’m a history buff and hopelessly nostalgic. I’ve traveled cross-country to attend silent film festivals. My television automatically tunes to Turner Classic Movies at startup. I’ve been known to listen to a few vinyl records after a long day at work. Go ahead and judge me. That doesn’t mean I don’t like technology. My latest project is creating the smartest Smart Home on my block. New innovations have their place in our everyday lives, but a little refresher in the older... read more »

Cyren Answers the Financial Services Industry’s Call with Cloud-Based Security Solutions to Protect Sensitive Email and Web Data

Cyren Answers the Financial Services Industry’s Call with Cloud-Based Security Solutions to Protect Sensitive Email and Web Data

As a financial service provider, the way you handle your customers’ data is paramount. Billions of consumers have had their personal data compromised in massive data breaches, including those at Equifax and Yahoo!, which have brought the issue of privacy to the forefront yet again. Cyren is a cloud-based firm that offers email filtering and web security solutions to companies across the globe. Its continuously updated infrastructure handles nearly 2% of the world’s... read more »

12