https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png 0 0 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2014-11-03 15:52:392016-08-20 09:28:31User Emails Lost Before Launch of CurrentC
Emails were sent out last week to an undisclosed number of beta testers for CurrentC, the MCX alternative to Apple Pay (but also any company using NFC technology like Google Wallet), advising that unauthorized third parties had obtained their email addresses. The news came days after MCX retailers pulled in-store support for other third party payment systems. Not a huge breach, to be sure, but neither a great first branding step for a group that seeks to position itself as …
https://nudatasecurity.com/wp-content/uploads/2014/01/Target-logo.png 226 999 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2014-01-22 10:14:392016-08-22 11:10:44Target’s Security Slip — 110 Million Customers’ Information Stolen
Target’s Black Friday season security mishap put a harsh spotlight on consequences of less that stone-clad data security. It also demonstrated the comparative ease with which hackers can gain access to consumer data. The attack was made possible due to a malicious software which infected Target’s point-of-sale systems, resulting in the theft of customers’ names, phone numbers, email addresses, and mailing addresses in addition to their credit and debit card numbers. The Method of Attack With data security a hot …
https://nudatasecurity.com/wp-content/uploads/2013/08/Padlock.png 512 512 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-11-06 15:09:162018-05-29 13:49:55When is Fraud Friendly? E-commerce Fraud 101
In the e-commerce world, there are three common types of fraud: First Party Fraud Third Party Fraud Seller Fraud First Party Fraud This is when the customer is legitimately trying to scam you. In e-commerce this might be: Claiming a product wasn’t delivered Reading a book and requesting a refund Claiming they didn’t make the charge on the credit card What makes this difficult to combat is that it may be seasonal; recession time sees an increase in first party …
https://nudatasecurity.com/wp-content/uploads/2013/10/2FA-Token-Key.jpg 2699 4047 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-22 17:48:402018-06-25 09:14:36Increase E-Commerce Profits using Risk Based Authentication
Most websites use the combination of usernames and passwords. Both are items that a user knows. Asking “what street did I grow up on”, is just asking more things that a user knows, firms that do this are just implementing more KBA’s. Economics of Authentication To use some basic economics, the addition of the password as opposed to not requiring validation has a huge marginal benefit to the company. Implementing a second, and third and forth has an ever decreasing …
https://nudatasecurity.com/wp-content/uploads/2013/10/OTP-token.jpg 191 611 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-09 15:11:412019-10-30 13:42:07What is Risk Based Authentication?
Risk-based authentication process applies varying levels of strictness to the authentication process based on the probability that a given application can be compromised. The authentication process becomes restrictive and casts a wider net based on the increase in risk. Understanding the Types of Authentication Authentication methods are usually grouped into a few different factors. 1. Ownership Factors Bank cards, security tokens, mobile phone. Physical objects which a user is required to be in possession of. The risks to these types …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.