Blog Posts Tagged with "ecommerce"

0a8cae998f9c51e3b3c0ccbaddf521aa

Convenience vs. Security - Why convenience keeps winning

November 26, 2012 Added by:Rafal Los

Convenience wins in the consumer mind, easily. Even in the mind of someone who's security-minded convenience may win out over a little added risk. This is especially true if the card issuers are willing to take on the risk at the anticipation of higher revenue or profit...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Happy Satoshi Nakamoto -Bitcoin- Day

November 01, 2012 Added by:gaToMaLo r. amores

One of my heroes SATOSHI NAKAMOTO only 4 years ago posted the research paper describing a new digital currency called BITCOIN. He cracked the problem that had stumped cryptographers for decades a DIGITAL CURRENCY convenient and untraceable with no over site from any government or bank...

Comments  (1)

48062676f7b2fc521b0b32a3c6494469

What Is Digital Currency

October 31, 2012 Added by:gaToMaLo r. amores

Bitcoins are being blamed as EVIL – but Swiss Banks account, Bermuda Shell Games, Luxemboug Shelter, The Cayman Cash or IRA tax-free, tax-exempt, lower Tax rates- tax-free trust – there are all kinds of tricks for the bankers to shelter their money...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Google Wallet: Please Tell Me They’re Joking...

September 08, 2012 Added by:Joel Harding

No computer in the world is safe from a determined hacker. Most of us don’t properly secure our computer, our smart phone, or even our wallets. So how in the heck does storing your credit and debit card information “in the cloud” help you secure your already vulnerable information?

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Will Your Smartphone Become your Wallet?

September 05, 2012 Added by:Allan Pratt, MBA

Will all smartphone users feel comfortable transforming their them into wallets? What about security? What if you lose your phone and the person who finds it hacks into your accounts? Now, these cool capabilities don’t sound so impressive. In fact, there are some serious consequences...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Anonymity and E-Commerce in the Black Market with Tor

July 02, 2012 Added by:gaToMaLo r. amores

A skilled attacker may be able to determine you are using a VPN to connect to Tor by fingerprinting traffic streams. Tor traffic is padded to 512 byte size packets, normal VPN traffic is not. By filtering for 512 byte streams, an attacker can determine who all is using Tor in a given area...

Comments  (1)

48062676f7b2fc521b0b32a3c6494469

System D: Bitcoin’s Underground Economy

June 27, 2012 Added by:gaToMaLo r. amores

What is System D? It is a term that refers to a manner of responding to challenges that requires one to have the ability to think fast, to adapt, and to improvise when getting a job done. This can be applied to hackers and of course the Tor-Onion network. They are all System D and growing because of it...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Which Will Make a Bigger Splash in 2012 - Mobile Wallet or EMV?

February 01, 2012 Added by:Robert Siciliano

Visa has announced plans to accelerate the migration to EMV contact and contactless chip technology in the United States. The company intends to encourage investments in infrastructure necessary to accept and process both new forms of payment technology...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

OWWWS - The Other Form of Occupy

December 15, 2011 Added by:Rafal Los

If we we consider the Occupy movements across the globe, demonstrating and protesting against income inequality and inequitable policies around commerce and taxation, the persistent cart vulnerability could become a seemingly benign form of occupation that could develop into a serious threat...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI Compliance: On Redirects and Reposts

December 08, 2011 Added by:PCI Guru

A number of clients recently prompted me on my take regarding Redirects and Reposts as they attempt to shrink their PCI compliance footprint as small as possible. A lot of them like the idea of the repost because it requires only a simple change to their existing e-Commerce sites...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Evolution of Holiday Thievery

November 30, 2011 Added by:Robert Siciliano

As far back as I can remember, police have been warning of thieves who target cars in parking lots, smashing windows to steal shopping bags left in plain sight. Now the warnings are different: no longer so focused on crime in the physical world, but instead, on threats in the virtual world...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds Seize 150 Websites in Massive Holiday Sting

November 29, 2011 Added by:Headlines

"We are aggressively targeting those who are selling counterfeit goods for their own personal gain while costing our economy much-needed revenue and jobs. Intellectual property crimes harm businesses and consumers, alike, threatening economic opportunity and financial stability..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee: The Twelve Scams of Christmas

November 28, 2011 Added by:Robert Siciliano

Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...

Comments  (0)

D15e0b682a84587af9af463961d00f22

e-Commerce Risks for Cyber Monday and the Holidays

November 28, 2011 Added by:John Nicholson

To deal with the potential volume, they can turn to cloud-based services to add capacity and prevent the site from crashing, but as we'll discuss below, the availability commitments made by many cloud services create their own risks...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Cloud of Clouds: Amazon Web Services

November 22, 2011 Added by:Robert Siciliano

Security is paramount. Amazon states: “In order to provide end-to-end security and end-to-end privacy, AWS builds services in accordance with security best practices, provides appropriate security features in those services, and documents how to use those features..."

Comments  (1)

37d5f81e2277051bc17116221040d51c

The Evolution of Online Fraud Prevention

October 27, 2011 Added by:Robert Siciliano

When merchants moved from catalogs to websites, IP addresses were used to track transactions. But bad guys figured out how to spoof them. Now we have a number of new technologies designed to fight credit card fraud. The most effective and widely implemented is device reputation...

Comments  (0)

Page « < 1 - 2 > »