Remove Authentication Remove Consumer Authentication Remove Download
article thumbnail

Balancing Expectations With Consumer Authentication

PYMNTS

While consumer satisfaction with authentication differs across sectors, financial services topped other markets in a recent report. percent: Share of eCommerce consumers who were required to provide email addresses when signing up for an online account.

article thumbnail

Mobile Banking’s Authentication Breakthrough

PYMNTS

Anti-fraud efforts can seem like word salad with exotic ingredients being tossed around: strong consumer authentication ( SCA ), two-factor authentication (2FA), the second Payment Services Directive (PSD2) … you get the idea. Ask consumers what they want, however, and the acronyms vanish like a metaphor for things that vanish.

article thumbnail

Why ZenKey Authentication Is A Good Idea – With A Big Design Flaw

PYMNTS

The customer expects processes that are smooth and swift — and if a transaction does not meet those expectations, the consumer will likely continue down the line to the next provider who can give them that experience. This means authenticating a consumer has turned into something of a tricky and delicate process.

article thumbnail

Wells Fargo: First Impressions Are Key When It Comes To Digital Onboarding

PYMNTS

Many of these consumers are exploring digital banking for the first time, however, and are frustrated by customer onboarding pain points. Time-consuming authentication methods, redundant application forms and sluggish processes can all drive away potential customers.

article thumbnail

PulsePay Brings New Meaning To Impulse Buying

PYMNTS

That’s the “unofficial motto” that Yehya Awad and his team have been kicking around for PulsePay , a heart rate-based method of online consumer authentication that was the winner of the latest HackPSU that took place on April 9. The solution, he shares, was for the team to “right then and there buy Windows, download and install it.”.

article thumbnail

Using Online, Social Data To Make ‘Thin Files’ Thick

PYMNTS

In the company’s research, three data sets were constructed to test the veracity of online and social media data as a means of authentication: Real Data — The control group, consisting of 10,000 real U.S. consumers who were identified using names, addresses, phone numbers and dates of birth (DOB).

article thumbnail

U.S. Card Skimming Fraud Grows 700+% in First Half of 2022

FICO

Once a customer has used a compromised card reader, the fraudster can download or wirelessly transfer the card details and the video of the PIN being typed, giving them complete access to the account. More sophisticated scammers will put a false front on the keypad, which can act as a key logger for capturing PIN data. Debbie holds a B.A.