article thumbnail

Data Breaches 101: What They Are And How To Prevent Them

VISTA InfoSec

User Account Details Usernames, passwords, security questions, login timestamps, failed login attempt logs, password reset tokens, multifactor authentication details, and session IDs. And painful account recovery procedures await all users who must reset passwords across potentially dozens of breached websites.

article thumbnail

Deepfakes Threaten To Become The New BEC Scam

PYMNTS

Hackers will either use C-suite executives', finance team members', or suppliers' email addresses, or create ones that look very similar, to send their messages and trick professionals into thinking someone legitimate is making a request to alter payment procedures.

article thumbnail

B2B APIs Bring Connectivity, Security To The Cloud

PYMNTS

This also allows hackers to bypass in-app authentication procedures because it can be easier to steal API keys — the credentials developers use to build apps that harness APIs — than contend with apps’ biometric or two-factor authentication (2FA) processes.”. Cloud Havens and Changing Keys.

API 52
article thumbnail

KeyBank On Fighting APP Fraud During The COVID-19 Pandemic

PYMNTS

KeyBank’s strategy for fighting APP fraud is twofold, consisting of customer education and back-end authentication procedures. On the front end, we protect the front door through user authentication to make sure that the person sending the transaction is the correct individual and authorized to do so.

article thumbnail

Balancing Innovation and Security: Digital Payments Insights with Valeri Vanourek of Discover® Global Network

The Fintech Times

However, this foundation allows us to partner with others or concentrate on a multi-cryptogram strategy, multifactor authentication, and improving transaction security. The critical significance of data protection controls, policies, and procedures cannot be overstated. I often liken fraudsters to a game of Whack a Mole.

article thumbnail

PSD2 Smiles On Biometrics — And Other Tales From The New World

PYMNTS

PSD2 sets out the requirements for SCA, an identity verification procedure that leverages multifactor authentication. The product combines chip technology with a fingerprint scanner to verify the cardholder’s identity when making purchases in-store or online. SCA pulls in factors such as ownership (i.e.,

article thumbnail

GDPR & PSD2: A Silver Lining For Fraudsters?

PYMNTS

PSD2 sets out the requirements for SCA, an identity verification procedure that leverages multifactor authentication. Multifactor authentication does introduce new frictions that could make purchasing goods online less desirable. SCA pulls in factors such as ownership (i.e.,