-
The current consumer and business demands for contactless payment channels give organizations the opportunity to build new solutions with security at the forefront or to append new workflows to legacy business processes, says Mobiquity's Tyrone Jeffress.
March 19Mobiquity -
The scrutiny on installment lenders could prompt them to fine-tune their offerings and diversify into new markets.
March 18 -
Technology safety assessor UL will test EMV specifications on consumer mobile devices as part of standards body EMVCo's early adopter program.
March 17 -
A new study from Black Kite outlines a variety of threats facing the industry and pinpoints the average cost of a breach at large and small institutions alike.
March 17 -
The State Department has added 14 Chinese lawmakers, including a member of the Communist Party’s ruling Politburo, to a blacklist under the Hong Kong Autonomy Act. Banks face sanctions if they do business with them.
March 17 -
After postponing enforcement for years, the card brands are implementing an EMV liability shift at fuel stations, which still struggle to make the upgrades necessary for chip-card acceptance.
March 16 -
As the Consumer Financial Protection Bureau weighs rules on protecting customer information shared between banks and third parties, it should consider giving consumers full authority over their financial data and committing to direct oversight of everyone involved, including data aggregators and fintechs.
March 16Plaid -
Visa and Mastercard are postponing plans to boost the fees U.S. merchants pay when consumers use credit cards online, pushing back the changes another year to April 2022 because of the pandemic.
March 16 -
After postponing enforcement for years, the card brands are implementing an EMV liability shift at fuel stations, which still struggle to make the upgrades necessary for chip-card acceptance.
March 16 -
The Michigan bank is the latest company to have customer data compromised through a software vulnerability. The incident reinforces the importance of attack simulations, constant searches for intrusions and exchanges of intel with peers.
March 15