Cybersecurity

Computer security, cybersecurity or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Source: en.wikipedia.org

EU Oversight of Microsoft, Amazon Cloud Business Goes Beyond Antitrust
EU Oversight of Microsoft, Amazon Cloud Business Goes Beyond Antitrust
April 04, 2022  |  Regulation

Over the course a few days, cloud computing went from “not being an antitrust concern,” according to EU Competition Commissioner Margrethe Vestager, to a being...

READ MORE >
Crypto.com Uses Biometrics, Wallet White-Listing to Weed Out Bad Actors
Crypto.com Uses Biometrics, Wallet White-Listing to Weed Out Bad Actors
April 04, 2022  |  Cryptocurrency

Cryptocurrency has been a never-ending roller coaster since its introduction more than a decade ago, seeing extreme highs and lows in value to its investors’...

READ MORE >
In $625M Hack, a Bigger Crypto Security Problem Is on Display
In $625M Hack, a Bigger Crypto Security Problem Is on Display
April 03, 2022  |  Cryptocurrency

How do you steal $625 million? In the case of the Ronin Network, a cross-chain bridge that lets people make payments on one blockchain using...

READ MORE >
Apple, Meta Provided Hackers With Customer Data Under Fraudulent Requests
Apple, Meta Provided Hackers With Customer Data Under Fraudulent Requests
March 30, 2022  |  Security & Fraud

Meta and Apple reportedly provided customer data to hackers masquerading as law enforcement, Bloomberg reported Wednesday (March 30). Citing three people familiar with the matter,...

READ MORE >
PYMNTS Crypto Crime Series: Latest DeFi Hack Drains Record $625M
PYMNTS Crypto Crime Series: Latest DeFi Hack Drains Record $625M
March 30, 2022  |  Security & Fraud

The PYMNTS crypto crime series looks at the capers that have not only been committed in the cryptocurrency industry but have defined it — and...

READ MORE >
Hackers Use Fake Emergency Data Requests to Get Customer Info
Hackers Use Fake Emergency Data Requests to Get Customer Info
March 30, 2022  |  Security & Fraud

Hackers are using email accounts and websites associated with police departments and other government agencies to send unauthorized demands for healthcare patient data, saying the...

READ MORE >
Transparent to Launch Privacy-Focused B2B Payment System
Transparent to Launch Privacy-Focused B2B Payment System
March 29, 2022  |  B2B Payments

Transparent Financial Systems will be rolling out a new service called Xand Alpha, which will come along with a confidential transactions feature, according to a...

READ MORE >
PYMNTS Metaverse Series: The Scammers Are Coming, as VR Brings Phishers 3D Lures
PYMNTS Metaverse Series: The Scammers Are Coming, as VR Brings Phishers 3D Lures
March 29, 2022  |  Metaverse

On the web, you need to be careful of phishing emails claiming to be from your boss, telling you to check out the information on...

READ MORE >
PYMNTS Intelligence: How Robust Identity Authentication Can Help FinTechs Meet Growing Cybersecurity Challenges
PYMNTS Intelligence: How Robust Identity Authentication Can Help FinTechs Meet Growing Cybersecurity Challenges
March 29, 2022  |  Authentication

Today’s consumers are tapping nontraditional banking and payment solutions more often, turning to neobanks or alternative payment solutions such as mobile wallets to conduct many...

READ MORE >