top of page

Apple Pay: Bridging Online and Big Box Fraud

This is a very interesting article by Krebs explaining the differences in value between traditional stolen track 2 data from a card present transaction and the CVV authenticated data from an online card transaction.  There are merits on both sides of this debate and only time with validate the ultimate winner, but better ID verification is the solution regardless of the side of the debate with which you choose to align.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page