PCI DSS Compliance Blog
Read the latest news, developments and opinion pieces on IT security and compliance from industry experts New Net Technologies.
Being aware of Payment Card Industry–Data Security Standard (PCI DSS) is essential when dealing with payment card transactions. Click on a link below to find out more about compliance, security, and how to safeguard against payment card fraud.
Being the holiday season, consumers are shopping more than ever, but do shoppers care about potentially suffering from a data breach?
Security researchers at iSight Partners have identified a stealth malware called ModPOS that’s been targeting retail point-of-sale systems since at least 2013.
The recently acquired American hotel and leisure company, Starwood Hotels & Resorts Worldwide, Inc., has announced it has fallen victim to a security breach resulting in the loss of its customer’s financial data.
Major retailers in the United States have continued to urge banks to adopt the use of PINs with new chip-enabled credit cards to prevent counterfeit card fraud.
The Reno, Nevada-based casino, Peppermill Resort Spa Casino, recently notified the public that they have experienced a Point-of-Sale breach that has exposed their customers’ credentials.
The FBI recently published an online PSA warning consumers about vulnerabilities in the new chip-based credit cards, but this message has since been removed due to push-back from banks.
A recent spike in fraudulent purchases made at Walmart has urged shoppers to be careful when making debit purchases unless a PIN is required.
Three times as many credit cards will be chip-enabled by the end of this year as debit cards, making slower banks ideal targets for cyber criminals.
In a recent statement made by Milestone Hospitality Management, guests who stayed at the Holiday Inn of Harrisburg/Hershey may have had their credit card information compromised.
The limit set on contactless payments has now been raised from a maximum of £20 to a maximum of £30, in order to meet the requirements of the UK public.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.