
EMV 3DS 2.3 enhances security and fraud prevention across e-commerce channels
Global technical body EMVCo has enhanced the EMV 3-D Secure (3DS) Specifications to improve the consumer experience and fraud fighting capabilities for issuers, acquirers and …

3-D Secure transactions growth fueled by card-not-present explosion and PSD2
A massive $100 billion in transactions in 2021 alone have been protected by 3-D Secure payments authentication technology, Outseer reveals. The report also reveals continued …
Cardknox supports 3DS2 technology to decrease online fraud and reduce chargebacks
Cardknox announced its support for 3-D Secure 2.0 (3DS2) technology, a next-generation e-commerce payment security protocol developed by EMVco. 3DS2 authenticates cardholder …
Intrinsic ID partners with DARPA to offer digital authentication and security tech to researchers
Intrinsic ID announced a partnership with the U.S. Defense Advanced Research Projects Agency (DARPA) to make its digital authentication and security technology accessible to …
GlobalPlatform achieves ISO/IEC 17065 accreditation to support cybersecurity initiatives
GlobalPlatform has been accredited as an ISO/IEC 17065 compliant certification body. Accreditation demonstrates the certification processes in place for its three …
RSA introduces Outseer, a spinout of its Fraud & Risk Intelligence unit
RSA Security announced the transition of its Fraud & Risk Intelligence business into a new standalone company serving a worldwide customer and partner community. The new …
EMV Secure Remote Commerce Specification 1.0 released
EMVCo has released EMV Secure Remote Commerce Specification v1.0, which is available for free public download from the EMVCo website. The specification provides a foundation …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility