The Profile of a Cyber Criminal

The Profile of a Cyber Criminal

Learn how everyone is a target with this infographic from Jumio - Profile of a Cyber Criminal . Every day over 1.5 million worldwide are victim's to cybercrime.

Type: Infographic




Is Bitcoin the Future of Currency?

Is Bitcoin the Future of Currency?

This infographic explains some of Bitcoin’s basic elements, including how to use it and some finer points about its volatile nature.

Type: Infographic




Market Overview of Authentication Solutions

Market Overview of Authentication Solutions

Get the latest Forrester Market Overview on today's authentication solutions. Included in this assessment is Jumio's Netverify solution as the sole “3rd generation” solution suitable for enrollment and verification.

Type: Case Study




The Fraudster's Playbook: 5 Ways in Which Fraudsters Steal Identities… and How to Stop Them

The Fraudster's Playbook: 5 Ways in Which Fraudsters Steal Identities… and How to Stop Them

The playbook will show you how to improve conversion and prevent fraud at the same time. Download your complimentary copy of The Fraudster's Playbook to learn about 5 current methods fraudsters are using for stealing identities.

Type: White Paper




Social Commerce: The New Internet Frontier

Social Commerce: The New Internet Frontier

People have been recommending products to friends through social media for years, but social commerce will give users the opportunity to make direct, one-click purchases of recommended items.

Type: White Paper




On-Demand Webinar: Using PCI for PII Case Study with WestJet airlines

On-Demand Webinar: Using PCI for PII Case Study with WestJet airlines

In this on-demand webinar WestJet presents a case study that will ground us in fundamental PCI DSS practices. Intel also presents how a drop-in gateway proxy design pattern can be used to solve PCI & PII scope reduction and ensure consistent security for APIs.

Type: Webinar




Analyst Report: Securosis - Tokenization vs Encryption

Analyst Report: Securosis - Tokenization vs Encryption

In this research paper, Analyst and CTO of independent research analyst firm, Securosis, Adrian Lane discusses appropriate uses for tokenization, and why companies are looking to this new approach to secure sensitive data.

Type: White Paper




Enhance Payments Security with Mobile Apps

Enhance Payments Security with Mobile Apps

New apps can protect vulnerable credit card numbers from fraud risks.

Type: White Paper




Security of Proximity Mobile Payments

Security of Proximity Mobile Payments

Proximity mobile payments are defined as payments to a merchant that are initiated from a mobile phone. These payment are made by simply waving a mobile phone that uses Near Field Communication (NFC) technology near a merchant's point-of-sale device.

Type: White Paper




Security Issues in Mobile Payment Systems

Security Issues in Mobile Payment Systems

Due to the widespread availability of mobile phones and their extensive usage worldwide, it is a reasonable expectation that payment schemes involving a mobile phone will soon be a dominate force in electronic payments. At the same time, vulnerabilities in...

Type: White Paper




Secure Mobile Payment via Trusted Computing

Secure Mobile Payment via Trusted Computing

Mobile payments enable an easy payment mechanism and can be an convenient complement to traditional payment means, but can pose security challenges of a new dimension.

Type: White Paper




Mobile Payment Systems and Services: An Introduction

Mobile Payment Systems and Services: An Introduction

Mobile payments, also known as m-payments, may be defined as any payment where a mobile device is used to initiate, authorize and confirm an exchange of currency in return for goods and services. Mobile payments can be an alternative to cash, checks, credit cards and debit cards, and can make possible new opportunities for commerce convenience.

Type: White Paper





View all Topics View by Company

This research center deals with perhaps the most sensitive topic in the mobile payments industry – security. We cover fraud prevention for your business, privacy issues, regulation, malware, hacking, shortcodes, privacy, lost or stolen phones, and EMV.

NEWS