The Latest in IT Security

Our Credit Cards, Cassette Tapes Use Same Technology

23
Dec
2013

“The US is the top victim location for card counterfeit attacks like this,” says the CEO of the Electronic Transactions Association of the recent Target hack . That’s in part because US credit and debit cards rely on an easy-to-copy magnetic strip on the back of the card, which stores account…

Comments are closed.

Categories

FRIDAY, NOVEMBER 22, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments