Monday, August 31, 2009

Not the "Type" of Two Factor Authentication we Need...

An article written two years ago (August 17th, 2007) blasted online banking log-in procedures and still, nothing has changed...even though they mention using true two-factor authentication as a solution way before it got as bad (fraud) as it is today...

Banks are still using the "type" of authentication that hackers love.  What type is that?  You know what the Hellvetica I'm talking about.  The kind you use when you don't swipe!

I thought it might be interesting to "revisit" what was said two years ago in order to demonstrate that online banking has not progressed, while hackers unarguably have.

"A new financial services requirement calling for two-factor authentication should make online banking secure, but one researcher says it's actually making things worse.  At this year's DefCon gathering in Las Vegas, security researcher Brendan O'Connor outlined several scenarios in which online banking has gotten worse, rather than better. Under Federal Financial Institutions Examination Council (FFIEC) guidelines that went into effect at the end of last year, banks are required to provide some form of multifactor authentication of their customers.

That typically means asking the user to provide , something you have (an ATM card), something you know (a PIN) (Editor's Note:  where did "typically" go when  it comes to online banking/online shopping?  Sounds like a "swipe" vs. "type" argument to me...or something you are (a fingerprint scan). (Editor's Note: Been there,  done that

However, O'Connor,found that the new authentication implementations were no better than the traditional user-name and password that were required prior to last year.  (which, BTW is why I always utilize "username" "password" in my rants against typing. 

O'Connor also shared some insight into why, with all these new protections in place, so many phishing sites are still operational today.


Nearly two years ago, the Federal Financial Institutions Examination Council (FFIEC) recommended guidance on authentication for online banking. According to their Web site "The Council is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institutions by the Board of Governors of the Federal Reserve System (FRB), the Federal Deposit Insurance Corporation (FDIC), the National Credit Union Administration (NCUA), the Office of the Comptroller of the Currency (OCC), and the Office of Thrift Supervision (OTS), and to make recommendations to promote uniformity in the supervision of financial institutions." O'Connor, who isn't an expert on compliance, said that failure to pass an FFEIC audit could make it hard for banks to acquire smaller banks or institutions.
"The guidance specifically says that transaction fraud and identity theft are a problem, and it places the blame squarely on authentication," said O'Connor. ." He pointed to the "three strikes--you're out" rule with most Web applications. Guess the wrong password and you're locked out until you get on the phone to someone. "Attackers aren't getting in by guessing, they're getting in by stealing the credentials or tricking the end-user into giving away the credentials." So adding more credentials won't make sites more secure.  (Editor's Note:  EXACTLY!  A user can "type" in 20 credentials and if a keylogger gets a hold of it, or they have malicious code on their computer, or if they type it into a counterfeit bank website, they are screwed.  So authentication isn't the problem.   Typing is!)

The [FFIEC] guidance specifically says that transaction fraud and identity theft are a problem, and it places the blame squarely on authentication I disagree with entire premise 

Editor's Note:  Here Here.  It's the "type" of  "authentication" that creates the  problem.  More specifically...Consumer's "typing" authentication instead of "swiping" to authenticate their online banking session!. 
The trouble with credentials

Choosing the answer to a security question isn't two-factor authentication; it's one factor--it's choosing something that only you know. But is it? O'Connor said it depends on the question. If it's public record data, then an attacker might also know the value of your mortgage or the year you graduated from college. If it's personal information, then pick a good question to answer. O'Connor mentioned Paris Hilton's choice of "What is the name of your pet?" Everyone knows that.

Then there are the oblivious choices, such as "What's your favorite city?" "If your user ID is CubsFan123," said O'Connor, "it's probably Chicago." Likewise, he said if your user ID is NYCgal576 then the answer to "Where did you go to high school?" is probably New York City. 

Editor's Note: Duh!  Ya think?  So, what can we do?  How about encrypting the data so that hackers just find random gobbledygook. "If they were properly encrypted, it would take until the sun burns out for anyone to decode it."

Read "two year old" article in full at CNET

Reblog this post [with Zemanta]

Over 70% Concerned About Mobile Security

Security still a concern for e-commerce in RP

Smart beefs up security in payment service
By Alexander Villafania -

MANILA, Philippines – Buying items online or through mobile phones is still a relatively low activity in the Philippines, even when there is gradual growth in Internet and mobile users.

At present, according to Nielsen Philippines, there are about 20 million Internet Users in the Philippines, mostly in urban areas. Another 70 million are mobile phone users.

While there is huge potential in both the online and mobile world,  fraud and identity theft remain to be barriers to growth of both e-commerce and m-commerce.

Even in countries such as the US, many people are still apprehensive to buy online much less use their mobile phones to make purchases.

A report by US-based ABI Research showed that over 70 percent of those interviewed about mobile transactions are still concerned about security

Continue Reading

From ABI Research:  Mobile Money Security

Challenges and Solutions The security of the mobile channel is perhaps the greatest impediment to the exponential growth of mobile money services worldwide. Consumer perception is that mobile is not safe for personal financial services.

All three mobile delivery options -- SMS, mobile Internet, and downloadable applications -- pose security risks. For mobile money services to fulfil their potential, mobile money service providers must find the proper balance of security and convenience for consumers. What are mobile money vendors and mobile money service providers doing to ensure security? This Brief details specific actions being taken today by leading mobile money service providers and vendors, and makes recommendations for specific actions that need to be taken to ensure security.

UAL's Interchange Pass Thru in For a Fight

Travel agents fighting United Air fee plan

Bloomberg News

Aug. 31 -- U.S. travel agents are asking Congress to prevent United Airlines from forcing some to pay credit-card processing fees on ticket purchases, saying it may raise costs for travel businesses and millions of customers.

United said in June it was making the change because of transaction expenses that have risen to several hundred million dollars annually. United had planned to begin levying the fees last month, and extended the start date by 60 days.

Some agents will have to absorb the costs when customers buy with Visa Inc., MasterCard Inc., American Express Co. and other cards. Ten states including California and New York bar agents from passing along to consumers the card surcharges, which are usually 2 percent to 3.5 percent of the purchase price, said Paul Ruden of the American Society of Travel Agents.

ASTA wrote to the Congressional sponsors of pending legislation to reauthorize the Federal Aviation Administration on the subject of so-called "back-to-gate" time limits for delayed passenger flights. In the letter, ASTA requested that Congress establish a clearly-defined time limit beyond which passengers who have been subjected to lengthy on-board tarmac delays must be permitted to return to the gate and exit the delayed aircraft. The legislation was reported out of a key Senate Committee last week, and is slated for a vote in both chambers of Congress later this fall.

ASTA wrote to the Congressional sponsors of pending legislation to reauthorize the Federal Aviation Administration on the subject of so-called "back-to-gate" time limits for delayed passenger flights. In the letter, ASTA requested that Congress establish a clearly-defined time limit beyond which passengers who have been subjected to lengthy on-board tarmac delays must be permitted to return to the gate and exit the delayed aircraft. The legislation was reported out of a key Senate Committee last week, and is slated for a vote in both chambers of Congress later this fall.

In the letter, ASTA said:

In the face of continuing delays and the evident lack of concrete efforts on the part of the airlines to create a meaningful solution thereto, and absent a robust reporting mechanism that would compel airlines and airports to report back to the Department of Transportation on their actual progress in implementing the recommendations in the Task Force's [National Task Force to Develop Model Contingency Plans to Deal with Lengthy Airline On-Board Ground Delays (Tarmac Delay Task Force)] final report, we see little hope for real progress in this area without further action from Congress. 

Therefore, we respectfully ask that you establish a clear standard for the airlines to follow. A Congressionally-defined standard will not in itself solve the inexorable problem of chronic flight delays, but it will surely represent an improvement over the current system, in which people are trapped on planes without adequate supplies for hours on end. 

On Nov. 12, 2008, the Tarmac Delay Task Force, on which ASTA held a seat, concluded nearly a year of debate about how to deal with inevitable major flight delays that strand passengers on aircraft for periods up to eight or even 10 hours. Among the Task Force's recommendations was that each airline be permitted to establish its own time limit at each airport for deplaning passengers who have been subjected to lengthy delays. In addition, the Task Force recommended that delayed passengers be provided with "regular and timely information" concerning the reason for such delays.

See full Letter to U.S. Congress

See full Letter to the U.S.Senate


ASTA's (American Society of Travel Agents) mission is to facilitate the business of selling travel through effective representation, shared knowledge and the enhancement of professionalism. ASTA seeks a retail travel marketplace that is profitable, growing and a rewarding place to work, invest and do business.

Reblog this post [with Zemanta]

44% Less Likely to Trust eCommerce Than Last Year

The shifting of consumer behavioral attitude towards a "more secure transaction" such as the one's provided by HomeATM's 2FA 3DES DUKPT E2EE  solution is gaining momentum.  In fact, 44% of consumers are less likely to trust a Web Merchant with their personal data than just one-year ago.  It's only a matter of time before "everyone" realizes that financial transactions must be conducted "outside the browser space." 

Here's a snippet from Network World:

Network World - Consumers are increasingly interested in doing business with companies they know and trust while avoiding the criminal elements that stalk the Internet.

In fact, 60% of online shoppers abandon their carts at some point during their shopping experience, mostly due to fear of identity theft (Sherpa Marketing Study, 2006), and almost half (44%) say they're less likely than they were just a year ago to trust a Web merchant with personal data (Yankee Group Study, 2008). As the climate of trust erodes, consumers are more sensitive than ever.

Continue Reading (Don't Be Insecure)

Reblog this post [with Zemanta]

Backlink Test

  1. Make Money Online | Money Blogging Tips

  2. HowHero

  3. Find Torrent Search Engine

  4. Indo Contest

  5. Mga Kwentong Ma Alamat

  6. Contest Love

  7. It Blood

  8. I Heart Contest

  9. Nurse Jen Doll

  10. Your Web and Graphics Design

  11. My Blog Contest

  12. Prize King Contest Blog

  13. Computer Collections

  14. Medan Blogger

  15. Eiffel Tower

  16. Programming the Life

  17. John Doro Dot Com

  18. Paco Contest

  19. Couch Surfing Host

  20. Erick's Blog

  21. My Life 4 Hire

  22. The Spirit of Blogging

  23. EmTNester

  24. Amori, poesi, arte, chat

  25. Great Wall of China

  26. The Painted Veil

  27. FeeFiFoto Blog

  28. I am Harriet

  29. Phoenix2Life

  30. Anurag Bhateja

  31. Online Treasure

  32. Gorilla Sushi

  33. London Eater

  34. News n' Tech Palace

  35. Sherry Rambling

  36. Blogging Tips and Tools

  37. Selbst Management

  38. Skip Ratt

  39. Eljon

  40. Heart Net

  41. Just 4 You

  42. Widgets For Free Blogger Widgets

  43. Bubble Crush

  44. GoGalavanting

  45. Mesothelioma Cancer Help

  46. How Things Do

  47. Hardware Rig

  48. Reality View

  49. Utah Web Design

  50. Hero Help Tutorials

  51. Nub Lag Teh Server

  52. Jobs Human Resources

  53. Naeem's Blog

  54. Facts For History

  55. Prasdikatama

  56. McPhee-Env

  57. PeriPheryPoem

  58. Writings of RYU

  59. Heart Net

  60. Cater Hater

  61. Tech Recipe

  62. Tech Boy UK

  63. Internet Leashed

  64. Tha Good Life Reviews

  65. Solaris Photography

  66. bSaves - Saving Energy Search Engine - Black Google

  67. Sitfu

  68. The All Rounder

  69. The Science of Getting Richer

  70. University Results

  71. Surigao Digital Services

  72. Senior BabyBoomers

  73. Gazlo

  74. Jessi & Ray Dream Life

  75. Life Around Raymond

  76. Susan Boyle

  77. Get Any Thing

  78. Exclusive Arena

  79. The Star Girl

  80. Tem Bolog

  81. Trash XP

  82. How Hero - How to Tutorials - Video Tutorials

  83. Blog Darma

  84. Money Central Online

  85. Watch Free Online Movies

  86. Zoom Your View

  87. Hey I Want a Job

  88. Dog Pet Grooming Supplies

  89. Aqualux Carpet Cleaning

  90. All about the Beautiful Game

  91. Communicate Your Emotions

  92. Vemma Kuantan

  93. Online Global Biz

  94. Home Affiliate

  95. News to Me

  96. Google Gadget Games

  97. High Point of the Day

  98. The Biggish

  99. Tech Feast

  100. Cake and Bread

  101. Home Cleaning Tips

  102. Fitness Excercise

  103. Funny N Cool Pix

  104. D Bucks

  105. Fow Furniture

  106. Dubious Ma

  107. Mami Bizi

  108. Fundo Geek

  109. Nijan Translator

  110. Core Worlds

  111. Dance Music Ireland

  112. A Blog for All

  113. Golf Swing Pro


  115. Top Money Making Websites

  116. Bunny Exclamation

  117. V2 Tricks

  118. Make Money Online - Comple Exercise

  119. Kits Kingdom

  120. Daily Blog

  121. Financial Planning with Chris Pua

  122. Work At Home

  123. Awesome Tech – A blog dedicated to Tech-News

  124. RohitComputers

  125. Superplaystationstore

  126. Joeedmund

  127. Yooray's Blog

  128. Feisublog - Anime blogs and Forums

  129. LUMIXiOUS


  131. Best on Tube

  132. Dubai Moves

  133. ViJeshKirodian

  134. Demystifying the East

  135. MyFundoo Blog

  136. Jobconstruction


  138. Cash Crate

  139. Bucks N Blogs

  140. OMG LaGigel

  141. Vintage Shirt | Vintage Jeans


  143. Hack A File

  144. PIN Payments Blog

See the original post where you can sign up at

Don’t forget to promote this article via social networking and word of mouth.. It only means better results for yourself and everyone on the list.

HomeATM Provides the "Inevitable" Solution Now

HomeATM: "Inevitably For Our Own Good"

Here's an excerpt from an article written by Rhodi Mardsen which unequivocally states the reality of what it takes to secure online banking and credit/debit card transactions conducted online.  It's the economy typing stupid! Don't Type: Swipe!

HomeATM encrypts the card details so that hackers only find "random gobblygook" and manufactures the "only device" designed for eCommerce to be PCI 2.x Certified.   We did it because "it's for your own good."  The shift towards everyone using a HomeATM to conduct secure transactions and online banking continues...

There is a worldwide standard (the PCI-DSS) that any companies dealing with cardholder information are obliged to sign up to, but many security experts have pointed out that it's possible to tick all the PCI's boxes and still be insecure. The offence allegedly committed by Gonzalez is as vivid an illustration of that as one can imagine.

For once, this lapse in online security has nothing to do with us, the general public. We're guilty of all manner of stupidity when it comes to our personal financial security – writing down PIN numbers on Post-it notes, using the word "password" as our password (or typing "anything" into online banking sites or merchant checkout) just because we are "instructed to.")  – but in this case there's nothing we could have done, save for withdrawing entirely from the 21st century and using cash instead.
So what should these companies be doing to protect us? Graham Cluley, (sounds like he has one...Clu that is) from internet security firm Sophos, has expressed his disbelief that our card details aren't encrypted when they're stored, so that hackers just find random gobbledygook. "If they were properly encrypted," he says, "it would take until the sun burns out for anyone to decode it."

Editor's Note:  HomeATM believes that they shouldn't even be stored.  This is why HomeATM instantaneously encrypts the card details (including the Track2 data).  By doing so the Internet Retailers (IR) never store it, in fact never even handle it. This provides three distinct benefits.  1.  It  keeps the data safe, 2.  instantaneously places the IR within the realm of  PCI compliance and 3. protects the IR from significant fines which would be levied against them by V/MC in the event of a breach.  Those are three pretty significant benefits...but first, we have to eliminate typing. 

But it's not just the companies storing our details that need to shape up. The 130 million stolen credit card numbers would be of no use to anyone if they couldn't be used to buy stuff. Any masterminds wouldn't have been the ones picking a card number and using it to buy soft furnishings on eBay; they'd sell the numbers on to other criminals in blocks of a few thousand. But eventually, someone would pretend to be you and use your money, because it's still disconcertingly easy to do.

Online shopping is a click-happy cinch, but with that convenience comes risk; if you can tap out your 16-digit number, expiry date and a supposed "secret" three-digit number on the back of your card to book a flight to the South of France, so can anyone else.
"We may balk at the idea of carrying around an additional device (of the kind Barclays customers now have to use for online banking) to enter our PIN every time we make a credit card purchase online, but when these kind of measures are inevitably introduced, we'll have to grin and bear it. It's for our own good, after all.
As for the likes of Alberto Gonzalez, they're talented individuals capable of writing sophisticated software that can detect weaknesses in even the strongest computer defences. Indeed, such characters frequently find themselves with job offers in the industry following their release from prison. But after a 35-year stretch, technology is likely to have marched on a bit too far for anyone to catch up. Marched on so far, one would hope, that our money would finally be safe from marauding cybercriminals. Fingers crossed.
Source: Independent

Reblog this post [with Zemanta]

Fraud Necessitates the Need to Track Consumer Credit Card Purchases

<p/> Credit-card companies track your purchases to make sure you and they aren't scammed

Sunday,  August 30, 2009 3:42 AM
Pat Kastner | Dispatch illustration

At noon, you use your credit card to pay for gas at a station in Columbus. An hour later, your card has been used to buy a $1,500 computer -- at a store in Moscow.

Before the charge is approved, a sophisticated computer-monitoring system thousands of miles away raises a red flag, denies the charge and keeps you from becoming the victim of a crime -- all in a matter of seconds.

Such technology used behind the scenes to thwart criminals has become the norm in the ever-evolving, techno-savvy and secretive world of credit- and debit-card security.  It's a world filled with sophisticated and well-organized bad guys determined to steal your identity and card information -- and equally determined card issuers and networks bent on stopping them.

The card industry includes financial institutions such as Huntington and JPMorgan Chase, which issue credit and debit cards that are serviced by electronic payment networks. The two biggest are Visa and MasterCard.  Discover and American Express also issue and service credit cards.

At stake in their combined fight against criminals is billions of dollars. Identity theft netted crooks about $48 billion in 2008 in the United States, a 16 percent increase over 2007, according to Javelin Stategy & Research.

Of this total, about $22 billion was realized from fraud connected to existing cards.

Most cardholders have zero liability for fraudulent activity, so the fraud is likely to cost them mainly time and inconvenience.   Editor's Note: So that balance between security and convenience is what again?...and whose convenience?  It seems to me that if $22 billion worth of fraud creates "monetary loss" and "time and inconvenience" for consumers, that we need to re-evaluate that balance.  Yes?  That's without considering the fact that consumer privacy is past-tense now that every purchase is "tracked."  Why not process (E2EE) transactions the "right" way instead?

Instead, the card industry and merchants are on the hook for all those billions, which is quite an incentive to limit their losses. The card industry doesn't like to discuss the details of how fraudulent card activity is monitored and detected.  "If they became public, they wouldn't be effective. It would only aid the fraudsters," said American Express spokeswoman Lisa Gonzalez.

Continue Reading at Columbus Dispatch

Australian Retailers Association Concerned with EftPOS Fees

ARA concerned at RBA review of interchange regulation > Inside Retailing

Eftpos interchange fees cannot be consistent with debit card fees according to the Australian Retailers Association.

The ARA and the Australian Payment Merchants Forum (AMPF) say they are concerned at a Reserve Bank of Australia proposal to subject Eftpos interchange fees to the same regulation as Visa and MasterCard's debit cards.

Chairman of the AMPF and ARA executive director, Russell Zimmerman, said interchange fees were typically paid by merchants to card issuers to fund the costs of cardholder benefits. But the RBA's suggestion would increase the cost of Eftpos transactions for all Australian retailers.

"Currently, Visa and MasterCard interchange fees are regulated to be an average of 12c per transaction but it's difficult to understand why card issuers should receive 12 cents for each Eftpos transaction.

"Debit cards are a mature product and the cost of processing transactions using Eftpos is minimal. In fact in New Zealand, whose banking market is dominated by the major Australian banks, debit card payments at retailers do not attract any interchange fee.

"Consumers, who use less costly payment instruments, including Eftpos cards, effectively subsidise consumers paying with more costly payment instruments like scheme-branded credit and debit cards. The RBA's latest proposal will price every debit card payment at the highest existing rate," Zimmerman said.

Continue Reading

Reblog this post [with Zemanta]

Brazil Suspends VisaNet's Exclusivity Ban

VisaNet Says Brazil Antitrust Agency Suspends Exclusivity Ban -

VisaNet Says Brazil Antitrust Agency Suspends Exclusivity Ban

By Laura Price

(Bloomberg) -- Cia. Brasileira de Meios de Pagamento, the credit-card payment processor known as VisaNet, said Brazil’s antitrust regulator suspended a ban on exclusivity imposed by the Justice Ministry.

SDE, as the antitrust arm of the Justice Ministry is known, started a probe against VisaNet, Visa International Service Association and Visa do Brasil Empreendimentos Ltda on Aug. 6. The antitrust unit said VisaNet created exclusivity by requiring businesses to use it to be able to accept cards carrying the Visa logo.

Cade, as the antitrust regulator is known, suspended the preventive measure taken earlier this month by SDE until Cade judges the case for possible anti-competitive practices, VisaNet said in a statement to Brazil’s securities regulator late yesterday. Cade is due to judge the case on Sept. 16, VisaNet said.

Reblog this post [with Zemanta]

Momentum Payment Systems Announces Mobile Payment Processing with New iPhone Application

Merchants of Momentum Payment Systems can now process credit and debit card transactions through its secure network by employing an iPhone, iPod Touch or T-Mobile G1 over Wifi or 3G wireless connections.

Addison, TX (PRWEB) August 31, 2009 -- Momentum Payment Systems,, a leader in the electronic payment processing industry, proudly announces the Momentum Payment Systems iPhone Mobile Application.

Small business merchants, independent contractors and mobile merchants now have the ability to utilize Momentum's payment processing solutions without the need for hardware processing equipment or a dedicated internet line.

The application is currently available through Momentum's sales team and is set up via a one-time installation process through a web browser. Upon installation the application icon is available on the home screen of the device for convenient future use.

With the application, merchants can type the card information into the phone and the credit and debit card transactions are processed as "card-not-present" or "offline-debit" payments.

Receipts can currently be emailed to the cardholder however future enhancement plans include the ability for the merchant to print a receipt instantly.

"We've always been dedicated to creating customized payment processing solutions to fit the needs of each business," said Vice President of Operations Robel Sebany. "We've always wanted to provide our merchants with access to a payment processing option as portable as their business and with the growing technological advancements of these mobile devices it is a great opportunity to reach that goal."

About Momentum Payment Systems

Momentum Payment Systems, LLC is a fast growing merchant acquirer that specializes in providing small and medium-sized businesses throughout the United States with comprehensive electronic transaction processing solutions. Momentum distributes and installs point-of-sale equipment and offers traditional credit and debit card processing services as well as processing for ATM cards, gift and loyalty cards, prepaid cards, EBT, checks and e-commerce solutions. Momentum also proudly offers 24 hour technical support.

For further information, please visit Momentum Payment Systems online at

Reblog this post [with Zemanta]

The State of CyberCrime -


and Search

The State of Cybercrime: Today's Real Cybercriminals

sponsored by TippingPoint

28 Aug 2009


The Internet is a rough neighborhood. How well is your organization
policing your part of the Internet? Online fraud is pervasive and those
that are behind online fraud are using sophisticated techniques to
target financial and personal information.

This videocast provides an
overview of current trends affecting organizations, what enables online
fraud, what are some of the barriers, and suggestions for what
organizations should do to combat the problem.

Key points of emphasis

  • How new threats and emerging trends in online fraud affect many organizations.

  • How to establish an effective Network Neighborhood Watch Program at your company.

  • How policy and globalization issues combat online fraud and steps you can take to protect your organization.

Speaker: Jerry Dixon

Director of Analysis, Team Cymru

Dixon is currently the director of analysis for Team Cymru, he also
serves as InfraGard's vice president for Government Relations. He is
the former executive director of the National Cyber Security Division
(NCSD) & US-CERT, of the Department of Homeland Security.

his time at Homeland, Dixon led the national effort to protect
America's cyber infrastructure and identify cyber threats.

Dixon also
served as the deputy director of operations for the U.S. Computer
Emergency Readiness Team (US-CERT).

Dixon was instrumental in creating
US-CERT, which serves America as the 24x7x365 cyber watch, warning, and
incident response center that protects the cyber infrastructure by
coordinating defense against and response to cyber attacks. He led the
initial development of US-CERT's capabilities for analyzing and
reducing cyber threats and vulnerabilities, disseminating cyber threat
warning information, and coordinating incident response activities
across federal, state, local government agencies, and private sector
organizations, making it Homeland Security's primary element of cyber
preparedness and response.



Fraud Protection | Internet Security | Network Security | Security Best Practices

View All Resources
sponsored by TippingPoint

Disqus for ePayment News