Tuesday, September 29, 2009

URLZone and the News



URLZone Hits Google Search Engine Optimization and Frankly, I thought that since this is Online Banking is Weak Week on the PIN Payments News Blog, it would be a good idea to feature the results. 



Back tomorrow morning!










  • News results for URLZone



    'URLzone' Botnet Steals Your Money, Carefully‎ - 5 hours ago

    The new trojan they describe is named URLZone, a botnet of about 6000 systems when they examined it. Not only does it conduct bank transactions on the ...PC Magazine -80 related articles »





    Microsoft Internet Explorer About: URL Zone Spoofing Vulnerability
     Microsoft Internet Explorer About: URL Zone Spoofing Vulnerability.


    www.juniper.net/security/auto/vulnerabilities/vuln3670.html - Cached - Similar -



    URLZone
    touted as most sophisticated banking trojan yet - SC ...
    Sep 30, 2009
    ... The trojan, not only retrieves banking credentials but also steals money from compromised accounts.


    www.scmagazineus.com/URLZone-touted.../151096/ - 7 hours ago - Similar -



    Widgetbox › More On the URLZone Online Banking Trojan- PIN Payments News Blog by HomeATMSep 30, 2009 ...www.widgetbox.com/network/...urlzone.../1914546 - 5 hours ago - Similar - New Trojan Evades Banks' Anti-Fraud Systems - DarkReading New Trojan Evades Banks' Anti-Fraud Syste.




    URLZone
    , A Newly Discovered Banking Trojan Rewrites History! | PIN
    Payment News Blog...  Sep 30, 2009
    ...URLZone, a NEW Banking Trojan. You know what IT does? It steals the user's online bank account log-in information, accesses your Introducing ...


    pindebit.blogspot.com/.../urlzone-newly-discovered-banking-trojan.html - 8 hours ago - Similar -





















  • Reblog this post [with Zemanta]

    Bank of America Gives Away $25 to Pay Bills Online

    A special limited time offer.





    Paying Bills online is easy—and so is getting your $25.





    With this special offer, it’s the perfect time to start enjoying the ease and convenience of paying bills online. Just enter your information below and click the “Submit” button. Then sign-in to Online Banking, click “Bill Pay” and pay two bills. It’s really that easy.





    What type of account do you have?









    Your Last Name






    Last 4 digits of your checking account number (Where can I find my account number?)





    Zip code

    (as shown on your checking account)





    Email Address *



















    Bill Pay it's free. It's secure. It's really that easy.





    Not a Bank of America checking customer?

    Open a new checking account

    Questions? Contact Us

    ¿Preguntas? Contáctenos





    Reblog this post [with Zemanta]

    Avivah Litan: Nothing that Goes Through the Browser Can Be Relied Upon!



    Today, (ironically and thankfully!) Bank Technology News came out with an article on the same subject.  I'm tickled, because there's a quote from Avivah Litan, distinguished analyst and VP at Gartner Research that is as powerful as they come.



    "Nothing that Goes Through the Browser Can Be Relied Upon!" 
    In yesterday's post, I played the part of the judge and found that Citizen's should be held liable.  (see below)  Based on what I am reading into this article...it looks like I'm not the only one who thinks they will be...



    Here's the story from BTN along with some of my (maybe sardonic/maybe right on) viewpoints (in blue) mixed in between. Is the Genie Out? - Bank Technology News Article




    Bank Technology News | October 2009
    By Rebecca Sausner


    In February 2007, a fraudster armed solely with Indiana residents' Marsha and Michael Shames-Yeakel's username and password was able to gain online access to their Citizens Financial Bank home equity line of credit, and proceeded to steal $26k - wiring it first to Hawaii, then to Austria. Chicago-based Citizens opted not to cover the loss on the grounds that Reg. E doesn't cover credit accounts like HELOCs, and that Reg. Z wouldn't apply because the couple had linked their small business account to the HELOC for payments and made some business purchases with it.

    When the Shames-Yeakel's refused to repay the stolen funds, the bank played hardball, reporting the delinquency to national credit bureaus and allegedly threatening to foreclose on the couple's homeEditor's Note:  Nice!...talk about NOT being a good "citizen!"  The move will bite them in the butt!   This being America, before long the Shames-Yeakel's became "plaintiffs," first appealing to the Office of Thrift Supervision (which sided with the bank) and eventually suing in district court, saying the bank's security practices were negligent.

    By now Citizens Financial, and the rest of the industry, may be wishing they'd just let the $26k slide. 






    Hindsight always is 20:20 isn't it?  Time to

    Envision Foresight...it's 20:15




    In late August, an Illinois district court judge denied the bank's motion to dismiss the case, noting, "In light of Citizen's apparent delay in complying with FFIEC security standards, a reasonable finder of facts could conclude that the bank breached its duty to protect the Plaintiff's account against fraudulent access."


    Two years later, you'd be hard pressed to find a bank just using username and password to secure online accounts. But this case has the potential to be much bigger than the just the rudimentary security and $26k at issue. The court's precedent-setting ruling opens the door to the possibility that the bank will be held liable for the loss because it hadn't kept up with security guidelines or industry best practices, despite the banking regulations that seem to protect banks from liability on business accounts. This could be a massively expensive proposition given that just about everyone agrees that even the multi-factor authentication called for in the FFIEC guidance can't protect business accounts, and fraud against businesses is exploding. *Yeah...I said that yesterday in my mock ruling of the case





    Or, as Gartner VP Avivah Litan puts it, "Nothing that goes through the browser can be relied upon. The man-in-the-browser attacks that are going on against these corporate cash management applications are all circumventing one-time password," she says.



    Litan's certainly not the only industry analyst who thinks so. "I would go as far as to say that multi-factor authentication as defined under FFIEC, isn't sufficient to meet the environment we're in," says Tom Wills, analyst at Javelin Strategy & Research.



    This from yesterday's post: "For most banks, the bar for what is considered reasonable for online banking authentication was set by a 2005 document issued by the Federal Financial Institutions Examination Council...



    2005? LOL!

    That's analagous to 100 years ago in terms to the progress made by hackers since then.

    Heck, online banking malware has INCREASED BY FOUR-THOUSAND-NINE-HUNDRED AND NINETY-FIVE PERCENT(4995%) SINCE 2007!   In 2005 there were ZERO...now there are arguments about which of the 3 password stealing trojans (Conficker, Clampi and Zeus) are most dangerous.  Look at the chart (above left/click to enlarge) to get an idea of what has transpired with "vulnerabilities" since 2005 when the FFIEC last considered what was "reasonable." 


    ...which concluded that banks should employ what's called "multi-factor authentication," which involves requiring the customer to log in with a user name and password (that's bad) "in combination" with some other form of authentication, such as a single-use password or code generated by a token the customer has in his or her possession, or a special code sent via text message to the customer's mobile phone.



    Say again? "requiring the customer to log in with a user name password" along with another form of authentication.  Well, we all should know by now that "username's and password's" are a joke.  My question is "How do those two items even "factor in" as part of the "multi-factor" equation?  The "fact" that the first "two are absolutely 100% useless" throws more weight on the voracity of the next form of authentication.  (let me guess...what's the first letter of the month you were born)  If I was the worlds dumbest hacker (without keylogging and without visiting social networking sites) I could still gain a 1 in 4 chance in getting it right by guessing "J."



    My point is...another "password" is useless, including the once heralded "One-Time Passwords" because they can be keylogged in real time. (and for all we know,  they can be Trojanned in real  time as well)   The fact remains, and there is a preponderance of empirical evidence proving that "anything" done to protect a user in a web browser is absolutely useless.



    or...as Gartner VP Avivah Litan put it, "Nothing that goes through the browser can be relied upon.



    Based on the evolution of hacking combined with the fact that the FFIEC hasn't "REVISITED" their document SINCE 2005, I don't see how that business can be held liable.  2005?  C'mon, as I stated, that was 100 years ago compared to the progress hackers have made with Trojans such as Clampi, Zeus and a host (pun intended) of other ways to obtain online banking credentials.  (see graphic above and tell me you aren't cringe-ing)



    If I'm the attorney, the graphic above is "Exhibit A".  Do I even need to produce "Exhibit B"? 
    If I'm Judge Johnny and I can B. Frank, I find for the plaintiff... $588,000 plus interest, plus attorneys fees, responsibility to report and clear up their standing with all the credit bureaus,  plus $100k in damages for putting this poor couple through the ringer.  (Notice how I kept it low because I realize that "the real damages" are going to be the loss of customers endured by banks who continue to put their customers into a position where their card information is swiped by the bad guys instead of by the consumers themselves...



    Back to BTN's article where I left off: "I would go as far as to say that multi-factor authentication as defined under FFIEC, isn't sufficient to meet the environment we're in," says Tom Wills, analyst at Javelin Strategy & Research.



    That's not what banks want to hear. Those that can't afford to upgrade security are wondering what kind of software corporate customers can install on the user end.



    Editor's Note:  LOL! Software?  Did they just read their own article?  We don't need no stinkin' software!  :-) Even that software guy on the left must realize that the solution is HARDWARE.  As IBM said in their recent report, no website is safe and financial transactions need to be done with a separate machine than what is used for browsing. 



    But if the Shames-Yeakel case goes in the plaintiff's favor, it could force banks to do more to secure under-protected business banking accounts.  (Editor's Note: I've got the perfect solution for you!) "Businesses won't put resources into security until they've been hit, or they're regulated into it," Wills says. 



    Editor's Note: Well, that would not only be a bad idea ...it could be a potentially very expensive mistake.  Let me throw a cliche to you as a life-preserver.  "An Ounce of Prevention is worth a TON of cure" There's a better way.  It's called the No-Brainer Solution...you can shorten it to No-BS if you like.  Remember, your chances of keeping card holder data out of the hands of the bad guys is "SLIM" and "NONE"





    If Hindsight is 20/20, FORESIGHT is 20/15!





















    Reblog this post [with Zemanta]

    Password, Username Stealing Malware Volume Jumps 400%













    Malware such as Clampi and Sinowal that steal passwords and authentication credentials are becoming far more common and dangerous. They are increasingly more adept at avoiding detection by conventional security measures and more able to defeat security precautions to prevent data theft. This threat will require all organizations with sensitive data to think beyond antivirus and firewalls.
      *Hardware!



    Clampi, the Trojan that Secure Channel wrote about yesterday, is a fine example of why we’ll never see another Code Red, Nimda or LoveLetter virus again. The intent of malware is no longer to cause mass service disruptions, but rather to steal as much information as possible without getting detected.





    Trojans, worms, viruses and rootkits the likes of Clampi, Sinowal and StealthMBR are now the masters of the malicious code.





    McAfee’s Avert Labs released a new report that shows the volume of

    username password-stealing and keystroke logging

    malware jumped nearly 400 percent between 2007 and 2008.






    McAfee’s prediction: the trend will continue to expand in both volume and scope. This trend will force organizations handling even routine data to think beyond conventional antivirus applications and perimeter firewalls for their security



    Yeah...here's the no-brainer directly from the think tank: "Financial transactions need to be done outside the browser"  As Avivah Litan, distinguished analyst from Gartner so eloquently put it:  



    "Nothing that goes through the browser can be relied upon."
    The man-in-the-browser attacks that are going on against these corporate cash management applications are all circumventing one-time password," she says.




     

    Continue Reading at Channel Insider


    Reblog this post [with Zemanta]

    Consumers Fearful About Online Banking Risks



    Consumers 'still concerned about online banking risks'

    - Sep 29 2009, 08:20 AM


    Consumers still have concerns over the security of online banking, an expert has asserted. Editor's Note:  But expertly tries to "calm their fears" by "falsely asserting" they can protect themselves by installing anti-virus software on their PC.  Oh Contra ire! Mr. "Expert"...

    Jacques Erasmus, director of malware research at Prevx, a security solutions provider, said he is regularly asked by internet users whether it is a safe option for them.  "The simple answer to these questions is 'yes', in terms of convenience and ease-of-use, you should use these services and I personally do." However, he stressed the need to "stay secure" while using such services.




    Mr. Erasmus added that consumers looking to protect themselves against identity fraud and other risks should ensure they install anti-virus software on their PC and take a layered approach to security. By making full use of anti-malware products, internet users will be able to detect new and emerging threats promptly, he concluded.





    Oh really?  That's not the information I got.  According to the information provided below from Trusteer, Clampi and Zeus can bypass anti-virus programs 77% of the time... Here you go Mr. Erasmus... 

    "There is an online banking Trojan out there that is bypassing up-to-date anti-virus programs as much as 77% of the time, according to security company Trusteer."



    The Zeus Trojan is also known as Zbot, WSNPOEM, NTOS and PRG. It is the most prevalent financial malware on the web, Trusteer says. (Editor's Note:  Others say it's Clampi


    According to Trusteer: "When we set out to measure the efficiency of anti-virus products in the wild against Zeus, we had no idea what kind of results we would get," said Amit Klein, CTO of Trusteer and head of the company’s research organization.



    "The findings, that up-to-date anti-virus programs were only effective at blocking Zeus infections 23 percent of the time, are disturbing.

    This is bad news for consumers and banks, since the vast majority of Zeus infections are going unnoticed."

    About Zeus



    Zeus is a financial malware. It infects consumer PCs, waits for them to type their username and passworrd when they log onto a list of targeted banks and financial institutions, and then steals their credentials and sends them to a remote server in in real time.   Yes..."real time" meaning OTP's (one-time-passcodes) are even problematic as the bad guys get them the same time you do and can log-in and cash out.



    Additionally, it may inject HTML into the pages rendered by the browser, so that its own content is displayed together (or instead of) the genuine pages from the bank’s web server. Thus, it is able to ask the user to divulge more personal information, such as payment card number and PIN, one time passwords and TANs, etc. 
    Translation: Zeus can modify web pages from the genuine bank's servers in the user's browser.  Of course,  if you didn't type it...they couldn't swipe it!  



    Oh...and if you are adamant about making sure you stay up to date with the latest Anti-Virus Software, take a graphic look at how much that helps! (above right)













    Full report is here (PDF)


    Reblog this post [with Zemanta]

    Clampi strikes again: $350k stolen from Chicago-area school district

    The Clampi virus, a sophisticated piece of malware that targets sensitive financial data, is thought to be responsible for the loss of $350,000 from the accounts of Crystal Lake elementary school district 47.



    This apparent attack, the latest in a series of incidents targeting public school bank accounts, was perpetrated sometime before June 29th, when a district employee noticed the losses. The FBI has since confirmed that Crystal Lake district 47 is one of three Chicago-area school districts targeted, along with Sycamore district 427 and one district that was not identified.



    The FBI has further confirmed that the three incidents are now part of a nation-wide investigation into Clampi, which is believed to be responsible for the theft of millions of dollars from banks and mid-sized businesses. Clampi's recent shift toward the targeting of school accounts is the latest in a long string of cyber crimes.



    The Clampi virus is unusual among computer Trojans in that it can propagate itself across local networks automatically. It also uses several advanced techniques to conceal itself from anti-virus scanners and removal programs.ADNFCR-1765-ID-19382456-ADNFCR

    Free Webinar - Microsoft Research on Trust and the Consumer

    BAI Mavericks in Banking






    BAI Mavericks in Banking



    Only days left to register for this COMPLIMENTARY event.

    Hear new research from Microsoft on the impact of trust, transparency, image and relevancy on your customer segments, and join a panel of experts as they share their thoughts and insights into what these results might mean for your organization.

    Trust and the Consumer – What you Need to Know to Win in the New Reality!

    Wednesday, September 30, 2009

    1:00 p.m. – 2:00 p.m. CDT


    BAI Member: COMPLIMENTARY!

    Non-member: COMPLIMENTARY!


    You will learn:

    • The underlying issues of trust from the consumer perspective

    • Strategies for improving trust and transparency within your organization

    • Attitudes and preferences of specific market segments, specifically millennial and baby boomers 

    Register now.





    Don’t miss this complimentary event!

    With trust and branding – one size does not fit all – see key differences within the segments and what to do about it — register now!




    This complimentary webcast is presented by:

     







    Your panel:

    Rick Otero

    Executive Vice President, Marketing & Services

    Capital One


    Steven SaLoutos

    Executive Vice President, Metropolitan Banking—Midwest Markets

    U.S. Bank NA




    Dave Norton, PhD

    Principal,

    Stone Mantel


    Moderator:

    Warren Lewis

    Marketing Director – Financial Services

    Microsoft Corporation










    BAI





    This e-mail was sent by: BAI

    Prepaid Card Holdings Announces Trademark Approval for Card Now





    Las Vegas, Sept. 28, 2009 -- Prepaid Card Holdings, Inc. (Pink Sheets:PPDC) announced yesterday its wholly owned subsidiary was granted trademark approval for Card Now® and CardNow® from the United States Patent and Trademark Office. Card Now® and CardNow® are hosted at www.CardNow.com and www.CardNow.biz .



    Prepaid Card Holdings, Inc. CEO and Founder Bruce Berman stated, “We have quietly been purchasing keyword targeted internet real estate / domain names in the prepaid debit card space for almost two years now. www.CardNow.com is an eleven year old seasoned domain name that we purchased in September 2008 from an unrelated third party. www.CardNow.com is a seasoned domain name that will achieve high rankings in organic internet search listings thus creating free keyword targeted internet traffic.”



    The international class 36 trademarks were registered in connection of the following services. Debit card and credit card services, namely issuing debit cards and credit cards, debit card and credit card payment and transaction processing services, debit card and credit card verification, providing electronic processing of debit card and credit card transactions and electronic payments via a global computer network, providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments, providing financial risk management services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network.



    About Prepaid Card Holdings, Inc.



    Prepaid Card Holdings, Inc. through a wholly owned subsidiary offers emerging prepaid card solutions that can act as an alternative to a traditional checking account and debit card. For more Information visit www.PrepaidCardHoldings.com Source: Company press release
    Reblog this post [with Zemanta]

    CCE Index Released by Visa





    San Francisco, Sept. 28, 2009 -PIN Payments News- Visa Inc. (NYSE: V) today released the annual global Commercial Consumption Expenditure (CCE) index, which estimates that global commercial spending grew to $90.2 trillion and U.S. spending rose to $20.3 trillion in 2008. The annual Visa CCE report provides standardized tracking of business and government spending globally and is recognized as an industry benchmark for measuring commercial spending.



    The 2008 global CCE is estimated to have grown at 10.9 percent from $81.3 trillion in 2007. The strongest growth rates were found in the Central/Eastern Europe, Middle East and Africa region at 23.7 percent and the Latin America/Caribbean region at 17.4 percent. Europe held the largest share of global CCE spend, followed by Asia Pacific; the United States; Central/Eastern Europe, Middle East and Africa; Latin America/Caribbean and Canada. In this year’s index, Asia Pacific’s spending share surpassed the United States’ for the first time.



    “As financial institutions around the world look to optimize their commercial payment programs, the CCE data provides a valuable tool to help show where businesses and government are spending,” said Darren Parslow, Head of Global Commercial Products, Visa Inc. “Visa is committed to ongoing innovation in commercial payment products, and we watch the CCE index carefully as it provides insight into how Visa payments products and services can continue to meet commercial payment needs.”



    CCE Methodology



    The CCE index captures business-to-business purchases to acquire goods and services used in production, wholesale and retail purchases of final goods, business capital expenditures and government spending on goods and services. Adjustments are made to exclude capitalized expenditures such as construction and durable defense spending. Calculations measure transactions at basic prices which include taxes on production. Retroactive adjustments are made as necessary to include revisions in officially published statistics and economic data for current and prior years.



    Data sources used to calculate the U.S. CCE index include the Bureau of Economic Analysis (BEA) and U.S. Census Bureau, which conducts the Retail and Wholesale Trade Surveys. A variety of data sources were used in the calculation of the Global CCE index including the Organization for Economic Co-operation and Development (OECD), the Eurostat database, the STructural ANalysis (STAN) database, the General Government Accounts from the National Accounts of OECD Countries, the United Nations Statistics Division National Accounts Main Aggregates Database, Economist Intelligence Unit proprietary databases and government data from several countries. A model developed by the Economist Intelligence Unit was used to estimate results for countries where government data was unavailable.



    About Visa Inc.: Visa Inc. operates the world’s largest retail electronic payments network providing processing services and payment product platforms. This includes consumer credit, debit, prepaid and commercial payments, which are offered under the Visa, Visa Electron, Interlink and PLUS brands. Visa enjoys unsurpassed acceptance around the world, and Visa/PLUS is one of the world’s largest global ATM networks, offering cash access in local currency in more than 170 countries. For more information, visit www.corporate.visa.com .


    Source: Company press release.


    Reblog this post [with Zemanta]

    Elavon Acquires Citibank's Diners Club Portfolio





    Atlanta & London, Sept. 28, 2009 -- Elavon, a wholly-owned subsidiary of U.S. Bancorp (NYSE: USB) and a leading global payments provider, has acquired Citibank’s Diners Club Card merchant-location portfolio in Western Europe, representing more than 75,000 merchants.



    A further agreement signed with Diners Club International® Ltd., a business unit of Discover (NYSE: DFS), will add Diners Club card acceptance to Elavon’s portfolio of payment processing services. Elavon will perform processing, funding and customer support for merchants that accept Diners Club International cards in the UK, Ireland, France, Benelux, Switzerland and Germany. Merchants will have the option to consolidate their payments acceptance by utilizing Elavon as a single-source provider for other credit and debit card transactions, eliminating the need for merchants to maintain separate processing relationships.



    “We look forward to extending Elavon’s robust and secure international processing platform and outstanding customer service to the many Diners Club accepting merchants across Europe,” said Stuart C. Harvey, Jr., CEO of Elavon. “Adding Diners Club processing capabilities further underscores our value proposition as one reliable source for merchants.”



    Diners Club and Discover processing will be included as part of Elavon’s new merchant program offering, creating more acceptance opportunities for card members, especially at small- and mid-size business locations.



    About Elavon: Elavon's Global Acquiring Solutions organization is a part of U.S. Bancorp. Elavon provides end-to-end payment processing services to more than one million merchants in the United States, Europe, Canada and Puerto Rico. Solutions include credit and debit card processing, electronic check services, gift cards, dynamic currency conversion, multi-currency support, and cross-border acquiring. Elavon's services are marketed through multiple alliance partner channels including financial institutions, trade associations and ISOs. Elavon has solutions to meet the needs of merchants in specialized markets including small business, retail, hospitality/T&E, health care, education and the public sector. Visit Elavon online at www.elavon.com .



    Source: Company press release.

    Alaska Option Joins Acculynk Internet PIN Debit Pilot



    Sixth EFT network to offer PaySecure to member financial institutions



    ANCHORAGE, Alaska--(BUSINESS WIRE)--Alaska Option, a full-service EFT network offering ATM and POS transaction switching and settlement services to financial institutions and financial service providers nationwide, has joined Acculynk’s pilot of PaySecureTM, the first software-only service for PIN debit payments on the Internet. The partnership with Alaska Option will bring PaySecure to nearly 900,000 Alaska Option cardholders all over the U.S.



    “PaySecure provides our financial institutions the opportunity to offer cardholders a new product for online purchases that is secure and convenient,” said Linda Moneymaker, Senior Vice President and General Manager of Alaska Option. “Our financial institutions are always seeking new, innovative payment products that consumers will adopt, and which will increase customer loyalty.”



    When a consumer checks out at a participating PaySecure merchant with a debit card, PaySecure’s graphical PIN-pad will appear for the option of PIN entry if the card can be used with a PIN and it is in Acculynk’s network of participating issuers. The consumer enters their PIN or they can click Cancel to process the transaction as credit.



    “PaySecure gives U.S. consumers a choice to use their debit card with a PIN or run the transaction as credit, just like at the retail point of sale,” said Ashish Bahl, CEO of Acculynk. “By offering PaySecure, FIs are communicating to customers that they value choice.”



    Alaska Option joins ACCEL/Exchange, Credit Union 24, NYCE, PULSE and SHAZAM as EFT networks that have publicly announced a partnership with Acculynk for PaySecure. “We are excited about the partnership with Alaska Option because their FIs have a strong presence in regions that fit very well with our participating merchants, and merchants that are coming live in the next few months,” said Bahl. “Alaska Option is very relevant to our overall EFT network strategy, and we are pleased that they have joined the pilot.”



    About Alaska Option

    Alaska Option is a full-service EFT network offering automated teller machine (ATM) and point-of-sale (POS) transaction switching and settlement services to financial institutions throughout the US to include Alaska and Hawaii.



    Alaska Option’s connectivity to financial service providers and other EFT networks make it possible for consumers to access a growing number of ATM and POS terminal locations nationwide to withdraw cash, transfer funds and make purchases using an Alaska Option debit card. Alaska Option also offers a full range of processing services such as ATM driving, card personalization and card management.



    About Acculynk

    Acculynk secures online transactions with a suite of software-only services that are backed by a powerful encryption and authentication framework protected by a family of issued and pending patents. Acculynk’s services provide greater security, reliability, convenience and return on investment for consumers, merchants, networks, issuers and acquirers. For more information, visit http://www.acculynk.com

    Reblog this post [with Zemanta]

    Disqus for ePayment News