Data protection & recovery applications

Mobile payments News

  • July 20, 2017 20 Jul'17

    Australians ready for IoT and AI in e-payments

    Over a quarter of Aussies are now ready to use an internet-connected device, like a virtual assistant or connected fridge to make payments on their behalf, according to a new YouGov study ...

  • June 28, 2017 28 Jun'17

    Untangling the web of digital payments

    With a tech-savvy population and a smartphone penetration rate of 150%, Singapore’s adoption of digital payments is abysmal. Cash is still king in the city-state, especially in the heartlands where ...

  • June 22, 2017 22 Jun'17

    Nayana ransom payment a wake-up call for cyber hygiene

    When one is confronted by a criminal or terrorist demanding a ransom in exchange for a loved one who has been held hostage, the general rule of thumb is not to pay up and go to the police. That’s ...

  • May 09, 2017 09 May'17

    HCI updates bring cloud-style pricing to the on-premises data center

    Enterprise IT teams can now buy data center hardware based on just what they use, rather than receive the one big bill that has long been a cornerstone of on-prem purchases.

View All News

Mobile payments Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Mobile payments Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Mobile payments

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Mobile payments Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • How can a distributed guessing attack obtain payment card data?

    Attackers can gather payment card data by carrying out distributed guessing with a minimal amount of existing information. Expert Michael Cobb explains how this attack works. Continue Reading

  • SWIFT network communications: How can bank security be improved?

    The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading

  • Balancing user experience and mobile data security

    Creating a powerful user experience (UX) is the holy grail of mobile app development, according to SearchCIO columnist and former CIO Harvey Koeppel. But the journey there is fraught with obstacles, including managing and designing apps that appropriately handle data risks, multiple device and operating system constraints, environmental considerations, and legacy system constraints. The undoing of many journeys is a result of failing to balance UX with the "granddaddy" of all these obstacles: mobile data security risks.

    In this SearchCIO handbook, Koeppel gives an account of his own journey to harmonizing user experience and mobile data security, and offers 13 CIO pointers to help ensure your quest is a success. In our second piece, CTO Niel Nickolaisen advises IT leaders on how to take a balanced approach to mobile app development. Lastly, Senior News Writer Nicole Laskowski runs down seven UX design tips for a winning mobile app. Continue Reading

View All Problem Solve