Thursday, August 6, 2009

TSYS Class A Approves Several VeriFone Solutions


TSYS Class A approves several VeriFone solutions

San Jose, Calif., Aug. 6, 2009 -- TSYS Acquiring Solutions has Class A approved several wireless connectivity models of VeriFone's Vx Solutions product family. These new GPRS Class A approvals follow the July 16th announcement of VeriFone Vx WiFi and Ethernet products.

The wireless models newly approved by TSYS for Class A support and training are the:
  • Vx 510 GPRS
  • Vx 610 GPRS
  • Vx 670 GPRS - Pictured on Right

These Class A approvals provide TSYS acquiring clients with a full range of traditional countertop, WiFi and wireless products and bring VeriFone's total class A processor approvals in North America for the Vx Family to over fifteen.

VeriFone's Vx Solutions deliver a complete portfolio of solutions across all vertical markets. Based on the Verix platform, Vx Solutions provide a common user interface across multiple form factors as well as consistent software, PA DSS accepted applications, and support, resulting in lower cost of ownership.

About TSYS Acquiring Solutions

TSYS Acquiring Solutions is the pre-eminent supplier of acquiring solutions, related systems and integrated support services to the acquiring industry and its customers. TSYS Acquiring Solutions delivers comprehensive solutions and support that securely and reliably process billions of credit and debit transactions every year. From authorization and capture services to the clearing and settling of merchant transactions, critical customer support functions and information management services, TSYS Acquiring Solutions helps acquirers effectively manage and grow their merchant portfolios. TSYS Acquiring Solutions is a wholly owned TSYSR (NYSE: TSS) subsidiary.

About VeriFone Holdings, Inc. (www.verifone.com ) VeriFone Holdings, Inc. ("VeriFone") (NYSE: PAY) is the global leader in secure electronic payment solutions. VeriFone provides expertise, solutions and services that add value to the point of sale with merchant-operated, consumer-facing and self-service payment systems for the financial, retail, hospitality, petroleum, government and healthcare vertical markets. VeriFone solutions are designed to meet the needs of merchants, processors and acquirers in developed and emerging economies worldwide.



Source: Company press release.


Reblog this post [with Zemanta]

Twitter Hit by DoS Attack


The Wall Street Journal's Jerry Dicolo reports that Twitter Says it was Hit By 'Denial of Service' Attack

Twitter Inc. said it's fighting off a coordinated Web attack that has made its popular microblogging site inaccessible for several hours Thursday morning.

"We are defending against a denial-of-service attack, and will update status again shortly," the company said in a blog post shortly before 11 a.m. EDT, Thursday.
In an update to the blog post, Twitter said its site is back online, but that the company is "continuing to defend against and recover from this attack." Not surprisingly, posts related to the cyber attack have soared to the top of Twitter's most popular topics queue now that the site is back online.
Social-networking giant Facebook Inc. also had network issues this morning, with some users reporting that certain features have been slow or not working.
Facebook said no user data was at risk and that the problems are now mostly resolved. The site is still monitoring the situation.
Denial-of-service attacks are a common weapon employed by cyber criminals to disrupt the working of Web sites. Perpetrators enlist millions of computers to attempt to access a particular site. The site cannot handle the massive increase in traffic, and is rendered inaccessible.

Continue Reading at WSJ



Reblog this post [with Zemanta]

There's Encryption, and Then There's the iPhone 3GS


The day I saw the Apple commercial depicting an individual entering their credit card number into an iPhone I cringed. 

Of course I do the same thing every time I think about someone "typing" their numbers into a box on a website.

Last Friday ago in a post entitled: "In Two Weeks Your iPhone Will Be Hacked"  I talked about the threats exposed at the Black Hat Conference in Las Vegas.  Now I read that the iPhone 3GS is tantamount to writing your credit card number on a post it note and hanging it on your computer screen.  (which is essentially the same thing as typing it into a box on a website...

All I can do is continue to repeat our mantra: "Don't Type...Swipe!  (and remind you that you can't say I didn't didn't tell you so!)

(Excerpts Taken From ZDNET and Wired)


"Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.  “It is kind of like storing all your secret messages right next tothe secret decoder ring,” said Jonathan Zdziarski, an iPhone developerand a hacker who teaches forensics courseson recovering data from iPhones. “I don’t think any of us [developers]have ever seen encryption implemented so poorly before, which is whyit’s hard to describe why it’s such a big threat to security.”

"The encryption functionality of the iPhone 3GS is so easy to crack that it is essentially "broken" when it comes to protecting sensitive personal data such as credit card numbers, according to a forensics expert and iPhone developer."

"I don't think any of us [developers] have ever seen encryption implemented so poorly before, which is why it's hard to describe why it's such a big threat to security," Jonathan Zdziarski told Wired.

With physical access to an iPhone 3GS and some free software, data can be extracted within two minutes and an image of the entire raw disk in about 45 minutes, he said. The iPhone decrypts the data on its own once the extraction has begun, Zdziarski explained in a video demonstration.

Zdziarski added that there are other weaknesses with the iPhone: Pressing the Home button, and even zooming in on a screen, automatically creates a screenshottemporarily stored in the iPhone’s memory, which can be accessed later.

And then there’s the keyboard cache: key strokes logged in a file onthe phone, which can contain information such as credit card numbers orconfidential messages typed in Safari. Cached keyboard text can berecovered from a device dating back a year or more, Zdziarski said.
Apple has been touting the encryption and other features to entice corporate users to the device. Nearly 20 percent of Fortune 100 companies have purchased 10,000 or more iPhones per company, the company said on its financial results conference call on Tuesday."

Disqus for ePayment News