Remove Boston Remove Cards Remove Data Remove Technology
article thumbnail

Mobile Order-Ahead Sector Goes All-In On AI

PYMNTS

Smart move – but supervised machine learning is reliant on historical data, which means that by itself, this method might not catch the new or disguised attack types pouring in. It uses payment data, location data, unique customer data and digital identifiers to detect fraud in real time.

Mobile 289
article thumbnail

Deep Dive: Why Contactless Card-Not-Present Transactions Are Gaining New Momentum

PYMNTS

Customers are also looking for options like digital and card-not-present (CNP) transactions that allow them to make eCommerce purchases as smoothly and seamlessly as possible. . Safety Concerns Encourage Contactless Card Use . This technology has witnessed slow adoption in the U.S., One credit card network reported that U.S.

Cards 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Themes & Takeaways From the 2022 Real-Time Payments & Fraud Management Summit 

Perficient

Among its attendees were representatives from The Clearing House (TCH), The Federal Reserve Bank of Boston, and SWIFT, along with some of the largest financial institutions in the U.S. . These services are different from NACHA’s “Same Day ACH,” or Card Network solutions. Themes & Takeaways .

Fraud 275
article thumbnail

Federal Reserve’s Cunha on the State (and Timeframe) of Digital Dollars

PYMNTS

And there’ll be quite a bit of tinkering with the technology (especially the infrastructure) and the use cases to get there. Earlier this month, as PYMNTS noted , the Federal Reserve said its Boston bank is working with the Massachusetts Institute of Technology (MIT) to explore the possibility of issuing digital currency.

Boston 269
article thumbnail

Mastercard’s Threat Scan Helps Banks Detect Vulnerabilities

PYMNTS

As weaknesses in authorization systems can be exploited by online thieves, financial services firms are more vulnerable to hackers and get hit 300 times more often than other businesses, according to the Boston Consulting Group. Threat scan intuitively mimic fraudulent behavior and can be used in conjunction with tools already in place.

Boston 177
article thumbnail

In Hawaii, Streamlined Mass Transit In The (HOLO) Cards, Beyond The Paper Pass

PYMNTS

If the longest journey begins with a simple step, might the streamlined journey begin with a simple tap of the card? Late April saw the debut of the HOLO card, used for Oahu Transit, a project in which the cards are to be used across the system’s busses and a rail system being built out over the next several years. How bustling?

Hawaii 100
article thumbnail

How to Offset an Evaporating Data Center

Gonzobanker

Banks and credit unions that have lost the ability to differentiate with their own data centers can regain control with a strategic approach to outsourcing. . In the cloud” is common technology vendor-speak for ASP, service bureau, outsourcing, pay-per-click, and a variety of other delivery models. Cards are a perfect example.

Data 63