The Entersekt Blog

Industry news, security threats, and technology advances in consumer authentication.

EMV 3-D Secure: its gamechanger is no child’s play
15-08-2019|Jennifer Singh

EMV 3-D Secure: its gamechanger is no child’s play

Much has been written, tweeted and blogged about 3-D Secure, so by now we should all know that it’s a protocol for securely authenticating a consumer during card-not-present (CNP) e-commerce transactions. Additionally, it better protects the consumer, issuer and merchant from CNP fraud.
EMV 3-D Secure pushes the cost of fraud back onto the fraudster
23-07-2019|Steve Bledsoe

EMV 3-D Secure pushes the cost of fraud back onto the fraudster

In the US market, the consumer is always right, and in the never-ending quest for higher profits and brand loyalty, a merchant will do almost anything to earn a consumer’s repeat business.
It’s like your credit card, only better
07-03-2019|Gerhard Oosthuizen

It’s like your credit card, only better

In the “old days” – the days of magnetic stripe cards – we proved that we were the owners of our cards with a handwritten signature at the point of sale (POS). Then came the chip cards, for which we switched to using a PIN number in card-present situations to authenticate ourselves as the card owner.
Ringing the changes with 3-D Secure
14-08-2018|Lelanie de Roubaix

Ringing the changes with 3-D Secure

In many ways, the evolution of the card networks’ 3-D Secure protocol is a reflection of how the world of e-commerce has changed. As with any process of change, growing pains are inevitable; in the case of 3-D Secure, they’ve been there right from the start. The imminent introduction of 3-D Secure 2.0 invites us to reflect, not only on the improvements it promises but the challenges that the industry has faced along the way.
What’s trending in digital payments fraud in the US?
27-06-2018|Entersekt Editor

What’s trending in digital payments fraud in the US?

As payments become more digitized, so do fraud schemes. Fraudsters always seem to stay just one step ahead of the industry’s relentless efforts to defeat them. Some of the most prevalent fraud methods today are card-not-present (CNP) fraud, account takeovers, new account fraud, and spoofing.
Digital fraud trends in the UK
11-04-2018|Alan Goode

Digital fraud trends in the UK

As we increasingly move our lives online, it is no surprise that fraud should be following us. The rise of ecommerce and digital banking has resulted in growing levels of fraud targeting these new business channels. In this blog post, London-based analyst Alan Goode investigates what is currently happening in the UK.
The (lock and) key to strong security
08-01-2018|Simon Rodway

The (lock and) key to strong security

Let me begin with a short story, a true story. A good friend of mine’s house was recently broken into. He was asleep in bed when this event took place, and he heard nothing. In fact, when he got up in the morning, he didn’t even notice at first that the event had taken place, such was the subtlety of the break-in. The thief had managed to break a door lock, opening the door without making much sound at all. The technique was to snap off the front of the lock and use a screwdriver to open the door: very quiet and very quick.
Confirm your customer: how strong authentication leads to more transactions
15-11-2017|Dewald Nolte

Confirm your customer: how strong authentication leads to more transactions

Losses from card fraud approached $23 billion worldwide in 2016, according to the 2017 Nilson Report, and with the rising tide of data breaches and other cyberattacks, that sum is projected to reach $33 billion by 2021.
Background authentication: Convenience, but at what price?
13-09-2017|Alan Goode

Background authentication: Convenience, but at what price?

There have been at least three occasions in the last couple of years when I have been anxiously trying to connect through to a bank’s fraud team contact center after having a payment declined.
What's behind the brisk growth of risk-based authentication?
25-04-2017|Jolette Roodt

What's behind the brisk growth of risk-based authentication?

The move to chip cards in the United States has been touted as the trigger for the movement of fraud from card-present to card-not-present channels. The country’s dominant approach to combating this type of fraud is risk-based authentication. Is this because it has proven to be successful in preventing fraud, or is risk-based authentication’s attractiveness based on other considerations?

logo entersekt

Entersekt is an international software development company based just outside of Cape Town, South Africa.

We are leaders in authentication, app security, and payments enablement technology, offering a highly scalable solution set with a track record of success across multiple continents.