Filter Blogs expand_more
Blog add
Authors add
4 Results for 'credit cards'
Blog

By Entrust Datacard

September 25, 2012

We’re big proponents of cashless transactions, and the ability to supplement plastic credit cards with wireless payment options is more available now than ever before.
Blog

By Entrust Datacard

July 30, 2012

Increased competition makes it more important than ever for financial institutions and retailers to gain new cardholders and increase customer loyalty. New card issuing technologies enable issuers to reach the cardholder at retails stores rather than being limited to traditional bank branch and/or direct mail channels. This provides a great opportunity for retail card issuers to enhance customer convenience and differentiate themselves in the marketplace.
Blog

By Entrust Datacard

October 19, 2015

October 1 was a game-changing day as far as credit cards are concerned. That's because this was the day that the EMV rollout went into effect in the United States. Although "rollout" was the term used to broadly describe what took place, October 1 did not actually signal a mandatory implementation of EMV across the board. Instead, it represented a fraud liability shift, wherein merchants - and not card providers - will be largely responsible for dealing with fraudulent transactions if these merchants are not EMV-enabled. This shifting of responsibility is meant to spur retailers to quickly adopt EMV processing capabilities. 
Blog

By Entrust Datacard

May 18, 2015

In March, a chart came out comparing the stereotypical computer hacker of 1995 to that of 2015. According to the chart's characterization, the hacker of 20 years ago was in every sense an amateur: often a kid in a basement seeing how much he or she could get away with. By today's standards, the 1995 hackers come off as almost benign. Sure, they would play around with the data on your computer and cause you a hassle here and there, but at the end of the day they were not stealing your identity, making off with your credit cards or trying to take control of the car you're driving. Flash forward 20 years and you have an image of the hacker that is entirely different from its predecessor.
Page 1 of 1