Language Selection

English French German Italian Portuguese Spanish

MasterCard fights back against phishing sites

Filed under
Security

The anti-web fraud campaign has led to the discovery and protection of more than 35,000 MasterCard account numbers that “were in jeopardy of being compromised”, MasterCard said.

MasterCard launched its Operation Stop It (Identity Theft) last June. As a result of the success of Operation Stop It, NameProtect, the company with which MasterCard partnered to launch the fraud fighting program, is now offering NameProtection, an expanded version of the program, to MasterCard customer financial institutions.

MasterCard is offering customer financial institutions a new suite of technology and services to help prevent phishing attacks and other fraud.

MasterCard also said that information garnered from its campaign had led to the US Secret Service making 27 arrests of suspected computer and credit card fraudsters.

Source.

Thats wonderful

I must get atleast 5-6 email phishing scams in my inbox everyday.

re: Thats wonderful

Oh I know what you mean, me too... at least!

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Internet of Things Web Editor Open Source Project Started

The StackSavings Web Editor has recently been launched as an open source project. The aim of the project is to be a Web Editor for the Internet of Things. The IoT web editor is built on Amazon Web Services cloud platform and is working toward the goal of providing an easy to use web editor interface. Read more

GNOME Software 3.22 Will Support Installation of Snaps, Flatpak Repository Files

The GNOME 3.21.4 desktop environment was released last week, which means that many of the default applications and components were updated with bug fixes and various enhancements. Read more

openSUSE Leap 42.2 Now Merged with SUSE Linux Enterprise 12 Service Pack 2

The development cycle of the openSUSE Leap 42.2 operating system continues, and today we would like to inform our readers about the availability of the third and last Alpha build in the series. Read more

Linux 4.7 and Linux 4.8

  • Linux Kernel 4.7 Officially Released, Introduces Support for Radeon RX480 GPUs
    Today, July 24, 2016, after a week of holiday fun, Linus Torvalds has had the great pleasure of announcing the release of Linux kernel 4.7 for all GNU/Linux operating systems. The Linux 4.7 kernel has been in development for the past two months, but that shouldn't surprise anyone who is either reading our website on a regular basis or keeping pace with the Linux kernel development cycle, which was very normal for this branch. A total of seven Release Candidate (RC) testing builds were released since May 29, 2016, which introduced numerous new features and improvements.
  • The Biggest Features Of The Linux 4.7 Kernel
    If all goes according to plan, the Linux 4.7 kernel will be released before the day is through.
  • The Size Of Different DRM Graphics Drivers In Linux 4.7
    Last October I looked at The Size Of The Different Open-Source Linux DRM/Mesa Graphics Drivers, but with it being nearly one year since then and Linux 4.7 due out today, I decided to run some fresh L.O.C. measurements on the popular DRM/KMS drivers to see their current sizes. This lines-of-code counting was mostly done out of a curiosity factor. In this article I'm just looking at the in-kernel DRM code and not the Mesa drivers, DDX drivers, LLVM back-ends, or anything else in user-space related to the open-source graphics drivers.
  • The Btrfs Windows Driver Updated With RAID Support & Other Features
  • Hardened Usercopy Appears Ready To Be Merged For Linux 4.8
    Yet another Linux kernel security feature coming to the mainline kernel that appears readied for the Linux 4.8 merge window is hardened usercopy. Hardened usercopy was originally based upon GrSecurity's PAX_USERCOPY feature but reworked into a whole new form, according to developer Kees Cook at Google. This hardened usercopy is to be exposed as the CONFIG_HARDENED_USERCOPY option within the kernel.