Skip to content ↓ | Skip to navigation ↓

September has been a busy month for Apple. First, there was the massive iCloud hack and then they announced a series of new products. One of the major announcements revealed a new mobile payment service called Apple Pay, which allows Apple users to purchase goods and services at retailers using their iPhones.

After the iCloud hack, can Apple be trusted with credit cards?

Listen to our latest Security Slice podcast and hear Dwayne Melancon, Craig Young and Chris Conacher discuss why Apple Pay can’t be worse than current U.S. credit cards technology, what storing credit card images instead of numbers will mean for iPhone user security and why tokenization is a grey area of PCI compliance.

 CLICK HERE TO LISTEN TO THE PODCAST

 

MORE WEBCASTS

RESOURCES:

picCheck out Tripwire SecureScan™, a free, cloud-based vulnerability management service  for up to 100 Internet Protocol (IP) addresses on internal networks. This new tool makes vulnerability management easily accessible to small and medium-sized businesses that may not have the resources for enterprise-grade security technology – and it detects the Heartbleed vulnerability.

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock

Hacking Point of Sale