domain cloning URL hooks feature

Retail Domain Cloning a Popular Holiday Season Hack

| Mike O'Brien

Domain cloning of retailer’s websites has become very popular in the midst of the pandemic and into the peak holiday season, with more than 12,000 suspicious domains related to five big U.S. retailers uncovered over a two-and-a-half-week span from late October to November, according to Mimecast.

payment gateways illustration feature

Payment Gateways 101: Examples, Benefits and Drawbacks

| Burkhard Berger

If you’re selling anything online, odds are that part of your sales funnel is dependent on a payment gateway of some sort to accept payments through a bank card or third-party service. Here’s a primer on who the major providers are, types of payment gateways, what they do and how they work and their pluses and minuses.

Will Shadow Code Grinch Ecommerce This Holiday Season?

| Ameet Naik

Shadow Code effectively solves real problems and accelerates web development, critical to giving online holiday shoppers a stellar experience. But it does carry risks and could Grinch the holidays. You need to build guardrails that enable your team to develop innovative web applications while detecting and stopping malicious code.

Securing Your Ecommerce Store During COVID-19

| Deepak Gupta

Without a proactive prevention plan, an ecommerce store is bound to lose customer data and revenue as transactions soar during COVID-19. Here are 5 of the most common cyber threats to look out for, plus some quick tips to prevent them, as well as suggestions for improving your overall site security.

Don’t Be the Next Data Breach Headline This Holiday Season

| Chad McDonald

The holiday shopping season is practically upon us, which means savvy consumers are getting ready for the best sales of the year. Unfortunately, they’re not the only ones preparing to take advantage of the season. Learn about the serious threats posed by bad actors like Magecart groups, and what steps you can take now to be protected.

Securing the Entire Digital Payment Lifecycle

| Robert Block

Gone are the days when buyers relied exclusively on cash, checks and credit cards to conduct financial transactions. Today, digital transformation and next-gen technology are dramatically transforming payment methods, processes and systems.

Measuring the Successes and Shortcomings of Software Security in Retail

| Taylor Armerding

As an industry, retail’s reputation for providing software security has taken some hits. The top 15 data breaches of the current century include Target in 2013, with account information on an estimated 110 million customers compromised; TJX in 2006, with 94 million credit cards exposed; and Home Depot in September 2014, with about 56 million customer credit/debit cards compromised. Here is a look at how retailers can beef up their security to ensure that data breaches are a thing of the past.