Showing: 34 itemsRefine By
July 25, 2018 | by Diebold Nixdorf
Which biometrics are best in specific situations? Our manager of advanced tech breaks it down.
July 12, 2018 | by B. Scott Harroff
You might have seen some of the headlines earlier this year about “jackpotting.” It’s an ATM hacking scheme that prompts ATMs to dispense cash as if they were a Vegas slot machine.
May 24, 2018 | by Miguel Alvarez
Welcome to the amazing world of cryptography! That was the first thing I told myself when we started the Remote Key Loading (RKL) project in 2006. My knowledge about cryptography at that tim
March 19, 2018 | by Diebold Nixdorf
Our latest blog explores how we’re using patented machine learning algorithms based on more than 30 years of research work to deduce previously unknown fraud patterns by looking at highly complex Big Data sets in near real-time.
November 01, 2017 | by Bernd Redecker
Skimming is on the rise in certain regions even as it decreases in others. Meanwhile, newer threats such as logical and hacking attacks are becoming more complex and subtle. Over the past few years, logical attacks have become a major challenge and one that is only getting bigger. See how you can thwart these attacks before they start.
September 12, 2017 | by B. Scott Harroff
Terminal security is a 24/7, 365-day-per-year job, and it requires the proper management tools and resources. Lax procedures (like failing to change default passwords) can quickly put your system at risk.
May 25, 2017 | by Diebold Nixdorf
Internal fraud can happen when password security is lax. Our Terminal Security Access Protection solution solves the problem.
April 04, 2017 | by Diebold Nixdorf
Fraud can fatally harm your relationship with your customers – is your network prepared for the inevitable?