Page 12 - GS210901
P. 12
NewsBriefs
transactions per active cardholder grew 23 percent last attacks, experts emphasized. David Stewart, CEO at
year, and CNP transactions now account for one in three Approov, described the T-Mobile breach as an alarm call
debit card payments. Card-present debit transactions fell to all enterprises that share customers with T-Mobile.
10 percent per active user.
"With 100 million users' data for sale on the dark web,
All in all, debit cards remain consumers' preferred including usernames, passwords and other personal
payment method, representing 51 percent of all non-cash data, all such enterprises should expect script driven
payments in 2020. "While credit card volumes contracted, credential stuffing attacks imminently against their APIs,"
debit spending was resilient in 2020," the report stated. he said. Stewart went on to say passwords are frequently
"As a result, debit purchase volumes surpassed credit reused across platforms, which makes T-Mobile credentials
purchases for the first time." valid for other platforms. "This would be a truly excellent
time for all enterprises to ensure that API calls are
Overall transaction volumes fell in the second quarter authorized by at least one independent authentication
of 2020, resulting in total debit spend contracting by 2.5 factor over and above their standard user authentication
percent for the year, the first time that's happened in the method," he said.
13-year history of the PULSE debit issuer study. That was
buffered by a $4 boost in average ticket size, the largest After confirming reports of a data breach on Aug. 17,
increase in the study's history. 2021, T-Mobile has been providing updates on its website,
stating it will continue "to work around the clock on the
T-Mobile, AT&T security breaches put millions at risk forensic analysis and investigation into the cyberattack
Security experts are warning consumers to change against T-Mobile systems while also taking a number of
passwords and monitor financial accounts following proactive steps to protect customers and others whose
reports of security breaches at T-Mobile and AT&T. The information may have been exposed."
incidents highlight the need for advanced, multilayered
protection against identity theft and account takeover