Discover OZON’s PrestaShop anti-fraud module

Discover OZON’s PrestaShop anti-fraud module

Regardless their turnover, OZON enables every eCommerce and mCommerce to detect sophisticated fraud and fraudulent transactions. With OZON’s module designed for PrestaShop platforms, each order is analysed in depth and in real-time by different intelligent filtering...

3 types of ecommerce attacks you should know

3 types of ecommerce attacks you should know

The tremendous increase in online transactions has been accompanied by an equal rise in the number and type of attacks against the security of eCommerce sites. Some of these attacks have utilized vulnerabilities that have been published in reusable third-party...

Free HTTPS for eCommerce sites, is that true?

Free HTTPS for eCommerce sites, is that true?

The use of SSL/TLS certificates is especially relevant when you have to secure an eCommerce website. However, it made little financial sense for small websites with low readership to buy a certificate. Some companies such as StartCom are offering free certificates,...

The 2 eCommerce most dangerous cybersecurity threats for 2016

The 2 eCommerce most dangerous cybersecurity threats for 2016

From identity theft and fraud to corporate hacking attacks, cybersecurity has never been more important for eCommerce sites, large or smaller ones. Hacking experts warn there are plenty more security risks ahead in 2016 as cyber criminals become more sophisticated....

Tourism businesses in fear of cyber-attacks

Tourism businesses in fear of cyber-attacks

Online services in the tourism industry are not spared by cyber-criminals. The sector is growing and the financial windfall attracts many malicious hackers and competitors. The tourism industry must now ensure that their transactions and customer data are protected...

French websites: a prime target for malware dissemination

French websites: a prime target for malware dissemination

The French sites are the main target of hackers for malware dissemination. If a malware is installed on your server (even without your consent), your responsibility is exposed and the consequences can be dramatic. Discover in this article how to identify, remove and...