Watch Game Of Thrones Cast Members Cover Tom Waits On Set As ‘The Brotherhood Without Banjos’

first_imgIn the wake of the recently-finished season of HBO’s medieval fantasy mega-hit Game of Thrones, the show’s penultimate season, the goings-on of the fictional nation of Westeros have seemed as frequent a topic of conversation as the goings-on of our actual, real life country. Maybe that’s because the state of affairs in the world in 2017 have people yearning for an escape from the emotional burden of the world’s ills. Maybe, it’s just because Game of Thrones is so badass. In reality, it’s probably somewhere in the middle. But wherever the reasons for your current Game of Thrones fever fall on that spectrum, if you’re a fan of Thrones, you’ll no doubt get a kick out of this video, posted yesterday by Kristofer Hivju, the actor who plays Tormund in the show: The clip shows Hivju, along with Richard Dormer (who plays Beric), Rory McCann (The Hound), Iain Glen (Jorah) playing and singing to Tom Waits‘ “I Hope I Don’t Fall In Love With You.” And as you can see from Hivju’s incredibly strong hashtag game, the group is going by “The Brotherhood Without Banjos” (a play on the show’s “Brotherhood Without Banners”), which is just too damn good.Members Of Mastodon Appeared In The Game Of Thrones’ Season FinaleWe’re just as melancholy as the next guy about the prospect of waiting until 2019 for the show’s final season [note: plenty of time for all you uninitiated to finally get your shit together and catch up, already], but amazing nerd fodder like this certainly helps to soften the blow.[h/t – Consequence of Sound]last_img read more

Continue reading

Best practices for fighting fraud

first_imgAs we near the holidays it is critical to review best practices for fighting fraud with credit union staff and members.  There are four primary types of debit card fraud:PhishingPurchase returnCard PresentCard Not PresentPhishingIn the Verizon’s 2019 Data Breach Report phishing was found to be the top threat in all breaches analyzed.  Phishing begins with what appears to be a legitimate email, text message, or phone call.  The content of the communication leads you to believe that your account is on hold because of a billing problem and it asks you to click a link to update the account. Once clicked, the fraudster can access sensitive information like user names, passwords, payment card information, and PINs.Best Practices for IssuersInspect URLs carefully to see if they are being redirectedLook for spelling or grammar mistakes in the email or textProvide security training for staff, limit sharing sensitive personal informationAvoid answering unknown phone numbers, if in doubt call them back on the number you haveMake sure all anti-virus software and security is updatedPurchase Return FraudThere are a variety of ways criminals can obtain Point of Sale (POS) devices:From an acquirer, or agent posing as a merchantFrom an online resellerAuctionCriminal employee behaviorThe terminals are programed with legitimate merchant credentials and used fraudulently; the legitimate merchant is not aware until the funds are deducted from their account.  The criminals will load prepaid cards or complete a return on debit cards for large dollar amounts; if the activity is not caught quickly and the funds are not blocked or removed by the issuer, the account will be cashed out.Best Practices for IssuersAs of April 12, 2019 merchants are required not to process credit transactions without having completed a previous retail transaction with the same card holder.Monitor for large merchant dollar returns when there is no corresponding debit transactionSuch transactions should be considered suspect and a block placed on the cardCard Present FraudWith the implementation of EMV card present (CP) fraud has been reduced significantly; unfortunately, there are still ways that CP fraud can occur.The fallback fraud method uses stolen magnetic stripe data to commit fraud.  When an EMV chip reader fails and a merchant is prompted to finish a sale with the outdated magnetic stripe swipe method, fallback fraud can occur.  This holds true for both merchant terminals and ATM terminals.Fraudsters can also leverage mobile applications that use contactless Magnetic Strip Data (MSD) to load stolen track data obtained from merchant breaches.  The criminals attempt to use the mobile app at a POS terminal that triggers a Near Field Communication (NFC) transaction.  If approved, the fraudulent transaction is repeated to take advantage of the MSD.Best Practices for IssuersCriminals have learned if security and safety checks and controls are not in place it is possible to commit fraudulent activity.Create Fallback rules that limit the dollar amount and/or the number of transactions that can take place in fallback. Fallback transactions are a very small percentage of the overall share of CP transactions, however placing limits or declining all fallback can stop or limit this type of fraud.Ensure the POS entry mode identified is a supported transaction. If you are not issuing contactless cards at this time and do not offer Apple Pay or Samsung Pay, block all contactless transactions. If you do offer the Pays but do not offer contactless cards, make sure the token information is being validated when the contactless POS entry mode is used; if it isn’t, decline the transaction.A combination of data elements should be validated to eliminate fraudulent transactions: CVV/iCVV/dCVV values, POS entry modes, service codes, and valid token data.Card Not Present FraudCNP occurs when a transaction is completed without physically presenting a card at a merchant – online, telephone, mail order, etc. With the shift to EMV, as well as an increase in overall Card Not Present (CNP) transactions, fraud has grown in this channel, although it is down from 2018.Best Practice for IssuersAlerts and controls allow cardholders to receive verification of transactions. Educate credit union members on how to set up alerts and controls and turn the card on and off to prevent or avoid additional fraudulent transactions.3D Secure allows issuers to receive additional customer data from merchants to help risk score online, ecommerce transactions. The additional data helps to identify potentially fraudulent transactions and helps to authenticate the cardholder.LSC’s fraud team partners with credit unions to monitor and prevent fraud.  Arrange a consultation or just let us answer your fraud related questions by contacting us today at [email protected] 27SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr,MaryAnne Colucci Mary Anne Colucci joined LSC in 2005 in the Card Services area. Her responsibilities have included Team Leader in the ATM/Debit Department, co-managing the customer service staff to her … Web: www.lsc.net Detailslast_img read more

Continue reading

Szczesny Arrives Turin For Juventus Move

first_imgWojciech Szczesny has landed in Turin for his imminent move from Arsenal to Juventus.Juve’s official twitter handle tweeted: “Look who’s just landed!” The Arsenal goalkeeper, who spent the last two seasons on loan at Roma, will sign a €10m transfer deal with Juventus.Szczesny will reportedly play back up to Gianluigi Buffon next season, as the Italian shot stopper plans to retire after the 2018 World Cup.Relatedlast_img

Continue reading