Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/25/2009
02:48 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mobiclear To Collaborate With NUCSOFT On Security Protection

NUCSOFT to provide mobiclear's PIVOT security system to clients in India to ensure secure card transactions

MANILA, Philippines and LAGUNA HILLS, Calif., March 25 /PRNewswire-FirstCall/ -- mobiclear, Inc. (OTC Bulletin Board: MOBI; Frankfurt: B3CA), (www.mobiclear.com), owner of the unique, patent-pending, Personal Identification Verification On-Time (PIVOT) solutions system to significantly decrease worldwide credit and debit card fraud, and other state-of-the-art computer security products, said today that it has entered into an agreement with NUCSOFT Ltd, a global IT company headquartered in India, to commence testing of mobiclear's PIVOT security solutions for the delivery to NUCSOFT's clients in India.

Once testing is completed, NUCSOFT will provide mobiclear's PIVOT security system to clients to ensure that its customers' card transactions are secure. There is also agreement that mobiclear will continue to develop and expand other ways of ensuring that the electronic commerce products of NUCSOFT Ltd's clients are free from fraud or abuse.

NUCSOFT is an IT consulting and software developer for the world's leading banking and financial services companies, leveraging a streamlined on-site and offshore development model, since its incorporation in 1994. It cost-effectively assists clients with world-class solutions. NUCSOFT is noted for giving the right mix of functional expertise coupled with software development and project management experience to create lasting value for the customer. It focuses exclusively on maximizing client returns from on-site consulting and off-shore facilities.

"We look forward to providing protection for the customers of NUCSOFT Ltd with our leading edge PIVOT security," said Stephen P. Cutler, mobiclear CEO. "Our PIVOT system requires an immediate cellphone/telephone PIN confirmation via an encrypted voice net by the card holder for a credit card or debit card transaction to be approved."

"NUCSOFT, on the cutting edge of IT, looks for assistance from companies that are also in the forefront of their industry sectors. We have enormous confidence that mobiclear is a leader internationally in protecting against computer, debit and credit card fraud and we look forward to its assistance for our customers," said Arun Shekhar Aran, Founder and CEO.

About NUCSOFT Ltd: NUCSOFT Ltd (www.nucsoft.com) headquartered in Mumbai, India with offices in London, UK and New Jersey, USA, was formed by Arun Shekhar Aran and a team of entrepreneurs in 1994 with the goal of becoming a global IT company. NUCSOFT has developed a Centric Development Model which, backed by state-of-the-art infrastructure, and hardware and software resources, communication and data links, creates a "Virtual Software Center" for its clients, enabling them to stretch their IT budgets with assurance of excellent deliverables.

About mobiclear: mobiclear, Inc. (OTC BB: MOBI; Frankfurt: B3CA), (www.mobiclear.com), headquartered in Manila, Philippines, offers a range of solutions to credit card and debit card fraud based on its patent-pending Personal Identification Verification On-Time system. It also offers products to ensure against fraud in all electronic transactions, including telephone and Internet transactions.

This news release may contain "forward-looking" statements. These forward-looking statements are only predictions and are subject to certain risks, uncertainties and assumptions. Actual results may differ materially from the forward-looking statements in this press release. Additional risks and uncertainties are identified and described in the Company's SEC reports. Statements made herein are as of the date of this press release and should not be relied upon as of any subsequent date. The Company does not undertake, and the Company specifically disclaims, any obligation to update any forward-looking statements to reflect occurrences, developments, events, or circumstances after the date of such statement.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).