In general, good people underestimate the lengths to which criminals will go to exploit anything touching payments infrastructure.
-
-
For example: it's not outside of threat model to have a legit business' mail intercepted or suborned to get a card reader mailed to them.
-
It's also not outside the model for thieves to patiently ring up millions, avoid velocity checks, and act like typical SMB owner when called
- 2 more replies
New conversation -
-
-
@patio11@typhoonfilsy plus Ferrari bonuses for significantly exceeding expectations on their KPIs and beatings for below expectationsThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.