HackDig : Dig high-quality web security articles for hacker

The Evolution of Digital Certificates

In the early days of the internet, one of the first functional problems users faced was how to verify that entities on the other end of a connection were who they said they were. At first, the nebulous nature of online transactions inhibited e-commerce, since buyers feared that their payment information might be hijacked. This lack of trust precipitated the
Publish At:2017-07-25 11:50 | Read:3230 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Certificat

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:4785 | Comments:5 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to target Magento platform to steal credit card data. Crooks have been abusing a payment module to steal payment card data from online shops running on Magento e-commerce platform. According to experts a
Publish At:2017-03-14 12:30 | Read:2845 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime e-commerce Mage

Did Your Developer Leave a Website Backdoor?

The Dutch police recently arrested a developer for crimes he committed by writing a website backdoor into e-commerce sites he created and using credentials retained after the engagement concluded. This backdoor provided the malicious insider with sufficient access to perpetrate a number of crimes by leveraging 20,000 users’ credentials. The Crime The d
Publish At:2017-02-09 18:45 | Read:2601 | Comments:0 | Tags:Data Protection Identity & Access E-commerce Insider Threat

Experts discovered a number of flaws in the Avactis PHP Shopping Cart

A group of experts at VoidSec used a Grey Box approach to assess the security posture of some important aspects of Avactis PHP Shopping Cart. Avactis is an open source ecommerce Shopping Cart platform most used in US and UK. Security experts from VoidSec analyzed the e-commerce software discovered an impressive number of vulnerabilities. The group of experts
Publish At:2016-04-18 06:50 | Read:4364 | Comments:0 | Tags:Breaking News Hacking Avactis e-commerce vulnerability asses

Flaw in Magento exposes millions of websites at risk of takeover

A stored cross-site scripting vulnerability in Magento exposes millions of e-commerce websites at risk of takeover, update your platform as soon as possible Once again a vulnerability in the popular Magento e-commerce platform opens at risk of hijacking attacks millions of online merchants. According to the experts at Sucuri,
Publish At:2016-01-26 12:15 | Read:3619 | Comments:0 | Tags:Breaking News Hacking e-commerce Magento Pierluigi Paganini

Holiday Online Shopping a Challenge for Enterprise Security

Online Shopping Rules the Holidays ‘Tis the season for online holiday shopping. Unfortunately, cybercriminals know that this is also the best season for retail-related crimes. Holiday shopping can be frenetic, and online shopping is no exception. Consumers are making more purchases, are busier and are more distracted, which can lead to making security
Publish At:2015-12-02 11:05 | Read:3240 | Comments:0 | Tags:Fraud Protection Mobile Security Cybercrime E-commerce Enter

Another Magento Remote Code Execution Vulnerability

The security expert Ebrahim Hegazy has published an interesting post detailing his discovery of a new Magento Remote Code Execution Vulnerability. The popular hacker Ebrahim Hegazy (Aka Zigoo) has discovered a Remote Code Execution Vulnerability that affects the widely adopted application Magento. The experts was analyzing the
Publish At:2015-10-30 10:30 | Read:3784 | Comments:0 | Tags:Breaking News Hacking e-commerce Magento RCE vulnerability R

Thousands of Magento websites compromised to serve malware

Security experts have discovered that thousands of websites running the eBay’s Magento e-commerce platform have been compromised and used to deliver malware. Security experts at Sucuri have discovered a malware campaign that targeted a large number of websites the eBay Magento e-commerce platform. The same campaign was also mo
Publish At:2015-10-22 04:20 | Read:4194 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Cybercrime e-comme

Magento payment card stealers are being used in the wild

The security researchers at Sucuri firm discovered a malicious code that could be used to steal payment card data from Magento platform. Security experts at Sucuri have uncovered a new method used by criminals to syphon payment card data from websites based on the Magento e-commerce Platform. Researchers explained that attacke
Publish At:2015-06-27 10:25 | Read:3530 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime e-commerce Mage

Online Shopping Security: Best Practices for Businesses

Online shopping security is a concern for everyone who makes purchases on the Internet, but it is also an important issue for business leaders — and not just those in the retail sector. Firms also go shopping online, and their employees frequently make business purchases on the company credit card. Enterprise partners involved in online retail can connect a
Publish At:2015-06-18 02:20 | Read:3685 | Comments:0 | Tags:Retail E-commerce HTTPS Payment Card Industry (PCI) Payment

Cryptocurrency software bundled with BitTorrent triggers complaints

Some people who use uTorrent, the popular BitTorrent client, are up in arms over the presence of cryptocurrency mining software on their computers which they say was installed without their permission.The mining software, made by the company Epic Scale, started appearing for some people earlier this week after they updated to the latest version of uTorrent,
Publish At:2015-03-07 02:40 | Read:3388 | Comments:0 | Tags:Gadgets Consumer Technology Consumerization E-commerce Secur

Lawmakers target data brokers in privacy bill

Four U.S. senators have resurrected legislation that would allow consumers to see and correct personal information held by data brokers and tell those businesses to stop sharing or selling it for marketing purposes.The Data Broker Accountability and Transparency Act, introduced by four Democratic senators Thursday, also would require the U.S. Federal Trade C
Publish At:2015-03-05 18:40 | Read:2724 | Comments:0 | Tags:E-commerce Government Legislation Business Security Complian

No Holiday Bonanza for Cybercriminals During 2014 Holiday Shopping Season

Every year, retailers dedicate a tremendous amount of energy preparing to take advantage of the holiday shopping season that kicks off with Black Friday and Cyber Monday. They often institute an annual “holiday freeze” period to avoid affecting sales and technology performance with new technology or buggy patches. The reason is obvious: These are
Publish At:2015-01-05 21:35 | Read:3801 | Comments:0 | Tags:IBM X-Force Industries Vulns / Threats Black Friday Cyber Mo

Should You Use Near-Field Communications?

Have you ever wondered what kind of superpower you’d have? I’ve always wanted to send messages and ideas with my mind to others. My dream can sort of come true with near-field communications (NFC). You’ve might not have heard of NFC, but if you have a smartphone, there’s a good chance you’ve used it. If you have ever used Apple Pay or bumped your Galaxy smar
Publish At:2014-12-15 18:40 | Read:3823 | Comments:0 | Tags:Consumer Identity Protection Mobile Security android E-Comme


Share high-quality web security related articles with you:)


Tag Cloud