HackDig : Dig high-quality web security articles for hacker

Five Key IT Security Best Practices to Safeguard Your Expanding Business

A key theme of the recent Cybersecurity Nexus event in Washington, D.C. was the growing need for small and medium-sized businesses (SMBs) to adopt enterprise-like IT security best practices. In fact, SMBs might actually have an edge over the unrelenting competition they endure from larger enterprises because they are more proactive and nimbler in mitigating
Publish At:2017-10-22 05:00 | Read:177 | Comments:0 | Tags:Application Security Retail Risk Management Application Secu

POS Malware Breach Sees Payment Cards Hit Underground Shops

News about POS malware breaches affecting two retailers hit the headlines last week, this time featuring a fast-food restaurant chain in the U.S. that operates around 3,500 locations across the country, most of which are franchised, and a popular supermarket. Both entities, like others before them, were notified of suspicious activity by a third-party servic
Publish At:2017-10-04 03:05 | Read:360 | Comments:0 | Tags:Data Protection Fraud Protection Malware Retail Threat Intel

Hacking SAP POS systems with a $25 Raspberry Pi

A $25 Raspberry Pi or similar tiny PCs could be used to hack SAP POS systems due to a critical vulnerability. SAP POS is client-server technology that belongs to the SAP for Retail line-up, it is widely adopted, it has been estimated that it is used by 80 per cent of the retailers in the Forbes Global 2000. The discovery was made by researchers at firm ERPSc
Publish At:2017-08-29 11:20 | Read:432 | Comments:0 | Tags:Breaking News Hacking Retail SAP SAP POS

SD-WAN: Improve Security and Reduce Cost While Complying with Payment Card Industry Standards

Software-defined wide area networking (SD-WAN) technologies are transforming the way enterprises approach connectivity and the implementation of security functions for branch and retail locations. These technologies give organizations greater flexibility, visibility and control of both satellite location networks and their connections to enterprise resources
Publish At:2017-06-30 22:10 | Read:333 | Comments:0 | Tags:Network Retail network Network Security Payment Card Industr

The Retail Industry and the Challenges of Enterprise Mobility Management

Authored by Ivan Cantero, Product Professional Services for IBM Security. Retail is always a sector with specific difficulties and challenges, and enterprise mobility management (EMM) is another field that IT departments of retail companies have to consider. Besides bring-your-own-device (BYOD) and corporate phones, retail organizations are starting to lev
Publish At:2017-03-23 16:55 | Read:471 | Comments:0 | Tags:Mobile Security Retail Bring-Your-Own-Device (BYOD) Enterpri

Chip-and-PIN Credit Cards, One Year On

The U.S. was not an early adopter of chip-and-PIN credit cards, lagging behind major European countries and others. But more than a year after the official mandatory shift to this technology, the transition has reshaped most credit card transactions. As a result, the rate of credit card fraud is down sharply. Catching Up With Chip-and-PIN Credit Cards The co
Publish At:2016-12-30 00:35 | Read:988 | Comments:0 | Tags:Fraud Protection Retail Credit Card Credit Card Fraud EMV Fr

Attackers Targeting Retail Are Shopping for Low-Hanging Fruit

The end of the year is often a time of reflection. What went wrong? What went right? If you’re a retailer that experienced a security breach in 2016, you’re likely reflecting on what went wrong and seeking to identify the gaps in your security landscape. Why? Because breaches are costly. In fact, the Ponemon Institute’s “2016 Cost of
Publish At:2016-12-23 00:40 | Read:1259 | Comments:0 | Tags:Retail X-Force Research IBM X-Force Research Network Securit

The Truth I Learned While Online Shopping for Christmas

My favorite childhood memories revolve around the excitement of opening gifts around the Christmas tree. This year, for the first time, I decided to save time, take advantage of good deals and explore the online shopping frenzy that has taken the world by storm. The Problem With Online Shopping With the increase of fraudulent app developers, it has become im
Publish At:2016-12-20 17:20 | Read:1336 | Comments:0 | Tags:Application Security Mobile Security Apple App Store online

Retail Cybersecurity: Black Friday and Cyber Monday Are Upon Us

In the U.S., the post-Thanksgiving shopping blitz of Black Friday often serves as a make-or-break event for many retailers. Indeed, Black Friday is the day when retailers start to make a profit for the year. No further explanation is needed to understand why retail cybersecurity is so important. Since the arrival of the browser, online shopping has evolved.
Publish At:2016-11-19 23:00 | Read:1397 | Comments:0 | Tags:Retail Black Friday Cyber Monday online shopping Point-of-Sa

Here's how businesses can prevent point-of-sale attacks

Retailers, hotels and restaurants have all been victimized through the same Achilles' heel that cybercriminals continue to attack: the point-of-sale system, where customers' payment data is routinely processed.  These digital cash registers are often the target of malware designed to steal credit card numbers in the thousands or even millions. This year,
Publish At:2016-11-01 14:10 | Read:797 | Comments:0 | Tags:Security Hacking Business Payment Processing Retail

Vera Bradley retail chain notifies customers of data breach

The American retail chain Vera Bradley announced that hackers have stolen a yet undetermined number of payment card data from its systems. The American retail chain Vera Bradley is the last victim of a data breach, the company announced that hackers have stolen a yet undetermined number of payment card data. The breaches affected customers shopping at its 11
Publish At:2016-10-13 10:30 | Read:863 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Cybercrime data breach

Visa moves to streamline chip-card processing certifications

After months of frustrating delays for U.S. merchants that have been required to roll out payment systems that can accept new, more secure computer chip credit and debit cards, Visa on Thursday announced a series of remedies.The steps include streamlining Visa's testing requirements and simplifying the terminal certification process. Visa said it would a
Publish At:2016-06-17 02:45 | Read:1124 | Comments:0 | Tags:Payment Processing Financial Services IT Retail Mobile Secur

Retailers must upgrade authentication, encryption and pen testing

The PCI Security Standards Council now requires better authentication, encryption and penetration testing by companies that accept consumer payments, improvements lauded by security experts."There are a lot of people who consider compliance to be policy for policy sake," said Ryan O’Leary, vice president of the threat research center at WhiteHat Security
Publish At:2016-05-07 00:20 | Read:1173 | Comments:0 | Tags:Security Compliance Network Security Retail Payment Processi

Follow The Money: Dissecting the Operations of the Cyber Crime Group FIN6

Cybercrime operations can be intricate and elaborate, with careful planning needed to navigate the various obstacles separating an attacker from a payout. Yet reports on these operations are often fragmentary, as the full scope of attacker activity typically occurs beyond the view of any one group of investigators. FireEye Threat Intelligence and iSIGHT Part
Publish At:2016-04-21 10:30 | Read:1103 | Comments:0 | Tags:iSIGHT Partners cyber crime cyber threat intelligence FIN6 h

FireEye says hackers are racing to compromise POS systems

Cybercriminals are redoubling efforts to steal payment card details from retailers before new defenses are put in place, according to FireEye.More than a dozen types of malware were found last year that target point-of-sale systems, the electronic cash registers the process payments at many retailers.Over the last few years, hackers have successfully bre
Publish At:2016-03-28 20:11 | Read:1219 | Comments:0 | Tags:Security Malware Retail

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud