HackDig : Dig high-quality web security articles for hacker

Cyberthreats to financial institutions 2020: Overview and predictions

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Corporate security prediction 2020 Key events 2019 Large-scale anti-fraud bypass: Genesis digital fingerprints market uncovered Multi-factor authentication (MFA) and biometric challenges
Publish At:2019-12-03 06:05 | Read:339 | Comments:0 | Tags:Kaspersky Security Bulletin ATM Biometric authentication Cre

Magecart Group 4: A link with Cobalt Group?

Note: This blog post is a collaboration between the Malwarebytes and HYAS Threat Intelligence teams. Magecart is a term that has become a household name, and it refers to the theft of credit card data via online stores. The most common scenario is for criminals to compromise e-commerce sites by injecting rogue JavaScript code designed to steal any informa
Publish At:2019-10-04 11:20 | Read:367 | Comments:0 | Tags:Threat analysis carbanak colbalt group credit cards data the

An Oversight in Online Payments Allows Cards to be Hacked in Seconds

The countdown to year’s end almost inevitably means an increase in online purchases. On the heels of Black Friday and Cyber Monday, a full-blown consumerist race kicks off the goes until January. This 2016 will continue to show consumers turning more and more to e-commerce for their gift giving needs. However, the convenience of paying by credit card online
Publish At:2016-12-28 22:30 | Read:4211 | Comments:0 | Tags:Security credit cards cyber attacks online payments

Loop of Confidence

With the arrival of Apple Pay and Samsung Pay in Russia, many are wondering just how secure these payment systems are, and how popular they are likely to become. A number of experts have commented on this, basing their opinions on the common stereotypes of Android being insecure and the attacks which currently take place on wireless payments. In our opinion
Publish At:2016-11-12 08:35 | Read:3348 | Comments:0 | Tags:Blog Research Apple Credit Cards Electronic Payments NFC Sec

Advanced Attacks against Hotel Chains: A practical example

Recently, we published a report where we discussed the numerous attacks on major hotel chains. The attacks were directed mainly towards credit card theft. Attackers do this by infecting point-of-sale terminals in these types of establishments. A few days ago, one of our Adaptive Defense 360 clients, a luxury hotel chain, suffered an attack. I wanted to take
Publish At:2016-05-06 04:10 | Read:3369 | Comments:0 | Tags:News Panda Security Adaptive Defense 360 businesses credit c

Cyber-criminals really “Like” Facebook

With 1,590 million active users per month, Facebook is the Social Network. In fact, they just posted their quarterly earnings and they are up 50%. Cyber-criminals are aware of their success. These platforms are the ideal place to “phish” for information. 18% of companies infected by malware were infected through social networks. Attackers pass as part of a
Publish At:2016-05-05 09:55 | Read:2583 | Comments:0 | Tags:Internet Security Panda Security Social Media credit cards P

The rise of the Brazilian Cybercriminal Underground in 2015

Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. A firs
Publish At:2016-01-21 05:40 | Read:2994 | Comments:0 | Tags:Breaking News Cyber Crime Reports banking Trojans black mark

Beaches, carnivals and cybercrime: a look inside the Brazilian underground

 Download PDF version Introduction The Brazilian criminal underground includes some of the world’s most active and creative perpetrators of cybercrime. Like their counterparts in China and Russia, their cyberattacks have a strong local flavor. To fully understand them you need spend time in the country and understand its language and culture. The
Publish At:2015-11-13 15:05 | Read:6994 | Comments:0 | Tags:Analysis Featured Publications Credit Cards Cybercrime Finan

Forged Module Hack Compromised Credit Cards’ Chip and Pin Technology, Say Researchers

Over the course of the last decade, major credit card companies have begun to implement EMV or “chip and pin” technology. This system requires that a card reader retrieve the customer’s information off of their card’s magnetized chip, which is followed by the cardholder entering in their PIN number.As a result, chip and pin essentiall
Publish At:2015-10-23 14:30 | Read:3280 | Comments:0 | Tags:Featured Articles Security Awareness chip and pin credit car

Why Companies Are Still Unprepared for the EMV Transition

While the national transition to Europay, MasterCard and Visa, known as EMV or “Chip and PIN,” is well underway, a recent study found that as many as 42 percent of companies have either taken no steps or are unaware of any progress being made to meet the October 1, 2015, deadline.The EMV readiness study conducted by Randstad Technologies, which surveyed IT d
Publish At:2015-07-28 07:55 | Read:3848 | Comments:0 | Tags:Featured Articles Risk Management chip and pin credit cards

A deep look into the Brazilian underground cyber-market

Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground. Trend Micro has published a new interesting report on the underground cyber-markets, this is a third study focused on the Brazilian cyber-underground offer, the previous ones analyzed Russian and
Publish At:2014-11-20 18:25 | Read:3439 | Comments:0 | Tags:Cyber Crime banking Trojans black markets Bolware kits Brazi

HSBC Turkey loses 2.7m card details; but won’t reissue

HSBC Turkey loses 2.7m card details; but won’t reissue HSBC Turkey revealed last week that 2.7 million customer card details had been compromised.In a statement HSBC claimed to have detected the compromise itself via its own internal controls within a few days of it occurring. Tr
Publish At:2014-11-15 22:00 | Read:3677 | Comments:0 | Tags:News News_hacks breach compromise credit cards HSBC Rapid7 T

Hopes Are High for Apple Pay Security

Apple will not be fading from the news anytime soon. In fact, one of its most anticipated announcements this year—Apple Pay—is slated to come out next month.Apple Pay is a new feature available on the iPhone 6 and iPhone 6 Plus that enables users to make “contactless” payments by transferring their debit or credit card from their iTunes account to Passbook.
Publish At:2014-09-24 00:40 | Read:3248 | Comments:0 | Tags:Featured Articles Apple Apply Pay credit cards virtual credi

Home Depot Investigating Possible Massive Data Breach

Home Depot may be the latest retailer to suffer a costly data breach, and if early indications are correct, the hackers may have been on the home giant’s network longer than hackers were on Target’s systems, and a greater number of consumers may be at risk.A Home Depot representative confirmed that retailer is seeing “unusual activity” on its network and has
Publish At:2014-09-03 10:30 | Read:4326 | Comments:0 | Tags:Data Breaches Hacks card forums credit cards data breach Hom


Share high-quality web security related articles with you:)


Tag Cloud