HackDig : Dig high-quality web security articles

Why E-Commerce Security Matters Now More Than Ever

In February 2020, the world’s biggest retailer, Amazon, fended off the largest distributed denial of service (DDoS) attack in history. As peak traffic volume hit 2.3 Tbps, e-commerce security experts declared this attack as “a warning we should not ignore.”  DDoS attacks are nothing new. Every day, security teams deal with these malic
Publish At:2021-04-07 19:25 | Read:425 | Comments:0 | Tags:Retail E-commerce E-commerce Transactions Online Security On

Retail Cybersecurity: How to Protect Your Customer Data

In the early days of the pandemic, many retailers quickly launched e-commerce stores for the first time. Others expanded their offerings, such as adding online ordering with curbside pick-up. Within only a few months, the pandemic accelerated the shift to e-commerce stores by five years. This points to the need for increased retail cybersecurity. 
Publish At:2021-03-15 15:11 | Read:793 | Comments:0 | Tags:Data Protection Retail Security Services Credit Card Data Cu

The Shift to E-Commerce: How Retail Cybersecurity is Changing

With more people making purchases from home, now is a more important time than ever to secure your business against retail security threats. More and more customers are moving to online orders with gradual growth accelerated by five years in 2020 alone. Take a look at retail cybersecurity risks and how to protect against them. How to Protect Customer Data O
Publish At:2021-03-04 13:59 | Read:395 | Comments:0 | Tags:Retail Risk Management Security Services Cybersecurity E-com

E-Commerce Skimming is the New POS Malware

As the holiday shopping season shifts into high gear, the COVID-19 pandemic is accelerating an ongoing trend: shoppers are opting to buy online. Rather than flooding brick-and-mortar stores — and point-of-sale (POS) machines — with sales, studies suggest a high percentage of shoppers in 2020 will be using online options and e-commerce
Publish At:2020-12-16 10:05 | Read:573 | Comments:0 | Tags:Fraud Protection Malware Software & App Vulnerabilities E-co

Demystifying two common misconceptions with e-commerce security

Online shopping has seen a dramatic increase in the months following the Covid-19 outbreak as more and more people opt-out of visiting physical stores. Such a phenomenon does not go unnoticed or without additional consequences. During the same time period, we have seen an increase in the usual scams but also digital skimming, the online equivalent of credit
Publish At:2020-11-20 12:42 | Read:698 | Comments:0 | Tags:Cybercrime e-commerce HTTPS iframe Magecart merchant padlock

E-commerce platform X-Cart hit by a ransomware attack

The e-commerce software platform X-Cart suffered a ransomware attack at the end of October, e-stores hosted by the company went down. At the end of October, the e-commerce software platform X-Cart suffered a ransomware attack, the infection brought down customers’ e-stores hosted by the company on its platform. The software and services company
Publish At:2020-11-09 07:50 | Read:1056 | Comments:0 | Tags:Breaking News Cyber Crime Malware e-commerce Hacking hacking

Magento 1.x EOL is set on June 30, 75% of installs potentially impacted

Adobe, Mastercard, Visa are warning the owners of the online store running Magento 1.x of updating their installs because it will reach EOL by June 30 Adobe, Mastercard, Visa are warning the owners of online store running Magento 1.x of updating their installs because it will reach the end-of-life (EOL) by June 30 After June 30, Adobe will no more offe
Publish At:2020-06-28 08:35 | Read:1849 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Security e-commerce hackin

eBay staff charged with cyberstalking, sending fetal pig and spiders

byLisa VaasThis is a Halloween mask depicting the face of a bloody pig: IMAGE: Court documentsIt’s not pretty, but at least it doesn’t scurry. You can’t say the same for the other packages sent in a cyberstalking campaign allegedly orchestrated by eBay management and targeted at a Natick, Massachusetts couple who run an online e-commerce n
Publish At:2020-06-17 06:15 | Read:1614 | Comments:0 | Tags:Law & order bloody pig mask Brian Gilbert cockroaches conspi

ITG08 (aka FIN6) Partners With TrickBot Gang, Uses Anchor Framework

The past two years have borne witness to the increasing collaboration between organized cybercrime groups to avoid duplication of efforts and maximize profits. Although this collaboration has primarily occurred between gangs developing and distributing well-known banking Trojans, such as Emotet, TrickBot and IcedID, it does not stop there. In a new and dange
Publish At:2020-04-07 08:25 | Read:1868 | Comments:0 | Tags:Advanced Threats Threat Intelligence Banking Trojan Collabor

Breaking the Ice: A Deep Dive Into the IcedID Banking Trojan’s New Major Version Release

The IcedID banking Trojan was discovered by IBM X-Force researchers in 2017. At that time, it targeted banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites, mainly in the U.S. IcedID has since continued to evolve, and while one of its more recent versions became active in late-2019, X-Force researchers have identifi
Publish At:2020-04-01 07:12 | Read:1669 | Comments:0 | Tags:Fraud Protection Malware Threat Research Banking Malware Ban

A Proposed New Trust Framework for Physical and Digital Identity Interactions

Identity is a difficult term to define in the cybersecurity world. The range of personal information that can be associated with an identity interaction is highly dependent on the situational context of the interaction. The definition of identity also depends on the context of the medium within which it is exchanged. In the physical world, when we talk about
Publish At:2020-03-13 07:59 | Read:2289 | Comments:0 | Tags:Identity & Access Collaboration Compliance Customer Experien

The Evolution of Digital Certificates

In the early days of the internet, one of the first functional problems users faced was how to verify that entities on the other end of a connection were who they said they were. At first, the nebulous nature of online transactions inhibited e-commerce, since buyers feared that their payment information might be hijacked. This lack of trust precipitated the
Publish At:2017-07-25 11:50 | Read:5073 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Certificat

How to Protect Your E-commerce Business from Cyber Attacks

Just as traditional brick-and-mortar businesses are targeted by anarchists during protests or times of unrest, e-commerce businesses are targeted by cyber criminals, except they don’t wait for particular season or reason.Whether small, medium or large, every business is, sadly, at the mercy of hackers who will exploit every opportunity they get to breach sen
Publish At:2017-03-23 16:10 | Read:7617 | Comments:11 | Tags:Cyber Security Featured Articles cyber attack E-commerce SSL

Crooks hijack Magento Realex Payments extension to steal payment card data

Cybercriminals hijack Magento Realex Payments extension to steal payment card data. Experts at Sucuri are observing massive attacks. Cybercriminals continue to target Magento platform to steal credit card data. Crooks have been abusing a payment module to steal payment card data from online shops running on Magento e-commerce platform. According to experts a
Publish At:2017-03-14 12:30 | Read:3876 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime e-commerce Mage

Did Your Developer Leave a Website Backdoor?

The Dutch police recently arrested a developer for crimes he committed by writing a website backdoor into e-commerce sites he created and using credentials retained after the engagement concluded. This backdoor provided the malicious insider with sufficient access to perpetrate a number of crimes by leveraging 20,000 users’ credentials. The Crime The d
Publish At:2017-02-09 18:45 | Read:4181 | Comments:0 | Tags:Data Protection Identity & Access E-commerce Insider Threat