|11 Jan 2014||#1|
| || |
Target data breach exposes serious threat of POS malware and botnets
After the Target data breach, I became curious as to how digital criminals were able to manipulate Point of Sale (PoS) systems without raising red flags. From what Iíve read, itís surprisingly easy.
Before we dive into what the bad guys can do: letís take a quick look at a generic PoS system. PoS hardware consists of the device used by customers to swipe their credit or debit card, and the computing equipment electronically attached to the device.
PoS software are the applications that process the data found on the credit or debit cardís magnetic stripe. Key information the software looks for is stored on two tracks:
Track one: Cardholderís name and account number
Track two: Credit-card number and expiration date
|My System Specs|
|Similar help and support threads for2: Target data breach exposes serious threat of POS malware and botnets|
|Flashback malware exposes big gaps in Apple security response||Security News|
|Undead botnets blamed for big rise in email malware.||Security News|
|MSFT exposes Firefox users to drive-by malware download||System Security|
|McAfee: New botnets dwarf Conficker threat||System Security|
|Kaspersky breach exposes sensitive database, hacker claims||System Security|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 12:32 AM.