VeriFone
Trueb EMV Chip Solutions

Security

RDP Bruteforcing Botnet Targeting POS Systems

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

There have been an increasing number of headlines about breaches at retailers in which attackers have made off with credit card data after compromising point-of-sale (POS) terminals. However, what is not commonly discussed is the fact that one third of these breaches are a result of weak default passwords in the remote administration software that is typically installed on these… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Beating fraud with technology faster than the human brain

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Neural networks have played an important role in the fight against card payment fraud for several decades. Once at the cutting edge of technology, their move into mainstream use in the 1990s was viewed as a near science fiction-like development. The technology they are based on allows them to learn from past experience – by monitoring legitimate customer spending behaviour… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Are you staying on top of the fraud game?

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

With 2013 seeing a further increase in online payment fraud, maintaining consumer confidence in payment products is essential and has become that little bit more challenging. In a world of ever larger transaction volumes, the attraction for criminals is obvious. And with fraudsters often apparently one step ahead of the systems put in place to stop them, it is down… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Are you checking out the fraudster’s shopping?

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Merchants want consumers to have an easy, stress free shopping experience. This includes the payment part of that experience. With e-commerce sites often taking consumers to different sites to “validate their online identity”, it is not surprising that some of us will simply give up when confronted with yet another process to complete before our purchase is made. This is… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Secure mobile payment adoption – ECB recommendations a step in the right direction

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

The noise levels around mobile payment are deafening. Just take the scramble for attention at Cartes, Paris. Despite the infatuation with mobile and proliferation of wallets and mPOS devices, the industry has yet to address consumers’ concerns over security, which remains the major stumbling block to widespread adoption of secure mobile payment. Consumer trust matters – a lot. Without a… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

The Cybercriminal’s Dilemma – Bitcoin: A Platform or a Target

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Trusteer’s Security team has recently analysed a malware variant designed to specifically target Bitcoin information, mining and trading sites as well as other virtual currencies platforms. This Citadel variant captures screenshots of a victim’s browser when they browse the following web sites (partial list): BTCsec.com – An informative site about Bitcoin for Russian speakers Bit-Miner.com – Bitcoin mining site bitcoin.org… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

Dissecting Android KorBanker

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter

In a recent blog, FireEye identified a malicious mobile application, Android KorBanker, that installs a fake banking application capable of stealing user credentials. The top-level app acts as a bogus Google Play application, falsely assuring the user that it is benign. FireEye Mobile Threat Prevention platform detects this application as Android.KorBanker. This blog post details both the top-level installer as well… Continue reading >>

EmailFacebookDiggGoogle+LinkedInStumbleUponTwitter