

Justin Fox
Director of DevOps Engineering /*=$expert->feature_status*/ ?>
NuData Security
Comments Dotted :
9
March 27, 2020
Once the consumer payment card data has been skimmed by an attacker that payment card needs to be rendered inoperable.
Web skimmers or Magecart scripts work by taking advantage of an infrastructure vulnerability caused by misconfiguration. The misconfiguration enables an attacker to discover a potentially vulnerable website (using a shotgun approach) and upload the malicious code to service provider. To avoid this type of misconfigurations, it’s useful to comply with standardized security benchmarks – like the one from Center for Internet Security (CIS) which would enable an organization to validate their.....Read More

February 07, 2020
While banks are employing various technologies to identify the true customer online.
Banks and consumers are under continuous attacks by cybercriminals that will try to find any crack in defences to track and step in the middle between consumers and banks. While banks are employing various technologies to identify the true customer online, they just can’t protect them when hackers target consumers. Experts advise never to click on an attachment sent to you, but time and again cybercriminals come up with the most sophisticated method to trick the end user into clicking. From.....Read More

February 05, 2020
This is why organizations need to implement multifactor authentication mechanisms.
Facial recognition is becoming a key technology across industry verticals, including education, voting, dating, and commerce. Instituting physical biometrics identifies individuals based on physical characteristics, which help to authenticate that you are who you say you are. Physical biometrics as an authentication factor is a great start, but, in security, a layered approach is required. A leading security approach should be like an onion. An onion has many layers, so when cybercriminals get.....Read More

January 06, 2020
The entire payment chain needs to be secured on the technology side while paying special attention to the human element.
The Landry breach is a prime example of why all credit card systems have to be secured throughout the payment chain, including devices that are not meant to store credit card information. At the same time, without educating employees, it is only a matter of time before bad actors find the weak spot and capitalize on it. The entire payment chain needs to be secured on the technology side while paying special attention to the human element. Implementing best practices and processes for employees.....Read More

January 01, 2020
Educating end users is not a reliable solution.
Phishing schemes have become extremely sophisticated, targeted and deployed with all the power of social media aimed at stripping end users of their authentication credentials and other sensitive information. With phishing emails, from the moment a user receives a malicious email in their inbox, the clock is ticking - most users will click on links and provide their information, or open a malware infected document in that first hour. Once they do, their credentials are immediately harvested for .....Read More

August 28, 2019
Once your login credentials are compromised, you must consider them compromised for every service provider.
With the usernames, SHA-1 hashed passwords, email addresses, names, and IP addresses of over 14 million Hostinger customers now breached, customers of Hostinger must immediately change their passwords along with any other accounts that they might have reused the same password on. Customers must also consider whether their accounts were fraudulently accessed on Hostinger and other locations online. The migration from a SHA-1 hashing scheme to SHA-256 will greatly improve the security of.....Read More

August 23, 2019
Attackers do not recognise borders, boundaries, or nationalities.
There are three main threats to highlight for financial services organisations. These include social engineering attacks, attacks that take advantage of misconfigurations, and attacks that leverage consumer information from data breaches. A major threat from data breaches is how the data is used in common attacks like credential stuffing and fraudulent account creation to undermine consumer confidence while bypassing many traditional security solutions. Attackers do not recognise borders,.....Read More

August 09, 2019
The experience is frictionless to most consumers (as long as they don’t show signs of risk.
Attackers could have used 3fun to create profiles of the users with both typical profile information and physical location data of its users who are billed as kinky, open-minded people. This can be sensitive information that used for harassment and persecution of LGBTQ+ individuals. Due to the multiple security vulnerabilities in the application, researchers were able to manipulate their session details to change data attributes and collect profile information of other registered users. This is .....Read More

August 07, 2019
For financial institutions, it is important to use a layered approach for consumer identity verification combined with emergent technologies.
With cybercriminals targeting every part of the banking supply chain, including the consumer, consumers must participate in their own security. That means coming up with a unique password that is used in no other place, changing passwords, and demanding multifactor authentication throughout the banking chain. If users employ the same passwords among all their accounts, then cybercriminals will pick the first lock and the rest of their accounts will go down like dominos.
For financial.....Read More
