Since the advent of the computer age and the development of e-commerce booming, the hacker has many rich target. Hackers originally developed for internal systems and huge storage server. But recently, they have been successful to attack large high-profile retailers. In the process, millions of consumers have been victimized, their personal and financial information by hackers looted.
Good hacker to inject malicious software point of sale terminal or cash register retail use (POS terminals). So they just through a common medium can effortlessly initiate infection attacks the retailer.
Once the visit, when the card is completed, it will inject a hacker captures information about all stored in the credit / debit card magnetic stripe behind the name, address, details of the transaction and other malicious software, memory crawl.
Once the information is obtained through the magnetic stripe card credit / debit card, the thieves would try to counterfeit credit / debit card, including additional security information is not available (if they only have a credit card number)
This further allows them to steal valuable information on the black market. Criminals can get the value of tens of millions of cards a good deal, so they take full advantage of the benefits derived therefrom.
According to the US Department of Homeland Security, as of the month of August this year, has more than 1,000 enterprises were sold Backoff terminal malware infection.
Secret Service found that most of the leakage level by allowing remote access tools appear. Remote access tools from Google, Apple, Microsoft and LogMeIn are utilized to perform brute force attacks. These huge brute force guessing attacks by password, allowing anyone to use the tool to suffer.
Remote access tool is called an effective tool regardless of having or personal aspect in the professional field. When you use these tools, users should exercise caution, here are some tips that can help you reduce exposure to hackers: unnecessary remote access tools should be closed.
“Password must be at least 15 or more characters, and should contain letters, special characters and numbers. This will make brute force attacks more time consuming.
“Opening the intrusion detection system, and the use of two-factor authentication when needed identity
“Performing non-standard port to transfer the known defaults
“Choose the right Antivirus important role, use of the latest viruses and threats to keep updated antivirus software, in order to protect against the latest threats.
“If you feel that slow down the system, check, because this is often a feature of the system is infected.
“Remote access can be made better and more high-end security solutions VPN (Virtual Private Network) instead.
“All companies should comply with the agreement they rely on IT supplier or IT department, because it helps you to stick with certain security standards and ensure whether the technical problems have been reviewed
“Implementation correct firewall and advanced formulations to help prevent viral entry system
“Periodic penetration testing and vulnerability scanning
“Web content filtering by the retailer should be done to protect the system from network attacks and Trojan downloader exploits pack
“Retailers should make sure they keep the security software to get the latest updates and access to a centrally planned to be repaired immediately
“Retailers should take advantage of certain policy restrictions employees download the executable file from the Internet or suspicious websites