Are the likes of Visa and MasterCard doomed?
When the internet first boomed in popularity, there were a number of industries and activities that analysts and others speculated would soon be “disintermediated”: estate agents (hopefully), traditional media and, of course, many “bricks-and-mortar” retailers. Tags: Industry News more…Google Checkout to shut down in November
Google will retire its Checkout payment processing tool on Nov. 20, and warned retailers they will need to move to a different payment processing platform. Checkout, which launched in 2006, was merged with Wallet, which is a mobile payments tool, last November. The product was aimed at taking on eBay’s PayPal service, which dominates Web-based […] more…Three Key Takeaways from the 2013 Verizon Data Breach Report
It’s that time again, where we look back at the year passed and assess how the threat landscape has changed—for better and for worse. The 2013 Verizon Data Breach Investigations Report (DBIR) reveals that last year was not only defined by the varied nature of cyberattacks, but also by the increased frequency of these incidents in general. […] more…Lack of Chip and PIN technology leaves US shoppers and diners at risk from hackers
Despite being one of the biggest economies for the retail and ‘food and beverage’ industries, the US lacks basic card protection that could prevent data thieves from Americans’ bank accounts. more…How Trust Can Increase Sales and Set Your Business Apart
While online-based businesses may not have the long history enjoyed by their brick-and-mortar predecessors, many helped to pioneer the digital shopping experience and make it what it is today. With that goal in mind, eCommerce merchant Batteries4Less.com was one of the first online stores of its kind, a move that has branded them one of […] more…Visualizing A DDoS Cyber Attack
As you may recall from earlier posts in my blog, a denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for […] more…PCI Compliance Best Practices: 3 Areas to Focus On
With the PCI DSS 3.0 release only 6 months away, compliance should be on every merchant’s mind. Nevertheless, these regulations often come as an afterthought, especially for Level 3 and Level 4 businesses. As the number of online shoppers continues to grow, there are more and more opportunities for cybercriminals to strike. Increased vigilance on […] more…Lautenberg urges feds to probe remote hijacking concerns
Federal authorities have dismissed concerns raised by a security consultant who last week suggested that commercial airliners were vulnerable to remote hijacking by terrorists armed with little more than a smartphone and the right killer app. But U.S. Sen. Frank Lautenberg doesn’t want to take any chances, and New Jersey’s senior senator has written to […] more…PCI Compliance – The Value of Getting Your Business Certified
If you operate an online business that accepts credit or debit cards, then you are probably familiar with the Payment Card Industry Data Security Standards (PCI DSS). We’ve discussed the benefits of PCI Compliance before, and it is crucial to ensure that your business becomes and remains in compliance with these requirements. As more and […] more…US, China to work together on cyber security
China and the United States will set up a working group on cyber-security, US Secretary of State John Kerry said, as the two sides moved to ease months of tensions and mutual accusations of hacking and Internet theft. Speaking to reporters in Beijing during a visit to China, Kerry said the United States and China […] more…Brute Force Attacks and Their Consequences
There is a lot of interesting discussion going on at the moment across the interwebs on the intention of the latest string of Brute Force attacks, much of which I find very interesting. While I can’t repudiate what is being said, I can add my own insight into the anatomy post attack success. How Are […] more…Privacy group calls for changes in CISPA cyberthreat sharing bill
U.S. lawmakers need to make significant changes to a controversial cyberthreat information sharing bill because the legislation could be used to give federal intelligence agencies backdoor wiretapping powers, the Center for Democracy and Technology said. read more more…3 Recent Cybercrimes – Why Security Matters to Your Online Business
The economy is improving, consumer confidence is up, and eCommerce is expected to grow 13% in 2013, all good signs right? Along with these positive signs, the online threat landscape continues to grow as well. In the last two months alone, cyberattacks have not only been high in quantity, but also high in quality, hitting […] more…Internet Slow Today? Global “Biggest Attack Ever” May Be to Blame
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns […] more…Netflix Slow Today? Global “Biggest Attack Ever” May Be to Blame
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns […] more…Chinese Hacking and The Art of War
Finally, there appears to be real alarm in the White House over Chinese cyberattacks. The president recently summoned top corporate leaders to the White House to discuss this growing threat even as he dispatched newly appointed Treasury Secretary Jack Lew to confront his counterparts in Beijing. Here’s what the president should be telling the American […] more…More information
- VMware Patches ‘Hard-to-Exploit’ DoS Vulnerability
- Your Linux-based home router culd succumb to a new Telnet worm, Remaiten
- Researchers dismantle decade-long Iranian cyberespionage operation
- Cloud host Linode resets user passwords after suspected hack
- Microsoft’s latest countdown: Update Windows 8.1 before Tuesday
- Did the crooks who broke into Target tailgate the cleaners?
- Mirai Botnet Starts Exploiting OMIGOD Flaw as Microsoft Issues More Guidance
- Microsoft SharePoint CVE-2015-6117 Security Bypass Vulnerability
- LTE, 5G Vulnerabilities Could Cut Entire Cities From Cellular Connectivity
- Air Charter Firm Solairus Aviation Suffers Data Breach