Remove Computer and Electronics Remove Encryption Remove Retail Remove Risk
article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. Figure 1: Web application breaches in the Retail industry. Fraud and scams move to the web. Source: Verizon DBIR 2020. Securing digital transactions.

Security 143
article thumbnail

Financial services continue to lead in cybersecurity preparedness, but chinks appear in the armor

Thales Cloud Protection & Licensing

Organizations in the finance sector manage trillions of dollars and maintain very valuable and vital electronic data, including bank account, credit card, and transaction information as well as sensitive data related to estates, wills, titles, and other matters. Thu, 09/01/2022 - 05:15. Data security challenges.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. The problem becomes – how do we make sure we’re securing these “driving data centers” against the risks and threats that lurk on the Internet? The same rings true for encryption and authentication. Security isn’t static.

IoT 77
article thumbnail

Attack of drones: airborne cybersecurity nightmare

Security Affairs

There exists a class of tiny and highly maneuverable devices that introduce a variety of cybersecurity risks you probably haven’t considered before. Drones currently occupy a unique legal position as they are classified as both aircraft and networked computing devices. Market overview. Attacks against enterprise-owned drones.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Affected information includes users’ names, email addresses, IP addresses and encrypted passwords. TB LDLC Source (New) Retail France Yes 1,500,000 APROA Source (New) Professional services Argentina Yes 1,197,562 Petrus Resources Ltd. The threat actor, KryptonZambie, listed a 5.93

article thumbnail

The Week in Cyber Security and Data Privacy: 22 – 28 April 2024

IT Governance

Honor, Huawei, iFlytek, OPPO, Samsung Electronics, Tencent, Vivo and Xiaomi Technology. Source (New) Retail USA Yes Unknown Autodesk Source (New) Software USA Yes Unknown DATAIR Employee Benefit Systems, Inc. The vulnerabilities could be exploited to reveal users’ keystrokes and “up to one billion users are affected”.