article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

The Verizon DBIR 2020 report indicates that financially motivated attacks against retailers have moved away from Point of Sale (POS) devices and controllers, towards web applications. Figure 1: Web application breaches in the Retail industry. Fraud and scams move to the web. Source: Verizon DBIR 2020. Securing digital transactions.

Security 143
article thumbnail

How Cybercriminals are Weathering COVID-19

Krebs on Security

Most online retailers years ago stopped shipping to regions of the world most frequently associated with credit card fraud, including Eastern Europe, North Africa, and Russia. For example, reshipping scams have over the years become easier for both reshipping mule operators and the mules themselves.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital transformation examples

IBM Big Data Hub

A recent analysis from the IBM Institute for Business Value asked company executives “[…] how they use data to create performance baselines and to understand how applying technologies—for example, cloud, AI, generative AI—might materially improve performance in the parts of the business that generate income.”

article thumbnail

Extending intranets to hard-to-reach staff: Controlled documents kiosk example

ChiefTech

The IBF list the following examples of hard-to-reach staff: factory workers retail staff field engineers building inspectors consultants sales teams flight and rail workers catering staff building inspectors call centre representatives insurance assessors.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Imagine a world where the retail value of your car actually grows over time – that’s now becoming a reality. There is also less hardware and compute power to work in your typical IoT device when compared to traditional devices, so embedding security becomes a matter of choice, rather than necessity. They have design constraints.

IoT 77
article thumbnail

Is email really the nemesis of better collaboration software?

ChiefTech

Following the technology history theme of some of my recent posts ( here and over on CMSWire ), I decided to look back at the history of email to see how strong its claim to the electronic communication 'crown' really is. In 1990, Brownell Chalstrom wrote in CIO magazine that: "electronic mail has taken a while to become indispensable.

article thumbnail

TA505 Cybercrime targets system integrator companies

Security Affairs

For example the theseus function is obfuscated with “divine terms”, one of my favorite was actually the following conditional branch: If pastorale / quetzalcoatl < 57 Then …, which actually was always true ! TA505 hacking group has been active since 2014 focusing on Retail and banking sectors.