Thursday, October 10, 2019

Hackers breach Volusion and start collecting card details from thousands of sites | ZDNet

Hackers breach Volusion and start collecting card details from thousands of sites | ZDNet

Hackers have breached the infrastructure of Volusion, a provider of cloud-hosted online stores, and are delivering malicious code that records and steals payment card details entered by users in online forms.

At the time of writing, the malicious code is still on Volusion's servers and is still being delivered to all of the company's client stores.

* * *

The incident is what cyber-security experts call a Magecart attack or web card skimming, where crooks steal payment card details from online shops, rather than ATMs. These types of hacks have been happening for years, but they've intensified over the past two.

Most Magecart attacks take place when hackers use vulnerabilities in self-hosted stores to plant skimmer code on outdated online shops.

But, sometimes, hackers also manage to breach cloud-based platforms -- like Volusion -- or companies that provide widgets, analytics, ads, or other secondary services to online stores.

logo
Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



Many things are taking place:

Teen Hackers Try to Convince Parents They Are Up to Good - WSJ

The first rule of Hack Club is: You talk about Hack Club. The second rule of Hack Club is: You talk about Hack Club.

Teenagers across the country are forming hacking clubs, attending hackathons and trying to spread the word that hacking doesn't always mean breaking into government servers or stealing bank data. Convincing teachers and parents of that isn't always easy.

"My dad was like, 'You're always up to something. You're always on your computer. I don't know what you're doing,' " said 15-year-old Snigdha Roy of Mount Sinai, N.Y. In July, she became executive director of TeenHacks LI, a Long Island club that organizes hackathons, typically one-day events in which students in small teams compete to create apps or websites.

Her parents, she said, finally got looped in about her activities when she had to get their permission to attend a hackathon at the University of Pennsylvania! Volusion® Official Site - Success Starts at Volusion® www. volusion ...The ...One Solution with Unlimited 24/7 Support. Start your Free Trial Now! Stunning Themes · Mobile Commerce Ready · Boost Your Business Ecommerce Software & Shopping Cart Solutions by Volusion Trusted by 40000+ businesses. FREE 14-day trial, no credit card ...!! It took her about two months of showing them her coding projects and putting them in touch with members of her hackathon team before they agreed to let her go to the September event.

Publisher: WSJ
Date: 2019-10-01T09:30:00.000Z
Author: Julie Jargon
Twitter: @WSJ
Reference: (Read more) Visit Source



Two steps you should take to protect your network from hackers | ZDNet

A former director of the UK's secret intelligence service has offered advice on what organisations can do to help stay protected against cyber attacks.

First of all, organisations should be employing two-factor authentication ; something that is relatively simple to rollout.

"If you're not using two factor authentication, you're well behind the game and much more vulnerable. That's the first thing individuals can do," said Sawers, who served as head of MI6 between 2009 and 2014.

Businesses should ensure they're running modern cyber defences with protections against malicious activity inside the network, rather than just relying on firewalls and the like to keep threats out. If attackers breach that perimeter and there are no internal defences then things can go bad quickly, as demonstrated by the NotPetya incident of summer 2017 .

logo
Publisher: ZDNet
Author: Danny Palmer
Twitter: @ZDNet
Reference: (Read more) Visit Source



Presidential Campaign Targeted by Suspected Iranian Hackers, Microsoft Says - WSJ

It didn't appear that the attempted intrusion of an unspecified presidential campaign was successful, Microsoft said. The company also announced that government officials and journalists were targeted by Tehran by cyberattacks.

Publisher: WSJ
Date: 2019-10-04T17:25:00.000Z
Author: Dustin Volz and Robert McMillan
Twitter: @WSJ
Reference: (Read more) Visit Source



Were you following this:

How to keep hackers away

But the oversharing doesn't end there. While shopping online is convenient, never allow a website to store your credit card information; even your fitness tracker can be a liability.

One study showed if you wear it while entering your phone passcode or ATM pin, hackers can use that motion information to guess your code with more than 90% accuracy.

Publisher: WGBA
Date: 2019-10-09T19:29:30.086
Twitter: @nbc26
Reference: (Read more) Visit Source



Iran-linked Hackers Target Trump 2020 Campaign, Microsoft says | Threatpost

A group of hackers tied to Iran has been attempting to break into accounts associated with the 2020 reelection campaign of President Trump, researchers have discovered.

Researchers from the Microsoft Threat Intelligence Center said they first observed activity from a group called Phosphorus in August, the company reported in a recent blog post .

Phosphorus was successful in compromising four accounts not related to the campaign or current or former U.S. officials, Microsoft said. The company worked with those affected to secure the accounts, according to the post.

While the attacks themselves were not “technically sophisticated,” what was significant about them is that attackers used a lot of personal information to identify targets and also to attempt their attacks, according to Microsoft.

Twitter: @threatpost
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment

Featured Post

‘American Idol' Winner Attacked While Busking In New York City Subway

Born and raised in Harlem, New York, Just Sam, like many singers before them, took a chance whe...

Popular Posts