Conti Ransomware Group Diaries, Part III: Weaponry

Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it’s like to be an employee of Conti’s sprawling organization. Today’s Part III looks at how Conti abused a panoply of popular commercial security services to undermine the security of their targets, as well as how the team’s leaders strategized for the upper hand in ransom negotiations with victims. Continue reading Conti Ransomware Group Diaries, Part III: Weaponry

New vulnerability lets hackers use your credit card without pin code

By Sudais Asif
The vulnerability was revealed in a report called “The EMV Standard: Break, Fix, Verify.” Every time we make a payment using credit/debit cards, the EMV communication protocol is used for processing payments. Having been deve… Continue reading New vulnerability lets hackers use your credit card without pin code

Man-in-the-Middle Attack Makes PINs Useless for VISA Cards

EMV protocol is vulnerable to a man-in-the-middle attack All VISA credit cards are affected VISA has to issue update for POS terminals Swiss security researchers have discovered a way to bypass the PIN authentication for Visa contactless transactions. … Continue reading Man-in-the-Middle Attack Makes PINs Useless for VISA Cards

Signal Introduces PINs, Slowly Moves to End Reliance on Phone Numbers as Security Measure

The Signal messaging app is getting a new security feature called Signal PINs, allowing users to secure their cloud-stored information in a way not available to anyone else, and that includes the company making the app. More and more messaging apps are… Continue reading Signal Introduces PINs, Slowly Moves to End Reliance on Phone Numbers as Security Measure

Smashing Security #140: Love, PINs, and 8chan

Is the PIN you use for your bank card secure? How did one woman get duped into giving a romance scammer $200,000? And Cloudflare and other online services take aim at a vile corner of the internet…
All this and much more is discussed in the lates… Continue reading Smashing Security #140: Love, PINs, and 8chan

Danish Capital Area Bikes System Goes Down due to Hacking Attack

The computer system for the Danish capital area city bikes program went offline as a result of a malicious hacking attack. On 5 May, the administrators of Bycyklen posted a statement informing the public of a hack that occurred sometime over the previo… Continue reading Danish Capital Area Bikes System Goes Down due to Hacking Attack

8 Tips for a Secure and Frictionless Mobile First Strategy

This blog is based on an article authored by David Vergara, Director of Security Product Marketing, VASCO, that first appeared 2/21/2018 in Credit Union Times. As part of a secure and seamless mobile first strategy, banks, credit unions, and other fin… Continue reading 8 Tips for a Secure and Frictionless Mobile First Strategy