Up to 40 percent of traffic on ticket sites is automated. Here’s why that’s bad for security.

If you have rushed to score exclusive concert tickets online, the chances of you competing against a human are dwindling. According to new research, nearly 40 percent of traffic to ticketing websites is made up of bots, automated programs used by brokers and cybercriminals to do everything from denying customers inventory and scalping tickets to taking over customer accounts to commit fraud. An analysis of 26.3 billion requests from 180 websites reveals that bad bots made up 39.9 percent of ticketing traffic between September and December 2018, according to the bot mitigation company Distil Networks. Seventy-eight percent of bots evaded detection by relying on human-like behavior, and most (42.2 percent) targeted the primary ticket markets, compared to 23.9 percent that hit secondary markets. Distil suggested this kind of bot traffic hurts ticket sellers by making it more difficult to purchase tickets, which results in frustrated fans and artists complaining on […]

The post Up to 40 percent of traffic on ticket sites is automated. Here’s why that’s bad for security. appeared first on CyberScoop.

Continue reading Up to 40 percent of traffic on ticket sites is automated. Here’s why that’s bad for security.

Taylor Swift, KringleCon, & 3D Head – Paul’s Security Weekly #586

How Taylor Swift used Facial Recognition to Thwart Stalkers, unlocking android phones with a 3D printed head, Ticketmaster fails to take responsibility for malware, and it’s December of 2018, To Hell with it, Just patch your stuff already! Paul&#… Continue reading Taylor Swift, KringleCon, & 3D Head – Paul’s Security Weekly #586

Here’s how to defend your enterprise from Magecart

Magecart, a tool used by a broad set of hackers to steal online payment data, has been rampant in recent months. The group has allegedly breached popular websites like those of British Airways and Ticketmaster UK by injecting malicious scripts directly or through third-parties to siphon off customer data en masse. With the body of forensic evidence tied to Magecart growing, researchers with analytics company Securonix have released recommendations for defending against the groups. The goal is keep online vendors from being Magecart’s next high-profile scalp. The threat data can “increase the chances of early detection of this, and potentially other future variants of the Magecart malicious threat actor activity on your network,” Securonix’s Oleg Kolesnikov and Harshvardhan Parashar wrote in a research paper. There are at least three data channels that organizations need to monitor to boost their chances of detecting Magecart, according to Kolesnikov and Parashar: web server […]

The post Here’s how to defend your enterprise from Magecart appeared first on Cyberscoop.

Continue reading Here’s how to defend your enterprise from Magecart

Magecart Cybergang Targets 0days in Third-Party Magento Extensions

Over two dozen third-party ecommerce plugins contain zero-day vulnerabilities being exploited in a recent Magecart campaign. Continue reading Magecart Cybergang Targets 0days in Third-Party Magento Extensions

Newegg, Ticketmaster, & iOS 12 – Application Security Weekly #33

In the Application Security News, Hackers stole customer credit cards in Newegg data breach, John Hancock now requires monitoring bracelets to buy insurance, the man who broke Ticketmaster, new security settings available in iOS 12, State Department co… Continue reading Newegg, Ticketmaster, & iOS 12 – Application Security Weekly #33

Mobile Phone Call Scams, Pegasus Mobile Spyware, Newegg Data Breach – WB35

This is the Shared Security Weekly Blaze for September 24, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket.  This episode was hosted by … Continue reading Mobile Phone Call Scams, Pegasus Mobile Spyware, Newegg Data Breach – WB35