Results for "skimming"
July 18, 2019 - We take a look into a Magecart group's web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.
Skimming is a type of fraud targeting automated teller machine (ATM) and point-of-sale (POS) terminals wherein a device (called a skimmer) or malware is used to steal information from your credit or debit card’s magnetic strip. For more information, see this blog post on ATM skimming.
August 12, 2014 - With the growing reports of ATM skimming, it pays to refresh ourselves of the fraudsters tactics and ways on how we can combat them.
Shimming is hailed as an upgraded version of skimming. Instead of stealing information from your debit or credit card’s magnetic strip, it steals from their EMV chip. For more information, see this blog post on the various types of ATM fraud and scams.
May 29, 2019 - If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.
May 21, 2019 - Even e-commerce sites that do not take payment information themselves can be abused by crooks. In this post, we show how a web skimmer is able to inject an artificial iframe into the checkout page to prompt users for their credit card information. Victims will only realize something's not right when they are redirected to the real (and external) payment form.
May 6, 2019 - A roundup of security news from April 29 - May 5, covering Electrum botnet, Wall Street Market takedown, privacy news, and the state of cryptojacking.
April 26, 2019 - Magecart threat actors upload their skimming code onto GitHub in the latest attack against Magento websites.
March 5, 2019 - Our survey and accompanying report find that, no matter their age, users have deep concerns about the privacy of their data online and take significant steps to secure it. Learn how public distrust in corporations' ability to protect and use data in ethically responsible ways has shaped their behavior online.