Biometric Data Provides Increased Security, There Are Risk Factors
As the use of biometric data becomes more widespread, it is important to consider the potential risks associated with its use. While biometric data can provide increased security, there are a number of factors that should be considered when using this type of data....
ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats
Although ChromeLoader may appear to be a run-of-the-mill browser hijacker that merely reroutes users to advertising sites, its use of PowerShell might represent a greater danger by allowing for further and more sophisticated malicious activity such as the spread of...
Follina: A New Microsoft Zero-Day Attack is Now Underway
Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there's a catch. Adversaries are actively exploiting a readily exploitable vulnerability in the Microsoft Support Diagnostic Tool (MSDT) in Windows,...
PCI DSS 3.1: In Review of the Old Standard
Blog The PCI DSS is a set of security standards created by the Payment Card Industry Security Standards Council (PCI SSC). The council was formed by the major credit card companies (Visa, MasterCard, Discover, American Express, and JCB) in 2006 to establish...
PA DSS vs. PCI DSS: Understanding the Differences
Blog Businesses that process, store, or transfer credit card data must adhere to the rules of the two main compliance frameworks in the payments sector: PCI DSS and PA DSS. Software suppliers who create point-of-sale (POS) apps that take credit card...
PCI Password Requirements
Blog Among the myriad of standards to enhance data security, the Payment Card Industry Data Security Standard (PCI DSS) stands out as a critical framework for credit card information organizations. This set of regulations, developed to protect cardholder...
5 Simple Rules for Storing Your Credit Card Information
Storing credit card information can be a daunting task, but there are a few simple rules you can follow to make sure your data is safe. #1 Never store your credit card information on a public computer or in an unsecured location. If you must keep your credit card...
How to Become PCI compliant?
There is no one-size-fits-all answer to this question, as the necessary steps for becoming PCI compliant will vary depending on your organization's specific needs. However, there are some general guidelines that all organizations should follow to ensure compliance...
Zyxel Firewall Bug is Active and Being Used After PoC Exploit Demo Debut
Zyxel firewalls are currently (as of May 2022) under a cyberattack after a critical security flaw was disclosed last week, allowing unauthenticated, remote arbitrary code execution. The flaw, CVE-2020-9054, exists in the XML parser of Zyxel's network-attached storage...
‘Sysrv’ Botnet Targeting Recent Spring Cloud Gateway Vulnerability
Microsoft has discovered a new variant of the Sysrv botnet that includes a recent Spring Cloud Gateway vulnerability in its arsenal. Since at least late 2020, the Sysrv botnet has been active, attempting to exploit known security flaws in access interfaces in order to...