Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dairy Queen Breach Shines Light On Impact Of 3rd-Party Breaches
Newest First  |  Oldest First  |  Threaded View
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
11/24/2014 | 10:35:30 AM
Re: Data Breach
It might be something to watch but you can be sure theives will be watching as well. Apple better make sure this system is bullet proof or there will be major problems for them.
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
11/24/2014 | 10:26:19 AM
Re: Data Breach
True! But i cannot imagine cash ever going away even if Denmark has decided to try that route. These epayment schemes are another way for companies to shave off a % for themselves. They are much like the thieves who used to clip coins long ago.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
10/17/2014 | 11:09:43 AM
Re: Data Breach
The problem with the payment industry as it currently stands is that every retailer has already purchased the hardware to scan magnetic strips.  Upgrading POS systems to allow NFC or other methods has a cost attached and who knows how fast retailers will upgrade.
bmoore201
50%
50%
bmoore201,
User Rank: Apprentice
10/15/2014 | 7:42:04 AM
Risk Management
Brian, great article. Difficulty exists for large and small companies or retailers to balance cybersecurity needs of the customer and business with those of an organization that is so dispersed....a balancing act faced by everyone to include the individual consumer conducting e-transactions or banking on-line. Articles like yours help to highlight the issues but we need to counter with recommendations on approaches to fixes.  This sort of places 3rd party vendors in a bad light and I am certain not all 3rd parties are knowingly negligent or want to be the subject of someone's next breach article. You do provide recommendation that the company/retailer spend more time reviewing SLAs and vendor cybersecurity hygiene...but there is a lot more to do. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/13/2014 | 9:10:29 AM
Re: Data Breach
Apple Wallet is definitely a payments technology to watch. AppleInsider last week reported on Apple's application for "Methods for Adjusting Near Field Communications Circuitry during Mobile Payment Transactions" to the U.S. Patent and Trademark Office. In includes some technical details about how the payment system works with NFC protocols and the hardware, and software safeguards required to perform secure transactions without physical connection. You can check the AppleInsider piece here.
Ariella
50%
50%
Ariella,
User Rank: Apprentice
10/11/2014 | 8:19:30 PM
Re: Data Breach
I'm sure a lot more people are planning to pay for their ice cream with cash now. 
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
10/11/2014 | 4:31:40 PM
Data Breach
You sort of wonder how these types of leaks are going to affect the use of Apple Wallet once that gets up and running. I do not use payment apps on my phone or even allow companies to store my credit card info on online accounts so I have been lucky so far but you just never know how intrusive these theives are.


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21394
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-22497
PUBLISHED: 2021-04-12
Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue.
CVE-2021-3163
PUBLISHED: 2021-04-12
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field.
CVE-2019-15059
PUBLISHED: 2021-04-12
In Liberty lisPBX 2.0-4, configuration backup files can be retrieved remotely from /backup/lispbx-CONF-YYYY-MM-DD.tar or /backup/lispbx-CDR-YYYY-MM-DD.tar without authentication or authorization. These configuration files have all PBX information including extension numbers, contacts, and passwords.
CVE-2021-21524
PUBLISHED: 2021-04-12
Dell SRM versions prior to 4.5.0.1 and Dell SMR versions prior to 4.5.0.1 contain an Untrusted Deserialization Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability, leading to arbitrary privileged code execution on the vulnerable application. The severity is Cr...