Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Dairy Queen Breach Shines Light On Impact Of 3rd-Party Breaches
Newest First  |  Oldest First  |  Threaded View
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
11/24/2014 | 10:35:30 AM
Re: Data Breach
It might be something to watch but you can be sure theives will be watching as well. Apple better make sure this system is bullet proof or there will be major problems for them.
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
11/24/2014 | 10:26:19 AM
Re: Data Breach
True! But i cannot imagine cash ever going away even if Denmark has decided to try that route. These epayment schemes are another way for companies to shave off a % for themselves. They are much like the thieves who used to clip coins long ago.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
10/17/2014 | 11:09:43 AM
Re: Data Breach
The problem with the payment industry as it currently stands is that every retailer has already purchased the hardware to scan magnetic strips.  Upgrading POS systems to allow NFC or other methods has a cost attached and who knows how fast retailers will upgrade.
bmoore201
50%
50%
bmoore201,
User Rank: Apprentice
10/15/2014 | 7:42:04 AM
Risk Management
Brian, great article. Difficulty exists for large and small companies or retailers to balance cybersecurity needs of the customer and business with those of an organization that is so dispersed....a balancing act faced by everyone to include the individual consumer conducting e-transactions or banking on-line. Articles like yours help to highlight the issues but we need to counter with recommendations on approaches to fixes.  This sort of places 3rd party vendors in a bad light and I am certain not all 3rd parties are knowingly negligent or want to be the subject of someone's next breach article. You do provide recommendation that the company/retailer spend more time reviewing SLAs and vendor cybersecurity hygiene...but there is a lot more to do. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/13/2014 | 9:10:29 AM
Re: Data Breach
Apple Wallet is definitely a payments technology to watch. AppleInsider last week reported on Apple's application for "Methods for Adjusting Near Field Communications Circuitry during Mobile Payment Transactions" to the U.S. Patent and Trademark Office. In includes some technical details about how the payment system works with NFC protocols and the hardware, and software safeguards required to perform secure transactions without physical connection. You can check the AppleInsider piece here.
Ariella
50%
50%
Ariella,
User Rank: Apprentice
10/11/2014 | 8:19:30 PM
Re: Data Breach
I'm sure a lot more people are planning to pay for their ice cream with cash now. 
tjgkg
50%
50%
tjgkg,
User Rank: Apprentice
10/11/2014 | 4:31:40 PM
Data Breach
You sort of wonder how these types of leaks are going to affect the use of Apple Wallet once that gets up and running. I do not use payment apps on my phone or even allow companies to store my credit card info on online accounts so I have been lucky so far but you just never know how intrusive these theives are.


News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18178
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax."
CVE-2020-20214
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20222
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20236
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20237
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.