Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Vulnerability Management

11/19/2018
11:30 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

7 Holiday Security Tips for Retailers

It's the most wonderful time of the year - and hackers are ready to pounce. Here's how to prevent them from wreaking holiday havoc.
2 of 8

1. Promotions Should Have Coupon Codes, not Links
Sophos' Wisniewski says retailers should not send promotions via email with links. Instead, they should invite customers to log onto retailer.com/blackfridaydeal and give them a numerical customer code to enter on their websites. With the code, customers can be assured it's a safe website and the promotion really is from the store they hope to purchase the item.
Image Source: Pixabay

1. Promotions Should Have Coupon Codes, not Links

Sophos' Wisniewski says retailers should not send promotions via email with links. Instead, they should invite customers to log onto retailer.com/blackfridaydeal and give them a numerical customer code to enter on their websites. With the code, customers can be assured it's a safe website and the promotion really is from the store they hope to purchase the item.

Image Source: Pixabay

2 of 8
Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
MarkSindone
50%
50%
MarkSindone,
User Rank: Moderator
12/22/2018 | 12:53:41 AM
Brand versus no brand
I don't know why people would go to a website that wasn't guaranteed to be a legitimate one, even over the holiday periods. I mean, I can get cheap China knock-offs, but if things are already on sale at a reputable branded place, that's what getting a good deal is about right?
PaulChau
50%
50%
PaulChau,
User Rank: Apprentice
12/27/2018 | 9:14:02 AM
Security lax
It is important to note that if we have not been hit before by online attacks, that does not mean that we will never get hit. It is important to still implement these security tips and guidelines if we want our business to prevail even after the holidays. It might just be too late if we think that we are safe and there is no lax in our systems.
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-4147
PUBLISHED: 2019-09-16
IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 158413.
CVE-2019-5481
PUBLISHED: 2019-09-16
Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
CVE-2019-5482
PUBLISHED: 2019-09-16
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
CVE-2019-15741
PUBLISHED: 2019-09-16
An issue was discovered in GitLab Omnibus 7.4 through 12.2.1. An unsafe interaction with logrotate could result in a privilege escalation
CVE-2019-16370
PUBLISHED: 2019-09-16
The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algorithm, which might allow an attacker to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.