Demystifying two common misconceptions with e-commerce security

HTTPS and iframe containers augment security, but are not a panacea for online shoppers and merchants.

Read more

Credit card skimmer targets virtual conference platform

Criminals have gone after an online conference platform to steal credit card data from virtual attendees.

Read more

Mobile network operator falls into the hands of Fullz House criminal group

The Fullz House threat group has struck again, this time inserting a credit card skimmer into a mobile phone operator and seller.

Read more

New web skimmer steals credit card data, sends to crooks via Telegram

Criminals steal payment data from online shoppers by abusing the Telegram instant messaging API, inserting credit card skimming code.

Read more

Credit card skimmer targets ASP.NET sites

This unusual web skimmer campaign goes after sites running Microsoft’s IIS servers with an outdated version of the ASP.NET framework.

Read more

Credit card skimmer masquerades as favicon

Criminals register fake domain to hide their web skimmer as an innocuous image file.

Read more

Criminals hack Tupperware website with credit card skimmer

This latest hack from Magecart threat actors was well planned and executed.

Read more

Lock and Code S1Ep2: On the challenges of managed service providers

On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play’s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.

Read more

Rocket Loader skimmer impersonates CloudFlare library in clever scheme

URLs can be deceiving, but the one used to mimic CloudFlare’s Rocket Loader in the latest Magecart attack takes it to a whole new level.

Read more

A week in security (December 30 – January 5)

A roundup of the previous week’s most notable security stories and events, including new web skimmer techniques, an explanation of edge computing, and more.

Read more

Select your language