An Examination of the Security Threats Posed to a Mobile Wallet Infrastructure

Our last article reviewed in depth just what precisely a Mobile Wallet is, and how it works. In summary, it is essentially a mobile app from which you can download from either the App Store or Google Play. Once it has been installed onto your wireless device, you enter in your credit card information, and the next time you are at a local store, you can pay for your products by just tapping your Smartphone onto the Point of Sale Terminal.

Read the source article at InfoSec Resources

New Year, New Goals: 5 Tips to Make 2018 Your Best (Retail) Year Yet

Keeping this in mind, consider how the below 5 tips can help you kick start the New Year right and strengthen your retail efforts to make 2018 your best year yet. Mastercard SpendingPulse recently released numbers which showed that sales grew 4.9 percent over the 2017 holiday season. Know what this means? It means no more blaming the “retail apocalypse” for low sales numbers. It also means no more blaming the category you sell in, either.

Read the source article at ASD Insider

3 Ways to Jumpstart Your Retail Sales

2017 opened on an optimistic note for retailers, with Moody’s forecasting core retail sales increase of 5.4 percent, up from 4.2 percent in 2016. Analysts anticipated that higher employment and wages would drive higher sales. The preliminary results from the holiday shopping season are bearing this out so far, with Cyber Monday posting a 16.8 percent increase from 2016, making for the biggest online shopping day in history to date. Holiday shopping is on track to reach the $100 billion mark.

Read the source article at

LockPoS malware adopts injection technique to evade detection

LockPoS, a point-of-sale malware program discovered in 2017 stealing payment card data from computers’ memory, is now using a new malware injection technique designed to bypass antivirus hooks and evade detection. Hod Gabriel, malware analyst at Cyberbit, reported in a company blog post last week that LockPoS uses three main routines – all of which are exported from ntdll.dll, a core Windows dynamic link library file – in order to inject malicious code into a remote process.

Read the source article at Cybersecurity News and Product Reviews

Forever 21 Breach Lasted Over Seven Months

Encryption was not turned on at some of the point of sale (POS) devices used in Forever 21 stores, exposing customers card data to info-stealing malware last year, the firm has revealed. In an update to November revelations of a major data breach, the fashion retailer claimed that an investigation had found signs of “unauthorized network access and installation of malware on some POS devices designed to search for payment card data.” “The malware searched only for track data read from a payment card as it was being routed through the POS device,” it added. “In most instances, the malware …

Read the source article at Infosecurity Magazine