From a Hacker's Perspective: How to Breach a Point-of-Sale System

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next From a Hacker's Perspective: How to Breach a Point-of-Sale System-8 Next

Mitigating Attacks

Identify and defend.

To avoid your personal data ending up on the black market, be aware of a number of security technologies that enterprises are deploying and techniques for mitigating the increasing number of attacks. As we saw in the financial industry, threat intelligence sharing is one key component for being alerted of and staying ahead of attacks. If more companies widely share the threat data they have, it's likely to help prevent hackers from being able to breach a system and share your own personal data.

According to the Identity Theft Resource Center, over 500 data breaches have been reported in the United States this year, showing an increase of 27.5 percent over the same period last year.

At the same time, electronic payments have started to outnumber cash transactions, and hackers have taken notice – with an increased number of point-of-sale (POS) system breaches making the headlines. Recent POS hacks, like those on Home Depot and Target, are likely due, in part, to the systems not being properly protected from potential vulnerabilities, which allows for an easy way in.

In this slideshow, Russ Spitler, vice president of product management at AlienVault, discusses the step-by-step analysis from the perspective of a hacker and what he or she would have to do to breach a POS system.

AlienVault is a leading provider of unified security management and crowd-sourced threat intelligence. Its products are designed and priced to ensure that mid-market organizations can effectively defend themselves against today's advanced threats.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.