Remove Accountability Remove Authentication Remove Blog Remove Retail
article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer in Brazil, Dimas Volvo, leaked sensitive files through its website. website, belonging to an independent Volvo retailer in the Santa Catarina region of Brazil.

Retail 90
article thumbnail

Why retailers must adopt a Zero Trust approach during this holiday season

CyberSecurity Insiders

This blog was written by an independent guest blogger. Competition has never been fiercer for online retailers, which means it’s not just quality products and customer service that companies must focus on. Today, we’ll delve into the concept of the zero-trust approach and explain why this is the safest option for retailers.

Retail 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Things Retailers Should Know About Cybersecurity

Duo's Security Blog

With growing concerns around security, ransomware and retail breaches, there are a few key considerations that retailers should keep in mind when it comes to protecting their organizations. Retail’s great “digital transformation” sped up, as did the number of data breaches impacting retail. Data breach costs rose from $3.86

Retail 75
article thumbnail

Card-Not-Present fraud (CNP): Five things retailers can do to protect themselves from CNP attacks

CyberSecurity Insiders

This blog was written by an independent guest blogger. Cybercriminals have been well ahead of the curve when it comes to cybersecurity in the online retail industry. Indeed, in recent years, CNP fraud has become the predominant form of credit card fraud, accounting for more than 50% of all credit card-related financial losses.

Retail 54
article thumbnail

Fortinet warns of a spike in attacks against TBK DVR devices

Security Affairs

FortiGuard Labs researchers observed a worrisome level of attacks attempting to exploit an authentication bypass vulnerability in TBK DVR devices. Threat actors are attempting to exploit a five-year-old authentication bypass issue, tracked as CVE-2018-9995 (CVSS score of 9.8), in TBK DVR devices.

article thumbnail

Zix tricks: Phishing campaign creates false illusion that emails are safe

SC Magazine

An Office 365 retail pack. Researchers last week spotted a phishing campaign that leveraged an online email authentication solution from Zix, in hopes that potential victims would be lulled into a false sense of security. Raysonho @ Open Grid Scheduler / Grid Engine, CC0, via Wikimedia Commons).

Phishing 112
article thumbnail

Common Holiday Scams and How to Avoid Them

Identity IQ

Be wary of these common online shopping scams: Fake websites and online stores: Scammers often create fake websites that mimic legitimate retailers, hoping to trick unsuspecting shoppers into entering their personal and payment information. But it also presents an opportunity for scammers to exploit.

Scams 52