Remove 2018 Remove Mining Remove Retail
article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ).

Retail 66
article thumbnail

Oracle critical patch advisory addresses 284 flaws, 33 critical

Security Affairs

The flaw also affected the Financial Services Analytical Applications Infrastructure, the Fusion Middleware MapViewer, and four three Oracle Retail components. The bug affected the OCA’s Diameter Signalling Router component and its Communications Services Gatekeeper.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Evolution of threat landscape for IoT devices – H1 2018. Adobe issued a critical out-of-band patch to address CVE-2018-12848 Acrobat flaw. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. Flaw in Western Digital My Cloud exposes the content to hackers.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Some 27 percent of IT professionals who partook in a survey conducted by next-gen firewall supplier Imperva at RSA 2018 reported receiving more than 1 million security alerts daily. In many cases the tedious, first-level correlating of SIEM logs to sift out threats has moved beyond human capability.

article thumbnail

MY TAKE: Can ‘Network Traffic Analysis’ cure the security ills of digital transformation?

The Last Watchdog

NTA refers to using advanced data mining and security analytics techniques to detect and investigate malicious activity in traffic moving between each device and on every critical system in a company network. It was one of the more fascinating conversations I had on the floor at Black Hat USA 2018. Remember how Target got hacked?

article thumbnail

Aussie Telcos are Failing at Some Fundamental Security Basics

Troy Hunt

pic.twitter.com/KiaGNKhaig — Troy Hunt (@troyhunt) March 1, 2018. This screen faces out into the retail store with people constantly wandering past it only a couple of meters away, well within the distance required to observe the contents off it. — Geoffrey Huntley (@GeoffreyHuntley) March 27, 2018.

article thumbnail

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI

CGI

Wed, 10/31/2018 - 03:39. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation. The 2018 CGI Client Global Insights reveal that utilities recognize data as the new “digital capital.”