New virus attacks when you swipe your debit card

January 19, 2014

Virus_attacks_debit_cardNew Delhi, Jan 19: Cyber security sleuths have detected a "black" private information stealing virus in the Indian online banking transactions space and have alerted consumers who swipe debit or credit cards at shopping counters to make payments.

The "severely" spreading virus of the Trojan family has been detected conducting its clandestine operations at the Point of Sale (POS) counters placed at retail terminals after the RBI made it mandatory in December last year for debit cards holders to punch in their PIN every time they make a purchase.

The virus named "Dexter, black POS, memory dump and grabber" can acquire seven aliases when infecting a system and once it is successful in breaching the security protocols of a POS terminal, it steals confidential data like card holder's name, account number, expiration date, CVV code and other discretionary information which could lead to financially compromising and phishing attacks on the card at a later stage.

"It has been reported that malware campaigns targeting payment card processing, point-of-sale (POS), check out systems or equipment are on the rise.

"The common infection vectors for POS system malwares includes phishing emails or social engineering techniques to deliver the malware, use of default or weak credentials, unauthorised access, open wireless networks along with the methods of installing malware as a part of service," a latest advisory issued to the public by the Computer Emergency Response Team (CERT-India) said.

The CERT-In is the nodal department to protect Indian cyberspace and software base infrastructure against any destructive and hacking activities.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 16,2020

Mumbai, Mar 16: Shri Sai Baba sansthan trust on sunday appealed to devotees to postpone their visit to Shirdi for a few days in view of coronavirus outbreak in the country.

"As per the directives of the government, I request the devotees to postpone their visit to Shirdi for a few days," said Arun Dogre, Chief Executive Officer of Shri Sai Baba sansthan trust, Shirdi.

On Saturday, the Siddhivinayak temple located in Prabhadevi has instructed all its employees to wear masks, while hand sanitizers have been provided to everyone inside the temple.

Speaking to news agency,Siddhivinayak trust chairman , Adesh Bandekar had said, "We are providing sanitizers to all the devotees in the temple and where they stand in a queue holding the railings, are being cleaned in every 30 minutes."

Coronavirus, which originated in China's Wuhan city, has so far spread to more than 100 countries infecting over 1,20,000 people. In India, 107 persons, including foreign nationals were tested positive till March 15 at 12 pm.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
January 24,2020

Mangaluru, Jan 24: Aditya Rao, who was arrested for planting Improvised explosive device (IED) at Mangaluru airport on January 20, was brought to the airport on Friday for recreation of the crime scene as part of the investigation process.

Yesterday, one more case was registered against Rao in connection with a hoax call to the terminal manager of the airport on January 20, police said.

"One more case has been registered against Aditya Rao at Bajpe Police station for a hoax call to the terminal manager of Mangaluru International Airport on January 20," said PS Harsha, Mangalore Commissioner of Police on Thursday.

Earlier, Harsha informed that Rao, who surrendered before the Bengaluru Police, is now in the custody of Mangaluru Police.

"Our investigation team arrested Aditya Rao in Bengaluru in connection with the planting of an explosive device at Mangaluru airport. We produced the accused before Bengaluru's first JMFC court and the court issued a transit warrant," Harsha said.

"We have brought him to Mangaluru from Bengaluru and now the accused is in our custody. Our investigation team will interrogate him. We will investigate all aspects. He will be produced before Mangaluru 6th JMFC Court," he added.

Rao hails from Udupi and has engineering and MBA degrees.

According to the police, the IED was recovered from a bag at the Mangaluru airport. It was later defused in an open field by the personnel of the bomb disposal squad.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 20,2020

Bengaluru, Apr 20: Close on the heels of the Padarayanapura vandalism, Karnataka Cabinet on Monday decided to promulgate an ordinance that gives special powers to implementing authority and also provide protection to frontline health workers.

Briefing media after the Cabinet meeting here, Minister for Law J C Madhuswamy said that the ordinance will be on the lines of one promulgated by Kerala and Uttar Pradesh governments.

“Through the ordinance, a State Epidemic Act will be enacted to protect health workers and any non-cooperation will be punishable. Also, any attempt to deliberately spread the disease or float rumours will attract action,” he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.