Skip to main content

Home/ Hospitality Technology/ Group items tagged malware

Rss Feed Group items tagged

natalieemmanuel

Point-of-sale malware has now infected over 1,000 companies in US | Ars Technica - 0 views

  • According to the US-CERT advisory, the group behind the Backoff malware operation scanned the Internet to find potential victims by detecting installations of the remote-desktop software frequently used by service providers to manage the point-of-sale systems of their retail clients. The attackers look for remote desktop solutions like Microsoft’s Remote Desktop, Apple's Remote Desktop, Chrome Remote Desktop, Splashtop 2, Pulseway, and LogMeIn, according to the advisory. Once a potential target is identified, the group uses the equivalent of a digital sledgehammer, attempting to break into the system using a list of common passwords.
  • Such techniques are a common threat to small retail businesses, according to Trustwave, who helped the government agencies in their analysis of and response to the 'Backoff' program. A third of cybercrime attacks on businesses focused on the point-of-sales systems in 2013, according to the company's 2013 Global Security Report. In 31 percent of incidents, attackers exploited weak passwords to gain access to targeted systems
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
  •  
    It is hard to forget how thousands of Target customers financial information was compromised last year due to a breach in security of the company's POS. Target is not the only company that has been infected with this program that steals credit and debit card information. Actually, there have been more than a thousand businesses affected by this malware that has come to be called "Backoff." The malware targets POS systems and has stolen millions of credit card numbers as well as personal information on millions of customers. A large majority of cybercrime is focused on attacking business's POS systems. The malware attacks systems by going through a list of common passwords until it is able to hack the system. "Backoff" then disguises itself as a compatible Java component and collects credit card information. However, Apple has recently announced Apple Pay and many believe this can diminish a lot of cybercrime.
Catherine Gibson

New 'Dexter' malware strikes point-of-sale systems | Security & Privacy - CNET News - 0 views

  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  • Rather than targeting thousands of individual machines through traditional Trojans or phishing emails, the custom-made malware targets specific POS systems. The malware injects itself into the file iexplore.exe in Windows servers before hijacking process lists, stays active through rewriting in the registry key, and then scrapes sensitive credit card data from the server -- before transferring it through a remote command and control (C&C) system.
  •  
    This article is about a new and advanced malware called Dexter that is targeting POS systems. The article reports that 30% of the infections are in the US (world wide). When the virus attacts the POS it steals credit card information that can be used to make duplicate credit cards to be used. There is software to help fight off the virus however people have never seen this kind of virus because of the power it was to attack the system, so this is something to be on the look out for.
mattiebell

Hilton Hotels Hit By Payment Malware - 0 views

  • Hilton has revealed that some of its payment systems have been infected with malware that organised the theft of targeted customer informat
  • ion.
  • nfected POS (Point of Sale) systems in hotels.
  • ...6 more annotations...
  • i
  • we identified and eradicated unauthorised malware that targeted payment card information in some point-of-sale systems at our hotels
  • 54 North American locations were compromised by point-of-sale malware
  • hospitality service providers face extraordinary challenges with customer data security at point of sale (POS)
  • often the weak link in the chain and the choice of malware,
  • Encrypting the data in the card reading terminal ahead of the POS eliminates the exposure of live information in vulnerable POS systems
  •  
    This article is about the POS system at Hilton hotels and how it was breached by malware that put consumer data at risk. I found this article interesting because Hilton does not use unattended POS systems, which are what are most commonly targeted in information phishing attacks. This is definitely something that affects all aspects of the hospitality industry, and we know that consumer data is very sensitive. Hotels and other hospitality agencies are trusted to maintain high levels of confidentiality. It would be interesting to see how such a malware would have affected a smaller company with less counterattack resources.
anonymous

11 Tips to Improve Your Restaurant's Cyber Security in the COVID-19 Era | FSR magazine - 0 views

  • wealth of client data on tap from places with lax security
  • unknowingly serve credit card data to hackers. Due to the volume of credit card transactions and CRM data available, restaurants need to take cybersecurity seriously before a criminal gets wind of the vulnerability
  • A hacker only needs to gain access to a restaurant's POS system and install malware to steal customer credit card details.
  • ...20 more annotations...
  • Take Chipotle, for example. The company got devalued by about $400 million after they suffered a data breach.
    • anonymous
       
      Major consequences for restaurants if discovered as the link
  • because most go belly up six months after an attack.
  • Unprotected WiFi
  • Criminals pretend to be from the U.S. government and inform targets their COVID-19 stimulus check is ready, but they would need to verify the details of the recipient first before they can send it.
    • anonymous
       
      Low level scammer
  • CRM software data, which may include names, addresses, and even birthdays. One of the most common ways to achieve this sort of attack is via malware (malicious software). Hackers find a vulnerable backdoor to a restaurant's network to install malware on the POS system. Malicious code then records every transaction and every detail, sending it back to the criminal's server over the internet.
  • GrubHub drivers scam both the restaurants and the customers by marking the deliveries as complete and pocketing the tip money, without bothering even to pick up the order from the establishment.
    • anonymous
       
      AHHHH
  • Businesses are scrambling to find suppliers amidst the chaos, and criminals have been taking advantage of the confusion
  • Scammers are posing as representatives from the World Health Organization (WHO), the Center for Disease Control (CDC), and other public health agencies
  • social engineering on the restaurant staff to pull off phishing attacks.
  • PCI compliant.
  • conduct a risk analysis
  • hiring a security expert either full time or as a consultan
  • Secure your network and always change the free WiFi access point's password with a strong one every day.
  • latest operating system updates
  • Force multi-factor authentication
  • strong passwords
  • Ensure sensitive data encryption
  • web-filter to secure your WiFi network
  • Install a robust security software program on all computers and devices to block, detect, and clean malware.
  • Conduct regular cybersecurity training
  •  
    Restaurants have always been an easy target for cyber security hackers, in particular, hackers who are looking for credit card and ID information. Restaurants provide hackers with a "wealth of client data" due to the high "volume of credit card transactions and CRM data available." Once given access, a hacker could simple install malware and duplicate all customer information. Already facing critical financial issues during Covid 19, restaurants large and small need to take a stronger presence in the protection of their data. If discovered to be the start of a breach, customers will tend to avoid that business. "Chipotle, for example...got devalued by about $400 million after they suffered a breach," and many small restaurants "go belly up six months after an attack." Below is a summary of the types of attachs restaurants face: 1. Unprotected Wifi 2. Social engineering and phishing attacks. This is actually the one that stood out to me the most because of how sophisticated these attacks can be. It is a reminder that we are all at risk, both the technologically challenged and gifted. 3. Malware 4. Covid 19 Scams 5. Grub hub scams 6. Supply chain scams *A particular issue for restaurants and commercial businesses right now as companies scramble to find new vendors who can supply them with the products they require. 7. Public Health scams 8. Government Stimulus scams 9. Technical support scams How can we fight against these? Here are the recommendations: 1. PCI compliance 2. Hire and IT security professional to conduct a risk analysis and if possible, keep on as a consultant or full time 3. Keep a secure network and change free passwords daily 4. Use the latest operating systems, force multi-factor authentication, strong passwords, and use encryption services for data storage and transfers 5. Install and use robust web-filters and security software programs 6. Maybe most important!!! Train your employees. 5.
yiran DING

9 Tips To Block Hotel Wi-Fi Malware - Security - Mobile Security - - 0 views

  • 9 Tips To Block Hotel Wi-Fi Malware
  •  
    FBI issues warning to people traveling abroad that free Wi-Fi systems can pose a threat. Malware and other attacks on hotel wi-fi has become a bigger and bigger threat for hotel internet users.  This artical introduced 9  tips to use wi-fi safely.  1. Update Before Leaving 2. Block Pop-Ups  3. Handle Free Wi-Fi With Caution 4. Read Hotel Wi-Fi Directions 5. VPN Tunneling Secures Free Wi-Fi  6. Download Software Updates Directly From Vendors 7. Beware Wired Hotel Connections 8. Consider Using A "Burner" Laptop  9. Don't Be Afraid To Hibernate  All these tips indicate that to use internet safely, we should be alter to potential risks, be wise and have a good habit when access internet. 
Grant Beck

FBI: Beware Of Malware Installed Via Hotel Networks - Forbes - 0 views

  • fake software updates booby trapped with malware that are being pushed through hotel internet connections .
  • malware that are being pushed through hotel internet connections.
  •  
    This article brings to light security threats that are transfered via hotel networks. Fake software updates are used to hide malware which is installed on the computer when the update is accepted. The FBI offers tips on how to avoid being exposed to this after data on several hundred firms was stolen by hackers. The hackers broke into Marriott International Inc.'s records and had access confidential information. This article is important because firms have the responsibility of providing security for the clients as well as themselves. It is important to be aware of threats like this and of how it can be avoided so that the firm isn't put in a bad situation and have to deal with stolen information. With mobile devices and wireless networks becoming more common these types of threats need to be taken into consideration. Most users don't read the fine print or consider where software updates are coming from, especially if it looks like the source is a hotel they are staying at. This makes it even more critical that the hotel is aware of and blocking these threat because claiming that it was done without the knowledge of the hotel may not always be enough and looks badly for the security.
Charlesque Moses

Malware that steals from point-of-sale systems detected - SC Magazine - 0 views

  • A data stealer designed to collect users' personally identifiable information from point-of-sale (POS) systems has been detected.
  • "Given the wealth of data found on these payment hubs, it's expected that these are the next targets of cyber criminal activities.”
  •  
    This article contains information about the detection of data stealing malware by researchers in an Israel-based company (Seculert). Follow up research discovered that malware was found in POS systems in hotels and other businesses as well. It is believed that the payment hubs are the next cybercriminal targets. In the article, it explains what the malware was and how to identify it. Researchers agree that it doesn't directly infect the systems, but was created to make analysis difficult. Though it is relieving that this malware had been detected, it shows the importance of higher security for POS systems. So many payments are made through these systems. Any attacks can jeopardize the privacy of customers' payment information and company information. This could lead to a distrust issue and could end badly for companies. So, the security definitely needs improving. However, it should be remembered that hackers get smarter daily. So, information will not always be safe. This leads to the need of companies to constantly improve their security. It would be a good start.
elena_martynova

Why Cybersecurity in the Hotel Industry Should be a Joint Effort - 3 views

  • The global hospitality industry now sits in the top three of industries most frequently targeted by hackers, according to the 2015 Trustwave Global Security Report.
  • Thieves have seized the opportunity to capitalize on the wealth of data that passes through varying weak spots in hospitality networks, and they're now looking for more than just credit card data. Hotels hold contact details, travel plans, air miles, birth dates, passport data and personal preferences on millions of guests - all of which can be used by criminals in a multitude of ways, ranging from fraud to extortion.
  • According to the aforementioned report, 65 percent of the hospitality industry's security breaches were via point-of-sale (POS) systems, with weak remote access security contributing to 44 percent of those compromises.
  • ...6 more annotations...
  • But a number of breaches also affecting the industry targeted booking partners - companies that facilitate reservations on behalf of the hotel brands for services such as air travel, car rental and room bookings.
  • Regardless of where the initial breach occurs, one thing is certain: if customers can't rely on a brand's booking system, they will simply go elsewhere. Statistics show that nearly one in five shoppers have dropped out of an online travel booking because of security concerns around payment.
  • Understanding where critical data lives within your enterprise and how it moves, both internally and outside of the organization, is paramount.
  • POS attackers often take advantage of vulnerabilities, from configuration errors like easy-to-guess passwords to underlying flaws in the system itself, to access payment terminals and plant malware.
  • it is critical that hotel chains - and their partners - have experts regularly conduct deep-dive penetration to sniff out potential vulnerabilities before criminals can take advantage of them.
  • To mitigate the potential damage caused by unidentified malware, hoteliers and their partners should implement intrusion detection, security management and threat intelligence services, as well as scan inbound and outbound communication to flag data-stealing malware in real time and prevent information from leaving the door
  •  
    This article tells us about the fact, that now days the global hospitality industry is one of the industries which is most frequently targeted by hackers. In order to avoid any attacks there must be tighter control across a hotel and its network of partners. So the main 3 aspects which will help to avoid attacks are: -assess risks everywhere -protect the POS system -find malware and keep data protected
sdavi111

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
armanyleblanc767

Data Security in Hospitality: Risks and Best Practices - 0 views

  • Best practices for companies in the hospitality sector to protect data include:
  • Always encrypt payment card information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  • groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ...23 more annotations...
  • five of the biggest data security concerns in the hospitality industry and highlights some best practices for protecting hospitality data.
  • Data Security Concerns in Hospitality
  • complex ownership structures
  • From the perspective of cybercriminals, hospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • challenge to maintain teams of well-trained staff.
  • t was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • can go unnoticed for months.
  • High Staff Turnover
  • In the U.K., for example, the job turnover rate in hospitality is as high as 90 percent.
  • Reliance on Paying By Card
  • t involves employees selling data to third parties without the knowledge of the organization that employs them.
  • Insider Threats
  • Compliance
  • Hotels, motels, resorts, and rented apartment complexes all gather and electronically store a range of sensitive personal guest data, such as names, phone numbers, addresses, and credit card details.
  • The high level of turnover and high degree of staff movement between different locations makes it a real challenge to maintain teams of well-trained staff
  • Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • ospitality appears to offer an ideal target vector for conducting crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • ybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data
  • A case in point was the Wyndham Worldwide breaches of 2008 and 2010. Hackers gained access to the systems of an individual operating company through easily guessed passwords, and the attack easily proliferated through the entire corporate network, with the result that 619,000 customers had their information compromised.
  • While GDPR protects individual data within the EU and EEA, its ramifications have rippled through industries globally, and organizations are realizing the need to put greater compliance measures in place. PCI DSS is another important global regulation that protects credit card data, and fines for non-compliance begin at $500,000 per incident. The risk here is not just to data security but to the future survivability of hospitality companies, many of which would not be able to absorb the s
  • This type of data risk is more subtle and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Always encrypt payment ca
  • rd information. Operate a continuous training program in cybersecurity to maintain a well-trained workforce. Always adhere to relevant regulations, such as PCI DSS. Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats. Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker. Know where your data is and enforce the principle of least privileges to limit access to sensitive information.
  •  
    This article highlights several important security issues in the hospitality industry, followed by the practice of protecting data from loss. The data structure of the hotel industry is complex, customers mainly use bank cards to pay, and the staff turnover rate is high. There are certain internal threats. In order to solve these problems and avoid data loss, it is not enough to strengthen network security. It is also important that employees are trained and familiar with and comply with relevant regulations.
  • ...3 more comments...
  •  
    Data security is a major issue in the hospitality industry. A lot of personal information is stored on the computers specifically credit card information of the guests staying at the hotel. It is the responsibility of the hotel to ensure that the data is protected. High turnover rate in the industry can make this an even bigger challenge. Ensuring that your staff is properly trained to ensure the highest level of security is maintained is highly important.
  •  
    This article speaks about the data security concerns in hospitality. Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there's a franchisor and a management company that acts as the operator. Businesses use different computer systems to store information. The nature of the hospitality industry is such that it is extremely reliant on cards as a form of payment. Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. A vital part of protecting data is training staff to securely gather and store personal information. Well-trained staff also know how to recognize social engineering attempts and they understand an organization's compliance requirements. Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests' data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data. Some of the best practices for companies in the hospitality industry to use are: always encrypt payment card info, operate training programs in cybersecurity regularly to keep everyone informed, adhere to regulations, know where the data is, and enforce limit access to sensitive info, and more.
  •  
    This article explains how data security is at an all time high in the hospitality industry. Focuses on the 5 security concerns and what are some practices that leadership can help employees detect when someone is trying to hack into sensitive information. Also, making sure employees are in compliance with company policy when leaving the company if they have access to sensitive data and making sure employees are not using to their advantage when leaving the company.
  •  
    Hospitality offers an ideal target vector for conducting Cyber crimes such as identity theft and credit card fraud due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII). Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures with an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  •  
    In this article, we learn about the top five data security risks as well as best practices to help prevent data breaches. According to the article, the hospitality industry is a prime target since it stores a vast amount of sensitive guest information like names, phone numbers, addresses, and credit card numbers. Some of the five risks included complex ownership structures, reliance on paying by card, and insider threats to name a few. In order to avoid these threats, the article suggest that companies become PCI compliant, use cybersecurity measures like firewalls, and know where exactly their data is stored.
Camila Calcines

Do travel companies need to revisit mobile security choices for staff? | Tnooz - 0 views

  • large target on Android’s back because of it’s leading global market share position.
  • security was what made Blackberry the darling of IT departments everywhere.
  • Security, and the desire to penetrate corporate accounts, is also what is driving Samsung’s Knox platform,
  • ...5 more annotations...
  • Apple holds 58% share of enterprise mobile deployments.
  • Transportation was one of the few industries where Android had the majority share.
  • American Airlines is one of the most aggressive companies in the use of tablets for its workforce
  • Samsung’s SAFE – Samsung for Enterprise – platform (which incorporates Knox) was a key reason in their decision:
  • Apple devices, while targeted about 100x less frequently than Android devices, are not immune.
  •  
    This article talks about secure technology measures for the travel industry. The myth that Apple iOS devices are not infected with viruses is a total lie. But what is true is that Android devices are much more susceptible to malware attacks than Apple iOS devices. The big boss of security "for years…was what made Blackberry the darling of IT departments everywhere." But now what has driven new markets especially transportation is the increasing use of Android devices. American Airlines uses thousands of Android Galaxy Notes for flight attendants and in-flight entertainment devices for passengers as well as those used by the maintenance crew. Samsung's SAFE platform was a key reason the company was influenced to go through with the product because of a security issue. It's important to remember that not one device is immune and to explore an innovative and secure option when picking a device.
anonymous

Fast Food Chain Arby's Acknowledges Breach - Krebs on Security - 0 views

  • Sources at nearly a half-dozen banks and credit unions independently reached out over the past 48 hours to inquire if I’d heard anything about a data breach at Arby’s fast-food restaurants.
  •  
    In recent news, Arby's acknowledge a data breach within its restaurants. "Arby's said the breach involved malware placed on payment systems inside Arby's corporate stores, and that Arby's franchised restaurant locations were not impacted." Once figured out the company hired security experts to solve the problem. The initial sign of breach came from a service organization that serves more than 800 credit unions called PSCU. An alert was sent to all cardholders that a fast food chain had been compromised, but no specifics were mentioned. This article points out that, "point of sale malware has driven most of the major retail industry credit card breaches over the past two years." Monitoring your credit/debit card transactions is the best way to be safe in this situation- as long as you report the fraudulent charges you aren't liable. While IT has many positives for any organization, it's not risk adverse. Once a system is hacked all information of company and past users is up for grabs, and credit card companies are forced to take the blow.
llibe010

The Top Five Cyberthreats Hotel Brands and Franchisees Need to Know About | Netsurion - 0 views

  • ay for guests, it also opens hotels to digital threats perpetrated by malicious actors. Consequently, hotel operators should be aware of the types of cyber attacks, which can significantly hurt their brand reputation and bottom line, not to mention the safety and welfare of employees and guests.
  • In January, for example, cyber criminals took over a luxurious Austrian hotel’s computer-controlled key-card system, locking 180 guests out of their rooms until hotel managers paid a nominal ransom
  • A ransomware attack may disable or alter performance of hotels’ computer-driven systems such as air conditioning and lighting, putting guests’ comfort and, worse yet, safety at risk. In addition, booking systems are extremely vulnerable to ransomware attacks because they process information belonging to the hotels, third-party applications and their customers.
  • ...18 more annotations...
  • 1. Ransomware:
  • hey present further ransomware opportunities to hackers by using computers to automate functions.
  • distributed denial of service, or DDoS
  • One of the largest data breaches in history was conducted through a third-party vendor when hackers stole data from 70 million credit cards by gaining access to a mega-retailer’s network through credentials belonging to an HVAC contractor.
  • 3. Phishing scam targeting customers and hotels:
  • 4. DDoS attacks on the hotel network:
  • 2. Remote hacking through third-party vendors:
  • 5. Theft of personal information over public Wi-Fi.
  • Statistics indicate that such incidents will become more frequent, so it is not a matter of if but when the next cyber attack will occur.
  • Integrate a managed SIEM. Hotels should bring on a managed security information and event management (SIEM) platform for their remote locations to be warned right away of cyber attacks. They may also want it for inside the perimeter if they lack the expertise and resources to properly use SIEM internally.
  • Maintain PCI compliance. The Payment Card Industry Security Standards Council (PCI SSC) has put forth a set of stipulations, the Payment Card Industry Data Security Standard (PCI DSS), in response to rapid PCI expansion. Hotels should make sure they are compliant with these regulations, which require businesses to send credit-card information in a secure environment, to prevent paying heavy fines and losing data, revenue, and customer trust.
  • Install antivirus on all devices. Hotels should ensure they have reliable anti-virus and anti-malware software installe
  • Train employees. Hotels should train employees to not open suspicious emails or links inside them as they may contain malware.
  • According to the FBI, the number of cyber threat occurrences quadrupled to 4,000 per day last year from 1,000 per day in 2015
  • In addition, there are large volumes of payment card transactions between restaurants, on-site shops, spas, parking, and the front-desk, ensuring there is plenty of customer data for a hacker to compromise.
  • The number of cybersecurity incidents worldwide increased 38 percent in 2015 from 2014, according to the Global State of Information Security Survey 2016 by PwC, CIO, and CSO.
  • Hotels are especially vulnerable to this type of attack where a type of malware disrupts access to a system until a ransom is paid. This is because they often use integrated POS systems
  • Hackers can break into hotels’ payment systems through a remote access point belonging to one of its vendors, so they should closely monitor third-party access to their networks
  •  
    This article outlines some of the main cyber attacks on the Hospitality industry. It exposes the threats due to the wealth of data stored in PMS, POS and CRM and suggests steps to take to protect against malware and randsomeware. The article further highlights the necessity for antivirus software on all devices.
  •  
    The article describes the five most common cybersecurity risks for hotel brands such as ransomware, remote hacking and DDoS attacks. The operational elements of each risk have also been discussed. It also covers best practices that hotels and other hospitality organizations can adopt to curb breaches.
Laura Alonso

7 Things You Can Do to Make Internet Explorer More Secure - CIO.com - 0 views

  • How well Internet Explorer--or any Web browser, for that matter--protects against attacks and malware greatly depends on whether you keep it up to date and have the right security settings. Here's how to take the proper security measures with Internet Explorer 9 and 10.
  • IE lets you set custom security settings for different zones: Internet, Local Intranet, Trusted Sites, and Restricted Sites. When you visit a website, IE automatically classifies it as in the Internet zone. The exceptions are websites hosted by your local network (say, a site set up for use on your company's network)--then it's Local Intranet--or sites that you've added to the Trusted or Restricted lists beforehand. You can set each zone to a predefined security level and customize the settings as well.
  •  
    The article by Eric Geier is mainly an informative piece as well as a basic tutorial of Internet Explorer Settings. Geier focuses on security, the core of a browser's purpose next to actual browsing. He provides a few tricks that aren't always set for users, such as tracking protection, a feature that protects your privacy and reduces pop-ups, especially from unwanted ads. The largest focus of the article is what I find most important, and it's most talked about for a reason. Staying on top of a browser's update is essential for not only the browser's performance but most importantly for your computer's security. To put it into perspective, every time you get on Internet Explorer, it's like leaving your house. If you update your browser constantly, you are always making sure the door is locked. But the longer you wait between updates the more likely the door will be unlocked. And if you completely forget to update for an extended period of time it's like leaving the door open for malware, or malicious software.
delaneyverger

The Hospitality Industry Needs a Security Wake Up Call. Will the HEI Hotel & Resorts Ha... - 0 views

  • HEI has reported that 20 hotels that it operates in the US may have been targeted by hackers seeking customers’ credit card information. Determining how many and which customers might have had their data stolen is difficult; HEI only discovered the breach in June and it is possible that the malware may have been active since March 1, 2015 in some systems
  • The hotels ranged from Starwood, Marriott, Hyatt, and Intercontinental flags and were located in Florida, Texas, Vermont, Chicago, Ill., Arlington, Va., California, Nashville, Tenn., Minneapolis, Minn., Colorado, Washington, DC and Philadelphia
  • “The current business model of hotels and their franchisees does not provide cyber security as one of the deliverables provided to their licensees,” he said. “Along this same line, the types of equipment/software used by the properties, software patching, and monitoring are woefully inadequate for today’s threats.”
  •  
    This article talks about the recent hack of HEI Hotel & Resorts that occurred in June of this year, where 20 HEI-operated hotels were breached via their POS system. The malware had been discovered in June but the company reported that it could have been active since March 1st, 2015 in some systems. The article also talks about how POS systems are common targets for hacking and goes on to mention some of the other recent cybersecurity risks that have occurred in the industry, where their POS systems were the targets of hacking. The American Hotel & Lodging Association met with a group of other associations to discuss the issues of cybersecurity and look for possible solutions. However, the industry has not taken measures to amplify their security, probably due to the history with certain IT standards, the cost of starting over, and potential privacy issues. The article claims that, overall, the industry has not done much to change the inherent security risks with regards to technology.
asant318

Ransomware: One of Hospitality's Biggest Threats in 2017 | News | Hospitality Magazine ... - 0 views

  • attack made headlines for locking guests out for their rooms
  • discuss how ransomware can affect the hospitality industry and what hotels and restaurants should consider to protect themselves from future cyber attacks.
  • Travelers may be annoyed, but for the hotel, ransomware can be a major business disruption.
  • ...10 more annotations...
  • The cyber threat has been used to target a variety of businesses from hospitals to retailers and now the hospitality industry
  • , businesses need to always be ready for a breach. Every business should have an action plan in place to prevent their company from being the next victim of ransomware or any other cyber security threat.
  • pirated software, file attachments, web links, and suspicious emails.
  • keep additional devices from being infected.
  • best practices for any company to employ are regular backups and a tested disaster recovery plan
  • Using anti-malware software is a necessary start, but it will not stop everything – especially rogue software downloaded by employees
  • important to act quickly by segmenting portions of the infected network and removing devices to try and prevent the problem from spreading.
  • install ransomware protection
  • malicious software will continue to rise as businesses and consumers become more dependent on the internet for everyday needs.
  • it’s important that businesses take proactive steps to protect not only company data, but the overall integrity of the company network from hackers.
  •  
    The article discusses ransomware attacks on hospitality properties. A 2016 attack left guests locked out of their rooms but the threat could affect different areas of a hospitality business and cause significant disruption to their business. Properties need to be prepared for a security breach with an action plan to prevent cyber-attack. The article points out that it's important to act quickly to segment the network and try to prevent any new devices from being infected. Best practice recommends regular backups and a recovery plan, using anti malware software and being cautious with employee installed software. The most important thing a company can do is to be proactive and prepared for an attack.
Rebecca Pichora

Hackers snag a $1 laptop by exploiting flaw in point-of-sale systems | ZDNet - 0 views

  • Security researchers have devised a way to offer steep discounts or steal goods by hacking vulnerable point-of-sale systems.
  • SAP's point-of-sale (POS) systems don't authenticate or check internal commands, allowing anyone with access to the store's network unrestricted access to the checkout system.
  • All the hacker has to do is upload a new configuration file to the SAP Xpress server, which controls the checkout machines, to gain access to administrative functions.
  • ...6 more annotations...
  • change prices, set discounts, or take other malicious actions against the systems -- including remotely shutting down the checkout machines, or unmasking credit card numbers.
  • According to Dmitry Chastuhin, one of the researchers who identified the vulnerabilities, the flaw may be inherent across POS systems because they all use broadly similar infrastructures.
  • SAP has since fixed the vulnerabilities and rolled out patches.
  • n recent years, POS systems have become a target for hackers for stealing customer data and committing fraud.
  • When these are connected to the internet and rarely updated (if ever), systems are at further risk of malware attacks.
  • POS attacks cost retailers and customers billions every year. The number of attacks on POS systems, including ransomware attacks, are said to be declining, however.
  •  
    Due to the vulnerability of some POS systems, hackers have made the example of SAP whose POS system does not authenticate or check any internal commands, meaning if an hacker is able to get into their POS system they can change prices, add discounts and even disable the check out systems. Even though they have made the example out of SAP, it is said that this vulnerability is across almost all POS systems. One reason that this is happening is because many companies that run their POS system off the internet are not updating their programs, such as the windows, the internet explorer or the POS system itself. Today companies are very aware of the measures they must take to ensure their POS systems are safe as many breaches have happened causing many people to have their personal data stolen, therefore due to the efforts POS system breaches have been decreasing over the recent years.
imontenegro

Huddle House restaurant chain announces breach of POS system | ZDNet - 0 views

  •  
    Criminals compromised a third-party point of sale (POS) vendor's data system and utilized the vendor's assistance tools to gain remote access-and the ability to deploy malware-to some Huddle House corporate and franchisee POS systems," Huddle House said in a security alert listed on its front page.
  • ...1 more comment...
  •  
    Because the company has not finished its investigation, it currently doesn't know which locations had their POS systems compromised by hackers. Huddle House has asked all customers who used their credit or debit cards at any of its 341 locations between August 1, 2017, and February 1, 2019 (the date of the breach disclosure) to review their transaction history for any suspicious transactions.
  •  
    Huddle House said the malware deployed on its POS system was designed to collect data such as cardholder name, credit/debit card number, expiration date, cardholder verification value, and service code.
  •  
    Recently Huddle House's POS system was hacked by someone and it revealed thousands of customers debit and/or credit cards information. Hackers were able to take advantage of the software in the POS system by adding malware to different corporate and franchisee locations. Huddle House released a statement to customers to be aware of their credit card/debit accounts to make sure there's no suspicious activity. It's too early to tell if this security breach will affect pre-existing and new customers. Huddle House will need to implement a security software patch, or consider changing its POS systems.
Jennifer Dantzler

Point-of-sale Malware Infections on the Rise, Researchers Warn | CIO - 1 views

  •  
    Researchers from Arbor Networks and IntelCrawler identify new attacks using malware designed for point-of-sale systems. " https://diigo.com/0bdlpi
lavendersheshe

Cybercriminals are capitalizing on coronavirus fears, security firm warns - CBS News - 0 views

  • A leading cyber security firm says criminals and a group affiliated with China are capitalizing on growing fears over the coronavirus, leading to a spike in malicious online activity.
  • "They've been sending people emails to prey on people's fears and open attachments
    • lavendersheshe
       
      It is important to be careful on opening suspicious emails and rely on watching the news to learn about the coronavirus updates. Opening such emails and downloading attachments can launch a harmful virus into your system and lead to your computer being hacked
  • China-based adversary known as PIRATE PANDA uses major news events as a lure to implant malware that allows remote access to a victim's computer network
  • ...3 more annotations...
  • Another group, identified by CrowdStrike as MUMMY SPIDER, is using the coronavirus theme in an "email thread-hijacking technique" that "ultimately led victims to download malware
  • The security firm said the strategy can be used to steal financial information or login credentials, and expanded to other targets
  • CrowdStrike also reported a surge in queries from companies who anticipate employees will work from home over the next three months, which can leave company data more vulnerable
    • lavendersheshe
       
      If employees work from home then an organization has less control over the security of online systems and exposes the company to more risk.
  •  
    Cybercrime has been on the rise since the outbreak of the coronavirus and hackers are capitalizing on the fact that people are now more concerned about protecting themselves and their loved ones. It is important to be more aware now as an organization in making sure that employees are informed on safety measures on using systems when there at home, using the needed resources in increasing cyber security and backing up important information.
1 - 20 of 66 Next › Last »
Showing 20 items per page