As soon as a new technology or system comes
into the market, the hackers start working actively. You bring one change they
will bring hundreds of loopholes which not only cover up their tracks but also bring
success to their plans. Well similarly in the case of POS system, in every six months there is one hack
or the other you name the technique they have used it. Numerous problems which were raised by this hacking
were like high-risk vulnerabilities, data breaches on large scales, etc. So if
we summarize the activities of hackers in the year 2014 we will come across the
following points.
Researchers and technical practitioners
had given a unique name to the year 2014 i.e. “Year of POS RAM Scrapers”, and up
to the certain extent, they were right in naming it. If you are not aware then let
me tell that 2014 faced the maximum number data breach and RAM scrapping If
compared to past few years and POS system
got the maximum heat of it.
In the year 2015, the similar
varieties of malware stayed in the market everyone knows that POS system always become the easiest target of
all, as it makes use of unprotected systems and software around the world. But
with the help of new technologies, the companies are gaining more secure background which can kick these damage
causing materials to the curb.
Well, this year i.e. in 2016 a new type of ransomware malware is floating in
the market under the name of Locky, which normally spread in the form of an email
along with an attached word document, if opened then it frees the malicious
macros confined in it. Guess what, in the same week the researching team came
across the twin brother of locky under
the name of Hucky or called as Hungarian
Locky by the research people. Initially,
I took it as locky only but later it was
revealed that however it is a ransomware malware but not locky. With these threats prevailing in the
market the companies are introducing products as well as POS system software
with a good firewall protection.
No comments:
Post a Comment