Wednesday, 16 November 2016

POS System and the data breaches

As soon as a new technology or system comes into the market, the hackers start working actively. You bring one change they will bring hundreds of loopholes which not only cover up their tracks but also bring success to their plans. Well similarly in the case of POS system, in every six months there is one hack or the other you name the technique they have used it.  Numerous problems which were raised by this hacking were like high-risk vulnerabilities, data breaches on large scales, etc. So if we summarize the activities of hackers in the year 2014 we will come across the following points.
Researchers and technical practitioners had given a unique name to the year 2014 i.e. “Year of POS RAM Scrapers”, and up to the certain extent, they were right in naming it. If you are not aware then let me tell that 2014 faced the maximum number data breach and RAM scrapping If compared to past few years and POS system got the maximum heat of it.
In the year 2015, the similar varieties of malware stayed in the market everyone knows that POS system always become the easiest target of all, as it makes use of unprotected systems and software around the world. But with the help of new technologies, the companies are gaining more secure background which can kick these damage causing materials to the curb.
Well, this year i.e. in 2016 a new type of ransomware malware is floating in the market under the name of Locky, which normally spread in the form of an email along with an attached word document, if opened then it frees the malicious macros confined in it. Guess what, in the same week the researching team came across the twin brother of locky under the name of Hucky or called as Hungarian Locky by the research people. Initially, I took it as locky only but later it was revealed that however it is a ransomware malware but not locky. With these threats prevailing in the market the companies are introducing products as well as POS system software with a good firewall protection.

No comments:

Post a Comment