Posts

It’s here! One Card on your phone


Screen shot of the One Card app on the Apple phoneThe One Card Office is excited to announce a new feature to the UNCSA campus!

You now can have the convenience and security of carrying and using your One Card
from your iPhone, Apple Watch, or Android phone. Simply, add your One Card to Apple
Wallet or Google Pay and tap it all around campus.

Visit the One Card Office and we will help guide you through setting up this new feature
of our existing eAccounts application and you’ll be able to use your mobile phone
anywhere you can use your One Card*.

Transact eAccounts Features include:

  • Easy door access using your phone or Apple Watch.
  • Make purchases and check into events with your phone or Apple Watch.
  • Quickly view your One Card balances.
  • Monitor your meal plan balance and usage.

Mobile Credential Requirements:

Must be a current UNCSA faculty, staff, or student

Mobile Phone that supports NFC (Apple Pay or Google Pay)

  • iPhone: iPhone 6, iPhone 6 Plus or later; iOS 12.2 or later.
  • Android: version 6.0 or later.

For Apple Watch: Series 1 or later, and watchOS 5.2 or later.

UNCSA One Card holders will still be required to carry a One Card ID with them at
all times when on campus** and all existing One Card policies and guidelines remain
applicable.

Download the Transact eAccounts app and visit the One Card Office to get…

Source…

Hackers hide credit card data from compromised stores in JPG file


Hackers have come up with a sneaky method to steal payment card data from compromised online stores that reduces the suspicious traffic footprint and helps them evade detection.

Instead of sending the card info to a server they control, hackers hide it in a JPG image and store it on the infected website.

Easy data exfiltration

Researchers at website security company Sucuri found the new exfiltration technique when investigating a compromised online shop running version 2 of the open-source Magento e-commerce platform.

These incidents are also known as Magecart attacks and have started years ago. Cybercriminals gaining access to an online store through a vulnerability or weakness plant malicious code designed to steal customer card data at checkout.

Sucuri found a PHP file on the compromised website that the hackers had modified to load additional malicious code by creating and calling the getAuthenticates function.

The code above also created in a public location of the infected store a JPG image that would be used to store payment card data from customers in encoded form.

This allowed the attackers to easily download the information as a JPG file without triggering any alarms in the process as it would look as if a visitor simply downloaded an image from the website.

Analyzing the code, the researchers determined that the malicious code used the Magento framework to capture the information from the checkout page delivered through the Customer_ parameter.

If the customer providing the card data was logged in as a user, the code also stole their email address, Sucuri said in a blog post last week.

The researchers say that almost all data submitted on the checkout page is present in the Customer_ parameter, which includes payment card details, phone number, and postal address.

All the information above can be used for credit card fraud either directly by the hackers or by another party purchasing the data, or to deploy more targeted phishing and spam campaigns.

Sucuri says that this method is sufficiently stealthy for website owners to miss when checking for an infection. However, integrity control checks and website monitoring services should be able to detect changes such…

Source…

Filipinos encountered more card skimmers online in 2020

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.


FILIPINO internet users who encountered online credit card skimmers increased by 20% in 2020, internet security firm Kaspersky said.

In an e-mailed statement on Monday, web skimmers, sometimes referred to as sniffers, where scripts are embedded by attackers in online stores and used to steal users’ credit card data from websites, caused the increase in the total number of web threats in the Philippines last year.

“The number of web threats in the country is about 37.19% more in 2020 compared to 27,899,906 web threats (44.4%) detected in 2019,” it said.

However, globally, the Philippines’ ranking in 2020 global web threat detections fell to sixth place from fourth in 2019.

“In the 2020 Kaspersky Security Network report, it showed that Kaspersky solutions installed in computers of Filipino users detected 44,420,695 different internet-borne threats last year,” the internet security firm noted.

“The report also revealed that more than four-in-10 (42.2%) of online users in the country were almost infected with web threats in 2020, putting the country at sixth place globally,” it added.

The Philippines followed Nepal with the highest percentage of users attacked by web-borne threats (49.3%), Algeria (46.9%), Mongolia (44.5%), Somalia (44%), and Belarus (43.9%).

Kaspersky noted the number of Filipino internet users who encountered web miners declined “by one and a half times.”

“A Trojan miner like Trojan.Script.Miner.gen is an example of a web-mining malware that is used by cybercriminals to secretly mine cryptocurrencies using someone’s computing power and electricity,” it said.

Internet browsing, unintentional downloads, e-mail attachments, browser extensions activities, downloading of malicious components or communications with control and command servers performed by other malware were among the top five sources of web threats in the Philippines.

Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky, said: “The pandemic has blurred the lines between corporate defenses and home security.”

“Remote work, online classes, digitalization across all sectors will continue, at least…

Source…