Tag Archive for: stores

Safe Tag makes smartphones buying experience in stores convenient without sacrificing security


With the Safe Tag in use, you can walk into a smartphone retail store, pick up a phone of your choice and roam around the store testing it before buying without a store representative stalking you as if you were a thief.

There are a range of strategies and devices used by mobile phone retail stores to address the problem of shoplifting. One of the most prominently used is merchandising security that allows customers to pick and test a new smartphone while keeping it tethered to the display furniture. Some wireless mobile security systems, like the Safe Tag in use at the T-Factory retail store in Mapo-gu, Seoul in South Korea, have presented a workaround for this ugly user experience of anti-theft cables locking devices to the stand.

The Safe Tag for one allows customers to get rid of the shackles of cables holding the smartphones back – limiting the user experience – and allows them to freely pick up and tinker with the phone. The Tag, however, ensures the smartphone in the consumer’s hand is always protected by the wireless cradle that delivers a security alarm and sends location data directly to the store manager. It lets the staff remain assured that the phone will not be stolen and the resulting consumer experience is as smooth as silk.

This wireless security device for displaying mobile phones in stores is fashioned in two parts, the tag and the cradle. While the two, finished in a matte white hue, are designed to work in tandem, they can also pull off the job independently in case the tag is detached from the cradle. Using the Smart Tag is simple, the retailer can connect the tag to the smartphone’s charging pin and dock the tag into its cradle. The charging pin connected to the phone features a sliding hinge to ensure it can rock back and forth to accommodate smartphones of any thickness.

Once installed and placed on the display furniture, the Safe Tag is functional. It transmits a docked phone’s specifics to the linked e-ink display for user convenience and instantly rings a security alarm when a customer detaches the phone or the tag from the cradle. The alarm is accompanied by the location data, both of which are sent directly to the store manager who…

Source…

‘A minute to scan each item’: Supermarket agony as tech glitch hits South Island Foodstuffs stores


Many New World supermarkets across the South Island have been experiencing till issues.

MARTIN DE RUYTER/Stuff

Many New World supermarkets across the South Island have been experiencing till issues.

Supermarket customers endured agonising waits at the till on Wednesday afternoon when a tech glitch hit Foodstuffs’ computer systems, leaving shoppers waiting a minute at a time for items to scan.

The glitch lasted hours, affecting New World, Pak’n Save and Four Square supermarkets around the South Island with customers from Christchurch, Nelson, Timaru, Dunedin, and Invercargill contacting Stuff about it.

A Timaru shopper said she was caught up at the town’s Pak’n Save supermarket for more than two hours.

She said she spent more than an hour in a queue to pay for her groceries. “The payment wasn’t the problem, it was the transaction causing the problem. They had to wait about a minute to scan each item.

“After a while, the store stopped customers from entering, so they could clear the backlog.”

READ MORE:
* Coronavirus: Foodstuffs announces pay increase for supermarket staff
* Christmas Eve strikes: Supermarket workers taking industrial action over failed bargaining
* FIRST Union taking supermarket owners to ERA for better wages
* Pak ‘n Save workers mount Easter strike at Richmond supermarket

A Christchurch shopper said he was “stuck in line for 1.5 hours” because he has a large family and was doing a big shop.

Another shopper was in a Pak’n Save supermarket in Blenheim just as the computers went down. He waited for over an hour before reachign the till.

“Once I was there I noticed a few of the items they scanned didn’t have the specials that were advertised,” the customer said. “I decided to leave my trolley full of food and leave.”

Were you stuck in an aisle? Email [email protected]

Foodstuffs said it was only South Island stores that were affected by the problem.

“We would really like to apologise to customers who have been trying to shop during this time, we know the system being offline is an inconvenience,” a statement said.

Foodstuffs confirmed this issue was not caused by a cyber-attack. “It was simply an IT maintenance issue which unintentionally destabilised the stores’ online environment.”

The tech glitch affected stores including New World, Pak’n Save and Four Square. (File photo)

The tech glitch affected stores…

Source…

Didi warns of ‘adverse impact’ after 25 apps are removed from mobile stores – Fortune



Didi warns of ‘adverse impact’ after 25 apps are removed from mobile stores  Fortune

Source…

Hackers hide credit card data from compromised stores in JPG file


Hackers have come up with a sneaky method to steal payment card data from compromised online stores that reduces the suspicious traffic footprint and helps them evade detection.

Instead of sending the card info to a server they control, hackers hide it in a JPG image and store it on the infected website.

Easy data exfiltration

Researchers at website security company Sucuri found the new exfiltration technique when investigating a compromised online shop running version 2 of the open-source Magento e-commerce platform.

These incidents are also known as Magecart attacks and have started years ago. Cybercriminals gaining access to an online store through a vulnerability or weakness plant malicious code designed to steal customer card data at checkout.

Sucuri found a PHP file on the compromised website that the hackers had modified to load additional malicious code by creating and calling the getAuthenticates function.

The code above also created in a public location of the infected store a JPG image that would be used to store payment card data from customers in encoded form.

This allowed the attackers to easily download the information as a JPG file without triggering any alarms in the process as it would look as if a visitor simply downloaded an image from the website.

Analyzing the code, the researchers determined that the malicious code used the Magento framework to capture the information from the checkout page delivered through the Customer_ parameter.

If the customer providing the card data was logged in as a user, the code also stole their email address, Sucuri said in a blog post last week.

The researchers say that almost all data submitted on the checkout page is present in the Customer_ parameter, which includes payment card details, phone number, and postal address.

All the information above can be used for credit card fraud either directly by the hackers or by another party purchasing the data, or to deploy more targeted phishing and spam campaigns.

Sucuri says that this method is sufficiently stealthy for website owners to miss when checking for an infection. However, integrity control checks and website monitoring services should be able to detect changes such…

Source…