PINs, Passwords, and PCI
PINs, Passwords, and PCI What is the difference between Passwords and Passphrases, PINs, and other...
1 min read
David Gamey
:
Sep 10, 2020 10:07:00 PM
Many organizations have either undergone or are planning migrations or acceleration of call centers, remote working, and online presence exploiting technologies like VoIP. Criminals are increasingly taking an interest in these channels. An interesting discovery by ESET, Linux based malware targeting soft-switches produced by China based Linknat. Two models are affected the VOS2009 and VOS3000.
This malware steals call detail recording (CDR) metadata from the systems internal MySQL database. At this time it’s believed that the goal of this malware is International Revenue Share Fraud (IRSF).
While this isn’t a VoIP Credit Card Skimmer, it demonstrates that there are skilled bad actors actively exploiting telephony technologies. This development shows why it is important to review all information channels and ensure that they are both secure and compliant.
David Gamey :
Feb 18, 2021 10:07:00 PM
PINs, Passwords, and PCI What is the difference between Passwords and Passphrases, PINs, and other...
David Gamey :
Oct 7, 2021 10:07:00 PM
PCI DSS can be hard and not preparing for it just makes things harder. Following this advice is...
CG Blogger :
Nov 13, 2017 12:00:00 AM
Welcome to This Week’s [in]Security. We’ve collected and grouped together a selection of this...