Crime hackers have endless intelligence and intelligence. They have calculated how to crack the debit card PINS. Debit cards are directly associated with our checking account, which makes them a good luck in hacker crime. At an ATM or cash register, most debit card users do not know what happens when they swipe their card and enter their PIN. A magical mystery occurs that we can obtain new purchase rights by refreshing the card and tapping a few keys. This money magically disappeared from our account. We celebrated by eating the Twinkie we just bought.
The process is similar whether you are swiping at an ATM or in a store or restaurant. The user swipes his or her card and enters a pin number. The data is verified by a third-party payment processor or, in some cases, verified by the bank via a telephone line or the Internet. Once the information is verified and the payment processor confirms that the required funds are available, the money is transferred from the user's account to the merchant's account, or in cash.
The convenience of debit cards has caused global popularity, far surpassing hand-written cheques and all the way to third-world countries. For some time now, we have known that the low-tech dregs of ATMs and gas pumps have become a compromise point. Now, Wired reports that the transaction itself will put your PIN code at risk. The academic community discovered this flaw many years ago, but did not expect that it would be possible to implement this plan on site. However, criminal hackers came up with the holy grail of hackers and stole a large amount of encrypted and unencrypted debit cards and passwords. They have come up with ways to crack encrypted code.
The first sign of PIN tampering was identified when investigators studied the process of 11 criminals captured after the TJX data was interrupted. This bread involves 45 million credit and debit cards. Criminal gangs need a PIN to convert data into cash. The investigation report on this violation said that these hackers were solved in "more targeted, sophisticated, complex and smart cybercrime attacks than in previous years". "
This revelation some people say that the only cure for this hacker attack is to overhaul the payment processing system. The compromise occurs on a device called the hardware security module (HSM), which is located on the bank's network. The PIN number passes through this device on the way to the card issuer. The module is tamper-proof and provides a secure environment for the encryption and decryption of PINs and card numbers. Criminal hackers are accessing the HSM and tricking them into providing decrypted data. A "memory scraper" of malware that captures unencrypted data and uses hacked systems for storage
The PCI Security Standards Council is a self-regulatory agency that oversees most aspects of payment card transactions. They will begin testing HSM. Bob Russo, general manager of the Global Standards Organization, said that the council's testing of these devices will "focus on the security attributes that are vital to the payment system."
I don't have a debit card and I'll never In a nutshell, if my debit card is hacked, the money will go directly from me. Acquired in a line account. Damaged ATMs or point-of-sale transactions usually fail to show evidence of hacking. This means that I have to go through the difficult process of making my bank feel difficult, that is, I did not extract from my account. Thousands of dollars.And if the credit card is compromised, zero-liability guarantees will begin, and my cure will be faster.
Your ultimate responsibility here is to check your statements very closely and look for unauthorized activities Read your report online every week, instead of just relying on your monthly report, and immediately refute unauthorized charges. Consider using a credit card instead of a debit card. Although this fraud is often uncontrollable, you still have to Invest in Internet security software such as McAfee and consider identity theft protection
[ad_2]
Orignal From: Hackers use hacking debit card transactions
No comments:
Post a Comment