{"id":309,"date":"2014-11-20T22:14:45","date_gmt":"2014-11-20T22:14:45","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=309"},"modified":"2020-08-18T23:38:40","modified_gmt":"2020-08-18T18:08:40","slug":"hackers-attacks-retail-threaten-us","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/","title":{"rendered":"Hackers Attacks on Retail Threaten All of Us"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-481 size-full\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-3835_3.jpg\" alt=\"Hackers Attacks on Retail Threaten All of Us\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-3835_3.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-3835_3-300x138.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-3835_3-225x103.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/>Hackers have had many rich targets to focus on since the dawn of the computer age and the burgeoning world of electronic commerce. Originally, criminal hackers\u2019 targeted internal system and huge storage servers. More recently, they have launched all too successful attacks on large high profile retailers. In the process, millions of ordinary consumers have been victimized, having their personal and financial information looted.<\/p>\n<p>Hackers are skilled at injecting malware onto the cash registers or <a href=\"https:\/\/securebox.comodo.com\/pos-system\/pos-security\/\" target=\"_blank\" rel=\"noopener\">Point of Sale terminals<\/a> (POS terminals) used by all retail businesses. Hence there is less work for the hackers as they just have to initiate the infection through a common medium and attacking the retailers effortlessly.<\/p>\n<p>On gaining access, the hackers infuse a RAM scraper that captures all the information like name, addresses, transaction details and so on from the credit\/debit card that are saved in the magnetic stripe that is found at the back of all the cards when a swiping is done.<\/p>\n<p>Once the information about the credit\/debit card is captured through a magnetic swipe, the thieves find a way to create fake credit\/debit cards which includes extra security information that is not available if they possess only the credit card number.<\/p>\n<p>This further allows them to steal information that it offers a great deal of money on the black market. Criminals can totally get a good deal that is worth tens of millions of cards and hence make a full use of the derived benefits.<\/p>\n<p>According to the US Department of Homeland Security, the <strong>Backoff POS malware<\/strong> was responsible for 1,000 enterprises having been infected as of this August.<\/p>\n<p>The Secret Service has found that most of the breaches are occurring through tools that permit the access at a remote level. The remote access tools from Google, Apple, Microsoft and LogMeIn are being utilized by means of attacks that perform a brutal force. These brutal forces uses tremendous attacks through password guessing, that allows anyone who uses the tool to get victimized<\/p>\n<p><a href=\"https:\/\/remoteaccess.itarian.com\" target=\"_blank\" title=\"Remote Access\">Remote access<\/a> tools are known to be more productive both in professional and personal grounds. While using these tools, the user should be extra cautious, some of the tips below might help you reduce the level of exposure to these hackers: Unnecessary remote access tools should be turned off.<\/p>\n<ul>\n<li>\u00a0Use of Passwords should be wise with a minimum length of 15 characters or more and also with a combination of letters, special characters and numbers. This will make the brutal force hacking more time consuming.<\/li>\n<li>Switch on the Intrusion detection system and also make use of the two factor authentication as and when needed.<\/li>\n<li>Implementation of non-standard port settings to divert the known defaults<\/li>\n<li>Choice of <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-8\/\">antivirus\u00a0 for Windows 8<\/a> play an important role, use an <a href=\"https:\/\/antivirus.comodo.com\/\">antivirus software<\/a> that stays updated on the latest virus definitions and new threats, hence protecting the system from the latest threats.<\/li>\n<li>Have a check on your system if it slows down, which is often a trait only when the system is infected.<\/li>\n<li>Remote access can be replaced by the VPN (Virtual Private Network) for a better and high end security solution.<\/li>\n<li>All businesses should follow the protocol of the IT vendor or the IT departments they rely on, as it helps you to stick to a certain set of security standards and also to ensure whether the technical issues are reviewed.<\/li>\n<li>Implementation of a proper and advanced formula of <a title=\"firewall\" href=\"https:\/\/personalfirewall.comodo.com\/\" target=\"_blank\" rel=\"noopener\">Firewall<\/a>, hence helping the system to prevent the entry of viruses.<\/li>\n<li>Performing Penetration Tests and Vulnerability Scans on a regular basis<\/li>\n<li>Web Content Filtering should be done by the retailers to protect the system from Downloader Trojan attacks and Web-Exploit Kit,<\/li>\n<li>Retailers should ensure that they keep their security software up to date and also obtain a centralized plan for fixing <a href=\"https:\/\/www.itarian.com\/patch-management.php\" target=\"_blank\">software patches<\/a> instantly.<\/li>\n<li>Retailers should make use of certain policies that restricts the employees from downloading certain executable files through the internet and also from entering suspicious websites.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.comodo.cisme.antivirus&amp;hl=en&amp;af-id=9356\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'FREE DOWNLOAD Product AV Play Store'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'FREE DOWNLOAD Product AV Play Store'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1747 size-full\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/Antivirus_for_Android.jpg\" alt=\"Antivirus for Android\" width=\"650\" height=\"250\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/Antivirus_for_Android.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/Antivirus_for_Android-300x115.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/Antivirus_for_Android-225x87.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<div><span style=\"float: left; width: 50%; font-size: 12px;\">&lt;&lt; <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/why-you-need-antivirus-software-for-your-android-devices\/\">why you need antivirus software for your android devices<\/a><\/span><span style=\"float: right; width: 50%; font-size: 12px; text-align: right;\"><a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/windows-10-update-crashes-avast-antivirus\/\">Windows 10 update crashes avast antivirus<\/a> &gt;&gt;<\/span><\/div>\n<div style=\"clear: both;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have had many rich targets to focus on since the dawn of the computer age and the burgeoning world of electronic commerce. Originally, criminal hackers\u2019 targeted internal system and huge storage servers. More recently, they have launched all too successful attacks on large high profile retailers. In the process, millions of ordinary consumers have [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates<\/title>\n<meta name=\"description\" content=\"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"og:description\" content=\"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-20T22:14:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T18:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png\" \/>\n\t<meta property=\"og:image:width\" content=\"457\" \/>\n\t<meta property=\"og:image:height\" content=\"311\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/\",\"name\":\"Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png\",\"datePublished\":\"2014-11-20T22:14:45+00:00\",\"dateModified\":\"2020-08-18T18:08:40+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png\",\"width\":457,\"height\":311},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers Attacks on Retail Threaten All of Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/","og_locale":"en_US","og_type":"article","og_title":"Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates","og_description":"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2014-11-20T22:14:45+00:00","article_modified_time":"2020-08-18T18:08:40+00:00","og_image":[{"width":457,"height":311,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/","name":"Hackers Attacks on Retail Threaten All of Us - Comodo Antivirus Blogs | Anti-Virus Software Updates","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png","datePublished":"2014-11-20T22:14:45+00:00","dateModified":"2020-08-18T18:08:40+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Hacker Attacks: Hackers have had many rich targets since the dawn of the computer age and the world of electronic commerce. Now retail is threatened","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/credit-card.png","width":457,"height":311},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-attacks-retail-threaten-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers Attacks on Retail Threaten All of Us"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":28,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":15100,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/309\/revisions\/15100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}