Hackers Turn Square Hardware Into Device to Steal Old Credit Card Information

Square-reader-with-ipad

Feed-twFeed-fb

Just because the Square Reader is new doesn’t mean it isn’t susceptible to the same scams as old school ATMs and credit card readers.

Three recent Boston University graduates are preparing to publicly present research that demonstrates how to hack Square’s mobile payments hardware. The research is set to be shown off at the The Black Hat Security conference in Las Vegas this week.

The team said it discovered a way to steal credit card information using a modified Square magnetic stripe reader.

By tampering with the magstripe reader, the team was able to turn Square’s hardware into a credit card skimmer, a device that can be used to steal credit card informationThe modified reader doesn’t work with the proprietary Square app, but it could be used to steal credit card information using a custom-recording app, according to the team behind the hardware hack Read more…

More about Gadgets, Hacking, Square, Hardware, and Hackers


All articles

Related:


All articles

Q&A: I need Cloud Computing Storage information (Only simple name stuff, not a big explanation)?

Question by Max: I need Cloud Computing Storage information (Only simple name stuff, not a big explanation)?
I need to know the name of the folder that is in out computer (such as drop box has a folder inside a computer). And how to synchronize the files (Methods stuff). If, I need to have a sample code or architecture of cloud storage that can be used anywhere in the world…(like drop box)

Best answer:

Answer by Xanza
ownCloud

That’s what you’re looking for. I’ve been using it as a backup solution for quite a while, and it’s very dependable.

Give your answer to this question below!

Q&A: Can I get my personal information BACK from the ‘cloud’?

Question by : Can I get my personal information BACK from the ‘cloud’?
So I uploaded some spreadsheets and other documents to Best answer:

Answer by Dunbar Pappy ??
You possibly could get a file back that resembles the original, provided you have that authority.
There can never be any certainty that only you have downloaded/accessed/modified it.
Once out of your control, you have lost the certainty aspect.

All data being moved to the ‘cloud’ from state secrets, to recipes for pudding, should be encrypted BEFORE upload…then these doubts would be removed.

Not all cloud services have ideal security.

What do you think? Answer below!

What does the term “cloud” refer to when speaking of information technology? Simply a server system?

Question by table data: What does the term “cloud” refer to when speaking of information technology? Simply a server system?

The term is also used somewhat ambiguously in the AV (Audio/Visual) industry. “Cloud” is also mentioned when referring to IT solutions.

Best answer:

Answer by jdsheth2004
Pl. read:

Does each blog channel have its own cloud?

Yes, that’s possible.
However, the beauty of a topic cloud is that it covers the entire blogsite.

Typically, each blogsite has its own topic cloud that encapsulates all blog posts and content items (from the content management plug-in) to be presented in a single cloud. This makes it possible to easily see all relevant information in the blogsite.

It is also possible to scale the cloud down to just a specific blog channel.

Add your own answer in the comments!

–Asia leads commitment to bolster information security –Rise of cloud

–Asia leads commitment to bolster information security –Rise of cloud
According to the survey, the rise of cloud computing has improved but also complicated the security landscape. More than four out of ten respondents report that their organization uses cloud computing: 69 percent for software-as-a-service,
Read more on MarketWatch (press release)

Cloud Computing: Google Arms HTC with Patents to Fight Apple
HTC has added five patents it just bought from Google to an infringement suit it brought against Apple in Delaware. It also added them to a complaint it had filed with the International Trade Commission and is using four other patents obtained from
Read more on SYS-CON Media (press release)

Cloud Computing: Security Concerns Blown out of Proportion?
Kundra predicted that the cloud will be adopted globally by governments in the not distant future for efficiently and cost effectively meeting computing needs. And he emphasized that in this tough economic climate that we're living through,
Read more on Formtek Blog (blog)