Your Online Purchases Could be in Danger Thanks to a Breach in Magento’s Security

To the usual misgivings of many Internet users, who are still suspicious about buying over the Internet, we now have to add certain security problems that have damaged the image of e-commerce.

The latest worrying episode has affected the popular management software, Magento – a group of attackers has taken advantage of a crack in its security, broken into the database and stolen personal information related to its users.

buy online safely

Over 100,000 stores worldwide use this tool, among those at risk are eBay (which owns the company), Nike Running and Lenovo. The researchers found that the cybercriminals infected the most sensitive part of the system with a malware – one designed to collect payment data.

The most worrying thing is that the victims didn’t even notice what had happened until they checked movements in their personal accounts. It was then that they realized that someone had stolen their money.

Last April a similar security gap was detected in this online retailer. Then, just as the company learned about this problem, Magento gave its customers a security fix that offset any possible leakage of information.

Far from wanting to make you fear shopping online, cases like this are used to point out the risks we face, and offer some tips to avoid, as much as possible, becoming the victim of a cyberattack when using an e-commerce platform.

6 tips to avoid security breaches in your online shopping

  1. One of the first steps you can take is to make all your online purchases through a payment service. There are many experts who claim that tools such as PayPal, with the incorporated security tools and encryption technology, can shield you from harm. In addition, it is advisable to link the account to a credit card in order to enjoy the protection measures implemented by the banks in their online payment process.
  2. Speaking of credit cards, one of the recommendations from the experts is to only use one card for your online purchases. So, if anything happens you will know which one to cancel to stop cybercriminals from emptying your account. We also recommend checking your balance often to discover any unauthorized movement before it’s too late.

padlock

  1. Another good idea in these cases is to keep, either printed or on the computer, a receipt of each purchase you make through the Internet. That way, if some day you have the misfortune of suffering information theft, you will be able to show those documents to prove the payments you made and those made by an intruder without your consent.
  2. On the other hand, a situation that you should avoid at all costs is to make purchases while using public WiFi. As a general rule, they are not safe – someone with evil intentions and the necessary knowledge could intercept the data from your computer and obtain your passwords or your credit card information. If you must access a public WiFi network, be sure to use a virtual private network (VPN).
  3. Finally, changing the passwords that you use in different online shops every so often could save you from any possible headaches.

The post Your Online Purchases Could be in Danger Thanks to a Breach in Magento’s Security appeared first on MediaCenter Panda Security.

3057154 – Update to Harden Use of DES Encryption – Version: 1.0

Revision Note: V1.0 (July 14, 2015):
Summary: Microsoft is announcing the availability of an update to harden scenarios in which Data Encryption Standard (DES) encryption keys are used with accounts. Microsoft disabled DES by default starting in Windows 7 and Windows Server 2008 R2. However, this update provides enhanced user protection in environments where DES is still enabled for application compatibility reasons. The improvement is part of ongoing efforts to bolster the effectiveness of encryption in Windows.

3074162 – Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Advisory published
Summary: Microsoft is releasing this security advisory to inform customers that an update to the Microsoft Malicious Software Removal Tool (MSRT) is available that addresses a security vulnerability that was reported to Microsoft. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and places a specially crafted dynamic link library (.dll) file in a local directory. An authenticated attacker who successfully exploited the vulnerability could elevate privileges on a target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights.

MS15-058 – Important: Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database.

MS15-070 – Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-065 – Critical: Security Update for Internet Explorer (3076321) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-066 – Critical: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

MS15-071 – Important: Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic.