Most Read This Week
How to Lock Down Sensitive Data By @Motorola | @CloudExpo
For retailers everywhere, it's a challenging new day as security threats are a constant - both inside their four walls and out
By: Imran Akbar
Oct. 9, 2014 09:00 AM
How to Lock Down Sensitive Data from Increasingly Clever Hackers
For retailers everywhere, it's a challenging new day. Security threats are a constant - both inside their four walls and out. The big security breaches we hear about on the news; the smaller ones sometimes not. But their impact remains costly to us all. The need for mobility, rapidly evolving technology and meeting growing customer expectations for network user access continues to complicate matters for retail IT - and has set the stage for the increased risk with over the air breaches using rogue Bluetooth® devices.
Bluetooth technology has transformed how we connect - both at home and at work. It is intended for consumer product connectivity and can be misused for gaining entry into enterprise applications. The technology is often used for payment card readers, but is also being misused by hackers as an unsecured way to gain access into retailers' networks. Once inside, they can install malware onto point of sale (POS) devices and plant a rogue Bluetooth transmitter. Then, using their own mobile devices, they can download collected information to their device as they walk by undetected - up to 300 feet away.
With virtually every customer in the store using a myriad of wireless devices to check prices, download coupons, etc., the thief - even on video - would be difficult to identify. The reduced risk involved makes this type of crime even more alluring.
A Rapidly Growing Threat
Other skimmers have targeted bank ATMs and gas stations. Here's a startling snapshot of their impact:
For retailers, the costs associated with a credit card breach are substantial. From the direct remediation costs of offering credit card monitoring for any affected customers, to the costs of any lawsuits filed by consumers, it's an expensive proposition. Not to mention, the incalculable brand damage a breach causes in loss of customer trust and loyalty.
Hackers running skimming operations have upped their game, improving their technology to make stealing credit card data even easier by installing a Bluetooth-based skimmer inside the targeted POS machine.
In January of this year, the first arrests were made for Bluetooth Skimming. Thirteen individuals were indicted with running a multi-million dollar fraud ring using gas pump skimmers at stations throughout the southern U.S. The defendants allegedly encoded the stolen card data onto counterfeit cards, and armed with stolen PINs, withdrew funds from victim accounts at ATMs. When all was said and done, they managed to steal more than $2 million from approximately 70 bank accounts.
Why Manual Network Monitoring Is Not the Answer
New Effective Options
Retailers have a lot to lose when a data breach occurs, and the associated costs are dramatic as we've seen in multiple cases over the last year. With Bluetooth monitoring in place, retailers can expand their wireless network security to include both the Wi-Fi and Bluetooth spectrum and defend against this new and previously unguarded threat. Valuable customer data - and your business - depend on it.
Conference Schedule Announced
Are you ready to put your data in the cloud?
What is the future of security in the cloud?
Does Docker quickly advance the development of an IoT application?
What are the implications of Moore's Law on Hadoop deployments?
Get all these questions and hundreds more like them answered at the 15th Cloud Expo, November 4-6, 2014, at the Santa Clara Convention Center, in Santa Clara, CA. The Cloud Expo / Big Data Expo / @ThingsExpo / DevOps Summit programs are now available for you to inspect and investigate in advance.
Our upcoming November 4-6 event in Santa Clara, California will present a total of 10 simultaneous tracks by an all-star faculty, over three days, plus a two-day "Cloud Computing Bootcamp" presented by Janakiram MSV, an Analyst with the Gigaom Research analyst network, where he covers the Cloud Services landscape.
Cloud and Big Data topics and tracks include: Enterprise Cloud Adoption, APM & Cloud Computing | Hot Topics, Cloud APIs & Business, Cloud Security | Mobility, Big Data | Analytics.
@ThingsExpo content tripled from a single track in New York to three simultaneous tracks: Consumer IoT, Enterprise IoT, IoT Developer | WebRTC Convergence.
DevOps Summit also doubled from a single track in New York to two simultaneous tracks: "Dev" Developer Focus and "Ops" Operations Focus.
Schedule for Cloud Expo / Big Data Expo / @ThingsExpo ▸ Here
Schedule for DevOps Summit ▸ Here
Now that we have published the full conference schedule, please check back for daily updates as we finalize new session abstracts by working with our distinguished faculty members. For your questions please contact us at events (at) sys-con.com. Last but not least we will announce our keynotes on the hottest subjects to be delivered by world-class speakers!
The largest 'Internet of Things' event in the world has announced "sponsorship opportunities" and "call for papers."
The 1st International Internet of @ThingsExpo was launched this June at the Javits Center in New York City with over 6,000 delegates in attendance. The 2nd International Internet of @ThingsExpo will take place November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, California, with an estimated 7,000 plus delegates attending over three days.
@ThingsExpo is co-located with 15th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading IoT industry players in the world. In 2014, more than 200 companies will be present on the @ThingsExpo show floor, including global players and the hottest new technology pioneers.
Sponsorship and Exhibit Opportunities for @ThingsExpo Silicon Valley and New York Are Now Available
For more information on sponsorship, exhibit, and keynote opportunities contact Carmen Gonzalez by email at events (at) sys-con.com, or by phone 201 802-3021. Book both events for additional savings!
@ThingsExpo Silicon Valley (November 4-6, 2014, Santa Clara, CA)
Secure Your VIP Pass to Attend @ThingsExpo Silicon Valley
To take advantage of this opportunity, attendees can use the coupon code "IoTSeptember" and secure their "@ThingsExpo Plus" registration to attend all keynotes and general sessions, as well as a limited number of technical sessions each day of the show, in addition to full access to the expo floor and the @ThingsExpo hackathon.
The registration page is located at the @ThingsExpo site here.
@ThingsExpo New York 2015 'Call for Papers' Now Open
Track 1 - Consumer IoT and Wearables: Smart Appliances, Wearables, Smart Cars, Smartphones 2.0, Smart Travel, Personal Fitness, Health Care, Personalized Marketing, Customized Shopping, Personal Finance, The Digital Divide, Mobile Cash & Markets, Games & the IoT, The Future of Education, Virtual Reality
Track 2 - Enterprise IoT: The Business Case for IoT, Smart Grids, Smart Cities, Smart Transportation, The Smart Home, M2M, Authentication/Security, Wiring the IoT, The Internet of Everything, Digital Transformation of Enterprise IT, Agriculture, Transportation, Manufacturing, Local & State Government, Federal Government
Track 3 - Developer IoT: WebRTC, Eclipse Foundation, Cloud Foundry, Docker & Linux Containers, Node-Red, Open Source Hardware, Leveraging SOA, Multi-Cloud IoT, Evolving Standards, WebSockets, Security & Privacy Protocols, GPS & Proximity Services, Bluetooth/RFID/etc., XMPP, Nest Labs
Download @ThingsExpo Newsletter Today ▸ Here
Chris Matthieu Named @ThingsExpo Tech Chair
Internet of @ThingsExpo named Chris Matthieu tech chair of Internet of @ThingsExpo 2014 Silicon Valley.
Chris Matthieu has two decades of telecom and web experience. He launched his Teleku cloud communications-as-a-service platform at eComm in 2010, which was acquired by Voxeo. Next he built an open source Node.JS PaaS called Nodester, which was acquired by AppFog. His latest startups include Twelephone. Leveraging HTML5 and WebRTC, Twelephone's BHAG (Big Hairy Audacious Goal) is to become the next generation telecom company running in the Web browser. Chris is currently co-founder and CTO of Octoblu.
About SYS-CON Media & Events
Cloud Expo® and Big Data Expo® are registered trademarks of Cloud Expo, Inc., a SYS-CON Events company.
Reader Feedback: Page 1 of 1
Subscribe to the World's Most Powerful Newsletters
Today's Top Reads