This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
With COVID-19 lockdown measures in place throughout the globe, online shopping has soared and along with it, credit card skimming. According to Malwarebytes data, web skimming increased by 26 percent in March over the previous month.
Magecart, an umbrella term composed of dozens of cybercriminal groups that conduct digital credit card-skimming attacks, has reportedly compromised upwards of two million websites and 18,000 hosts.
According to a CardHub survey of 55 major retailers and 1,000 individuals, 42% of retailers have not updated the terminals in any of their stores and 56% of people don’t care if a retailer’s payment terminal is chip-enabled.
We read it in the headlines all too often: “Facebook, PayPal Users Urged to Check Logins After Hacking,” “Sony Hacked Again; 25 Million Entertainment Users’ Data at Risk,” “Zappos Says Hacker May Have Accessed Info on 24 Million Customers,” and most recently, “MasterCard, Visa Warn of Credit Card Data Theft.”