Cookies disclaimer

I agree Our site saves small pieces of text information (cookies) on your device in order to deliver better content and for statistical purposes. You can disable the usage of cookies by changing the settings of your browser. By browsing our website without changing the browser settings you grant us permission to store that information on your device.

Security vulnerabilities on Intel AMT chips on ATM motherboards

Intel has disclosed a vulnerability within the firmware of its Active Management Technology (AMT) feature. Intel has advised that the vulnerability could allow an unprivileged network attacker to gain system privileges.
 
This vulnerability exists in first generation and later Intel Core processor family and Q-Series chip sets. NCR has used this technology in ATMs that were manufactured later than 2011. The PC cores in NCR ATMs shipped prior to 2011 do not have this vulnerability.

Pros & Cons of In-House Training

When sourcing training we always try to give our clients a selection of training options including Public Scheduled Courses, e-Learning and In-House training. The latter, we have begun to see a lot more of lately. However In-House training courses aren’t always the perfect solution for everyone. We have therefore decided to highlight the advantages, disadvantages and considerations of In-House training so you can know if it is the right path for you and your company.

Pros & Cons of eLearning

eLearning is has boomed over recent years to become a very popular method of learning. In the CIPD’s 2015 Learning and Talent Development Study, 74% of companies reported using some level of e-learning with 91% of companies reporting it to be very useful when combined with other methods and nearly ¾ of respondents saying it is essential for learning.

Pros & Cons of Scheduled Training

Here is a look at the advantages and disadvantages of public scheduled courses. Hopefully by reading them both you can get a good balanced view of the facts and apply them to your situation in order to make the best decision for you and your company.

UNDERSTANDING PCI DSS REQUIREMENT 9.9 COMPLIANCE, CONSIDERATIONS, SOLUTIONS

  • By admin
  • |
  • 4 months, 3 weeks ago
  • |
  • 0

PCI DSS requirement 9.9 - Card Reader (Point of Interaction - POI) Security - Guidance on this clearly ignored requirement

Since the 1st of July 2015 PCI DSS requirement 9.9 became a mandatory requirement for compliance. The requirement was added to the third revision of the DSS based on the global threat of Point-of-Interaction (POI) device tampering, substitution, and skimming.

LiquidNexxus presents guidance on ATM Malware at the (closed-door) Third Strategic Meeting on Payment Card Fraud (PCF) organised by EUROPOL, ASEANAPOL and INTERPOL in Bangkok.

On 13 and 14 December 2016, Europol’s European Cybercrime Centre (EC3), together with ASEANAPOL and INTERPOL, and with the support of the Romanian National Police and the Royal Thai Police, convened for the Third Strategic Meeting on Payment Card Fraud (PCF) in Bangkok Thailand. The event was hosted by the Electronic Transaction Development Agency (public organisation), and the Ministry of Digital Economy and Society.

Mainframe and Software Security

  • By admin
  • |
  • 6 months, 2 weeks ago
  • |
  • 0

Banks spent about $188bn on IT last year and that figure is expected to grow at close to 5 per cent a year, taking it above $200bn by next year, according to Celent, the research company.

Latin American Forum on Payment System Security takes place in November

  • By admin
  • |
  • 7 months, 2 weeks ago
  • |
  • 0

The ATM Security Association announces its support for the event

ATM Security Association welcomes LiquidNexxus as its latest Member

  • By admin
  • |
  • 7 months, 2 weeks ago
  • |
  • 0

LiquidNexxus has joined the ATM Security Association as a member, the company will participate in the cross-industry collaboration within the association’s various working groups in order to contribute its expertise in ATM security and contribute to the development of global industry security standards and best practices.

PCI - Personnel Training Requirements, Resources & Delivery Methods

Training requirements vary according to the level of involvement, responsibilities, and how critical each trainee is to the integrity of the cardholder data environment. In this section we define each trainee group, their responsibilities, and their impact on PCI compliance and system security. For each group we also outline support/resource, methods/channels, and periodicity (or frequency) requirements and recommendations. It is important to note that, beyond the previously highlighted PCI requirements, there are important knowledge gaps in particular at senior management and technical levels. If these are not addressed the organisation risks incurring costly delays, errors, omissions which would adversely affect achieving and maintaining PCI compliance

PCI DSS v3.1 Training Requirements Explained

This article presents clarifies each PCI DSS Training requirement in relation to the target training group and how they are affected as well as the consequences (beyond non compliance) to the organisation.

Lucas Allen (CEO) to present at PCI SSC Europe Community Meeting on "Education and Awareness: A Key Component to Compliance and Security of CDE"

Lucas Allen (CEO) to present at PCI SSC Europe Community Meeting (3 Nov - 5 Nov 2015, Nice, France)

Speech: Education and Awareness: A Key Component to Compliance and Security of CDE 
Presented by: Lucas Allen, CEO, LiquidNexxus
Date/Time: Thursday 5, November 13:00 -15:30

Liquidnexxus Partners with PCI Security Standards Council to Foster Improved Payment Data Security Worldwide

  • By admin
  • |
  • 2 years, 8 months ago
  • |
  • 0

 — As the first authorized PCI Global Training Network (PGTN) provider, LiquidNexxus will deliver PCI training and qualification courses to CEMEA Region —

 

Report "Skimmer Scams: Where Street Crime Meets Tech Crime" published by Professor Darren Hayes of Pace University

  • By admin
  • |
  • 3 years, 3 months ago
  • |
  • 0

"This new report highlights the myriad of ways in which skimmer scams are truly a global epidemic. This is a war being fought at the ATM and the gas pump, at the intersection of the street and tech crime. The first step is awareness, and that is why we are thrilled to share Professor Haye's report and hope this is the just the beginning of a much-needed conversation."

EAST reports a rise in low tech fraud and explosive attacks.

  • By admin
  • |
  • 3 years, 8 months ago
  • |
  • 0

EAST (the European ATM Security Team) has reported a 32% increase in ATM related fraud attacks, despite a 9% fall in card skimming incidents. This overall increase is due to a surge in the number of cash trapping and transaction reversal fraud incidents. 7,885 such incidents were reported, up 77% from the 4,464 incidents reported in H1 2012. While both these attack types can succeed in the EMV environment, as normal transactions take place on EMV cards, criminals get less from them than from high tech skimming attacks.

The ATM Security Training - producing actual, real results

  • By admin
  • |
  • 4 years, 4 months ago
  • |
  • 0

How "The ATM Security Training" actually helps companies, a real-life Testimonial - An interview with one of LiquidNexxus Training attendees.

"One of the core values at LiquidNexxus is to provide comprehensive and practical training that can be implemented within organisations particular environment. Courses are updated regularly and participant feedback is a core part of continual improvement process. Its very rewarding when clients get in touch to let us know about the actual, real-life benefits they have achieved by implementing what they have learned during one of our sessions"

Next Planned Sessions

Keywords

The website keywords. Click on one to see associated contents.