Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


New Locky Ransomware Takes Another Turn

A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents.

New Locky Ransomware Takes Another Turn

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Buying an Apple MacBook for Just $1 Is Actually Possible Due to a Security Flaw  (Read 42 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 23024
  • .: Surf Queen
    • WWW
Buying an Apple MacBook for Just $1 Is Actually Possible Due to a Security Flaw
28 August 2017, 11:25 am

Buying super-expensive devices like Apple’s MacBook with just $1 is actually something that can be done due to a vulnerability in SAP POS systems, a research published by security firm ERPScan demonstrates.

The company has detailed in a YouTube video how a security flaw in the SAP POS Xpress Server can be abused to modify the price of a specific product, intercept payments, and collect financial information such as the details of a card that’s being used at a specific time.

The vulnerability resides in the SAP POS Xpress Server which handles the payments made through in-store SAP POS systems and the research shows that an attack has big chances to be successful because the implementation misses multiple authorization checks on the server side.

Patches already released

The security firm says that in order for a hacker to breach the SAP POS system, the attack must be launched from the same... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks