SlideShare a Scribd company logo
1 of 28
POS Fraud Prevention
Securing Your POS. Protect your customers.
Protect your reputation.
Overview
– Introduction to Halo Metrics
• Loss prevention solutions (Canada & US
• The Halo Metrics Experience
– POS Data Breach
• Malware attacks vs. Skimming
• How Data is taken
• Will EMV Chip technology help?
• Examples of PIN Pad tampering
• Liability Shift
• PCI Compliance
– Customised Solutions for POS Equipment
– Conclusion & Questions
Since
1988
Since
1988
POS Hardware
Security
Convex Mirrors Turnstile Crowd
Control
Customers
What is Halo’s Experience Protection?
Is about protecting the
honest consumers
shopping experience
99% of consumers are
honest
Loss Prevention can
enhance and protect the
total consumer shopping
experience
This includes point of sale
Point of Sale
Point of Sale is an
important step in
the shopping
experience
A great experience
here involves
having quick
moving lines,
friendly service
and quick but
secure payment
processing
Data Breach is a Major Issue…
Many Retail businesses
have been hit by credit
card data breaches from
Point of Sale systems
How does it happen?
Two primary methods include:
1)Malware virus planted in payment servers or equipment
2)Tampering with POS equipment or “Skimming” attacks
*image courtesy of symantec.com
Malware on POS Equipment or Servers
POS malware exploits a
gap in the security of
how card data is
handled. While card
data is encrypted as it’s
sent for payment
authorization, it’s not
encrypted while the
payment is actually
being processed, i.e.
the moment when you
swipe the card at the
POS to pay for your
goods.
“Skimming” Attacks involve Theft &
Tampering of POS Equipment
EXAMPLE:
Two person team
about to steal a
POS card swipe
machine
Theft can happen to any business
One partner
looks out while
the other
starts the theft
of the POS
equipment
Note the time:
19:52:02
Gone in 60 seconds…
He has
removed
the device.
Note the
time:
19:53:00
Out the door…
Theft is
complete
Note the
time:
19:53:00
How do they tamper with the POS?
Here is an example of a POS terminal with a fake cover:
Modifying POS:
Internal components modified
to capture credit and debit card
data.
Data can be remotely
accessed
Data is collected and downloaded
Information
provided by:
Data from Magnetic Swipe
See this video and how easy it is to download banking data:
What Kind of Data is Being Taken?
The Data is Sold Online:
Data in Track 1 has less
value because it can only
be used online.
Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks
Data in Track 2 is more
lucrative as it is used to
clone cards used in bricks
and mortar businesses
Will EMV (Chip) Technology Help?
Chip + PIN
enabled
technology does
make it more
difficult to
counterfeit cards
This is not new
technology! It
has been
implemented all
over the world
and fraud still
occurs
Liability Shift in October 2015
The party that is the cause of a chip-on-chip transaction not
occurring (i.e., either the issuer or the merchant’s acquirer)
will be financially liable for any resulting card-present
counterfeit fraud losses.
June 30, 2015 – Protect your POS Device
Current PCI Compliance
regulations require that
payment devices must be
protected from tampering
and substitution
Payment Card Industry
(PCI) Data Security
Standard
Customized Security Solutions for POS
Halo Metrics offers
customized security
solutions for POS
equipment
Pick Your POS Security Platform
Pick your Security Options
We can custom
build security
options into your
security stand
Satisfied POS Security Customers
Thank you

More Related Content

What's hot

Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for DummiesSilly Beez
 
Debit and credit card
Debit and credit cardDebit and credit card
Debit and credit card17791
 
Key Things to Know About EMV
Key Things to Know About EMVKey Things to Know About EMV
Key Things to Know About EMVCorral Solutions
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit cardSaadi Rahman
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...IOSR Journals
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack- Mark - Fullbright
 
Credit cards ppt
Credit cards pptCredit cards ppt
Credit cards pptsukhpal0015
 
Get started with card payments
Get started with card paymentsGet started with card payments
Get started with card paymentsGraeme McGilliard
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Shareapulvermache
 
Online payments and Security Gateways
Online payments and Security Gateways Online payments and Security Gateways
Online payments and Security Gateways Sarujan Chandrakumaran
 
Crcards and dbcards
Crcards and dbcardsCrcards and dbcards
Crcards and dbcardsAesha Shah
 
Everything You Need to Know About Chargebacks
Everything You Need to Know About ChargebacksEverything You Need to Know About Chargebacks
Everything You Need to Know About ChargebacksEran Feinstein
 

What's hot (20)

debit cards
debit cardsdebit cards
debit cards
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
Methods of payment
Methods of paymentMethods of payment
Methods of payment
 
Debit and credit card
Debit and credit cardDebit and credit card
Debit and credit card
 
Key Things to Know About EMV
Key Things to Know About EMVKey Things to Know About EMV
Key Things to Know About EMV
 
Presentation on Debit and credit card
Presentation on Debit and credit cardPresentation on Debit and credit card
Presentation on Debit and credit card
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
 
Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackChip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attack
 
Paysera VISA - verified by VISA
Paysera VISA - verified by VISAPaysera VISA - verified by VISA
Paysera VISA - verified by VISA
 
Credit cards ppt
Credit cards pptCredit cards ppt
Credit cards ppt
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Bi ATM catalog
Bi ATM catalogBi ATM catalog
Bi ATM catalog
 
Get started with card payments
Get started with card paymentsGet started with card payments
Get started with card payments
 
Debit Card Fees Slide Share
Debit Card Fees Slide ShareDebit Card Fees Slide Share
Debit Card Fees Slide Share
 
Online payments and Security Gateways
Online payments and Security Gateways Online payments and Security Gateways
Online payments and Security Gateways
 
Crcards and dbcards
Crcards and dbcardsCrcards and dbcards
Crcards and dbcards
 
Heartland Secure PPT
Heartland Secure PPTHeartland Secure PPT
Heartland Secure PPT
 
Everything You Need to Know About Chargebacks
Everything You Need to Know About ChargebacksEverything You Need to Know About Chargebacks
Everything You Need to Know About Chargebacks
 

Viewers also liked

Credit fraud prevention on hwx stack
Credit fraud prevention on hwx stackCredit fraud prevention on hwx stack
Credit fraud prevention on hwx stackKirk Haslbeck
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDaveEdwards12
 
Attacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecAttacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecCheapSSLsecurity
 
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopPoint of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopSymantec
 
PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security AwarenessElsye Sutanawi
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware Lancope, Inc.
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
Understanding the POS Malware
Understanding the POS MalwareUnderstanding the POS Malware
Understanding the POS Malwarevijay1926
 

Viewers also liked (12)

Credit fraud prevention on hwx stack
Credit fraud prevention on hwx stackCredit fraud prevention on hwx stack
Credit fraud prevention on hwx stack
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Attacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By SymantecAttacks on Point of Sale systems - By Symantec
Attacks on Point of Sale systems - By Symantec
 
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopPoint of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
 
PCI-DSS Security Awareness
PCI-DSS Security AwarenessPCI-DSS Security Awareness
PCI-DSS Security Awareness
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
Cashier Training Material Pc 17 June 2011
Cashier Training Material Pc   17 June 2011Cashier Training Material Pc   17 June 2011
Cashier Training Material Pc 17 June 2011
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Pos Presentation
Pos PresentationPos Presentation
Pos Presentation
 
Understanding the POS Malware
Understanding the POS MalwareUnderstanding the POS Malware
Understanding the POS Malware
 

Similar to Data Breach Prevention - Start with your POS Terminal!

The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Financial Tech - St. Charles County Chambers Technology Committee presentatio...
Financial Tech - St. Charles County Chambers Technology Committee presentatio...Financial Tech - St. Charles County Chambers Technology Committee presentatio...
Financial Tech - St. Charles County Chambers Technology Committee presentatio...Ken Tucker
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummiesBACKSEATRIDER
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardSlawomir Jasek
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSteve Abrams
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card PaymentEditor IJCATR
 
EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?Shannon Walcott
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsIngenico Group
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultJolin Löf
 
Demystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsDemystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsSymantec
 

Similar to Data Breach Prevention - Start with your POS Terminal! (20)

The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Financial Tech - St. Charles County Chambers Technology Committee presentatio...
Financial Tech - St. Charles County Chambers Technology Committee presentatio...Financial Tech - St. Charles County Chambers Technology Committee presentatio...
Financial Tech - St. Charles County Chambers Technology Committee presentatio...
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Tokenization
TokenizationTokenization
Tokenization
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_Payments
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
EMV - Is your business ready?
EMV - Is your business ready?EMV - Is your business ready?
EMV - Is your business ready?
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next Steps
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsult
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Demystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales SystemsDemystifying Attacks on Point of Sales Systems
Demystifying Attacks on Point of Sales Systems
 
EMV and the consumer Final
EMV and the consumer FinalEMV and the consumer Final
EMV and the consumer Final
 
Atm security
Atm securityAtm security
Atm security
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 

Recently uploaded

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Recently uploaded (20)

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

Data Breach Prevention - Start with your POS Terminal!

  • 1. POS Fraud Prevention Securing Your POS. Protect your customers. Protect your reputation.
  • 2. Overview – Introduction to Halo Metrics • Loss prevention solutions (Canada & US • The Halo Metrics Experience – POS Data Breach • Malware attacks vs. Skimming • How Data is taken • Will EMV Chip technology help? • Examples of PIN Pad tampering • Liability Shift • PCI Compliance – Customised Solutions for POS Equipment – Conclusion & Questions
  • 6. What is Halo’s Experience Protection? Is about protecting the honest consumers shopping experience 99% of consumers are honest Loss Prevention can enhance and protect the total consumer shopping experience This includes point of sale
  • 7. Point of Sale Point of Sale is an important step in the shopping experience A great experience here involves having quick moving lines, friendly service and quick but secure payment processing
  • 8. Data Breach is a Major Issue… Many Retail businesses have been hit by credit card data breaches from Point of Sale systems
  • 9. How does it happen? Two primary methods include: 1)Malware virus planted in payment servers or equipment 2)Tampering with POS equipment or “Skimming” attacks *image courtesy of symantec.com
  • 10. Malware on POS Equipment or Servers POS malware exploits a gap in the security of how card data is handled. While card data is encrypted as it’s sent for payment authorization, it’s not encrypted while the payment is actually being processed, i.e. the moment when you swipe the card at the POS to pay for your goods.
  • 11. “Skimming” Attacks involve Theft & Tampering of POS Equipment EXAMPLE: Two person team about to steal a POS card swipe machine
  • 12. Theft can happen to any business One partner looks out while the other starts the theft of the POS equipment Note the time: 19:52:02
  • 13. Gone in 60 seconds… He has removed the device. Note the time: 19:53:00
  • 14. Out the door… Theft is complete Note the time: 19:53:00
  • 15. How do they tamper with the POS? Here is an example of a POS terminal with a fake cover:
  • 16. Modifying POS: Internal components modified to capture credit and debit card data. Data can be remotely accessed
  • 17. Data is collected and downloaded Information provided by:
  • 18. Data from Magnetic Swipe See this video and how easy it is to download banking data:
  • 19. What Kind of Data is Being Taken?
  • 20. The Data is Sold Online: Data in Track 1 has less value because it can only be used online. Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks Data in Track 2 is more lucrative as it is used to clone cards used in bricks and mortar businesses
  • 21. Will EMV (Chip) Technology Help? Chip + PIN enabled technology does make it more difficult to counterfeit cards This is not new technology! It has been implemented all over the world and fraud still occurs
  • 22. Liability Shift in October 2015 The party that is the cause of a chip-on-chip transaction not occurring (i.e., either the issuer or the merchant’s acquirer) will be financially liable for any resulting card-present counterfeit fraud losses.
  • 23. June 30, 2015 – Protect your POS Device Current PCI Compliance regulations require that payment devices must be protected from tampering and substitution Payment Card Industry (PCI) Data Security Standard
  • 24. Customized Security Solutions for POS Halo Metrics offers customized security solutions for POS equipment
  • 25. Pick Your POS Security Platform
  • 26. Pick your Security Options We can custom build security options into your security stand

Editor's Notes

  1. Welcome to Halo Metrics presentation on POS Fraud Prevention.
  2. Here is a quick overview of what we are going to cover. Our goal is to spend 15 minutes on the presentation and leave 5 minutes for any questions you may have. The big topics we are going to cover include: A bit of a quick overview of who Halo Metrics is Discuss POS Data breach Review Halo Metrics security solutions for POS equipment Then we will wrap up with questions and remind you to take your POS Theft Prevention Kits with you
  3. Halo Metrics is an established loss prevention security solutions provider based in Canada with two major offices. One is located on the West coast in Vancouver with the other in the East in Toronto. We are the exclusive distribution partners for several well known security brands including: Checkpoint Systems EAS Solutions Alpha High Shrink Solutions Invue Display Alarm Solutions   We support these brands exclusively in Canada.
  4. In a addition to these categories of security solutions we also offer a strong range of facilities security options as well. This includes POS Hardware security, Convex Mirrors, and Turnstile Crowd Control solutions.
  5. For over 26 years Halo Metrics has been working with retailers of all sizes and geographical reach. Canada’s distance West to East is 5780 miles and Halo Metrics is able to reach all major points with product delivery within 48 hours of placing an order.
  6.  Halo Metrics tag line speaks to Experience Protection. We understand that retail is all about the honest consumers shopping experience and not hindering the buying process. We know that 99% of consumers that walk into a store are honest and simply want to access to merchandise free of constraints. Loss Prevention can play a major role in protecting this experience by creating a secure environment that deters theft but allows customer interaction and purchasing to happen We also understand that Point of sale is a major piece of the consumer shopping experience….
  7. You can lose a customer at Point of Sale. If the lines are too long, if the staff are not polite, and if the payment process doesn’t look secure you can lose that customer in the last stages of buying.
  8. Picture from: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ It is not a secret that Data Breach related to credit card fraud has been front page material recently. It is an international issue but several US retailers have been hit hard as well.
  9. Sales transactions occur through a network of servers, POS hardware, and the Internet. Data can be breached at several points during the transaction. Criminals will simply pick the weakest areas and attack those points. Two primary methods include: Malware viruses planted on servers and POS equipment Physically altering POS equipment to enable “Skimming” Attacks.
  10. POS malware exploits a gap in the security of how card data is handled. While card data is encrypted as it’s sent for payment authorization, it’s not encrypted while the payment is actually being processed, i.e. the moment when you swipe the card at the POS to pay for your goods. Criminals first exploited this security gap in 2005 when a campaign orchestrated by Albert Gonzalez lead to the theft of data for 170 million cards. Since then a market has grown in the supply and sale of malware, which reads Track 2 data from the memory of the POS terminal. Most POS systems are Windows-based, making it relatively easy to create malware to run on them. This malware is known as memory-scraping malware as it looks in memory for data, which matches the pattern of the Track 2 data. Once it finds this data in memory, which occurs as soon as a card is swiped, it saves it in a file on the POS, which the attacker can later retrieve. The most well-known piece of POS malware is BlackPOS which is sold on cybercrime forums. Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks
  11. This is a series of still pictures captured from a surveillance video. A two person team enters a store for the purpose of stealing a POS terminal
  12. They work as a team with one acting as a look out and the other starts the theft of the POS terminal It is important to note the time as we go through these slides
  13. The POS terminal has been removed from its display bracket
  14. POS equipment can be tampered with in several ways. In this short video we see that the entire faceplate has been duplicated on this Chip + Signature pad. This is actually a very well built decoy.
  15. The internal components are modified to easily syphon credit card data, record PIN numbers ($20 key logger device), and transmit the data wirelessly to a criminal waiting outside of the store.
  16. This aerial view shows how Wi-Fi signals can extend far beyond the walls of a store location. Once the data is in the hands of the criminal it can be easily manipulated. The next slide shows us how this can happen: Intro Identity Theft.info video explains how easy it is to download this data
  17. If full track (either Track 1 or Track 2, from the magnetic stripe, magnetic-stripe image in a chip, or elsewhere) data is stored, malicious individuals who obtain that data can reproduce and sell payment cards around the world. Full track data storage also violates the payment brands' operating regulations and can lead to fines and penalties. The above illustration provides information about Track 1 and Track 2 data, describing the differences and showi Track 1 contains up to 79 characters and contains all fields of track 2.  Track 2 is up to 40 characters and is used to provide shorter processing time for older dial-up transmissions A=Format Code (1 alpha character – “B” implies track 1) B= PAN (13-19 Characters – valid values are 0-9) C=Separator (valid value is “^” in track one; “=” or “D” in track 2) D=Name (2 – 26 alphanumeric and special characters; surname separated by “/”) E=Separator (valid character is “^”) F=Expiration Date (format is YYMM) G=Service Code (3 numerics – differentiates cards; international interchanges; PiN requirements; etc.) H=Reserved (CVV et al). (brand use – include Card Verification Values and Authentication Data) I= PIN Block J= CVV/CVC/CSC k 1 contains up to 79 characters and contains all fields of track 2.  Track 2 is up to 40 characters and is used to provide shorter processing time for older dial-up transmissions ng the layout of the data as stored in the magnetic stripe.
  18. However some sellers also offer the more lucrative “Track 2” data. This is shorthand for the data saved on a card’s magnetic strip. This data is more lucrative as it allows criminals to clone cards, meaning they can be used in brick-and-mortar stores or even ATMs if the PIN is available. The value of the data is reflected in the online sale price and these prices vary widely. CVV2 data is sold for as little as $0.1 to $5 per card while Track 2 data may cost up to $100 per card. Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks
  19. EMV Chip technology is not new and has been around for years in Europe, Asia, and Canada. EMV technology does make it more difficult to counterfeit cards but the fact remains that can be defeated through sophisticated methods. Google the term “Pre-play attacks” and you see how this can happen.
  20. As financial institutions have mandated a change to EMV Chip technology. They are using a liability shift policy to motivate businesses to make this a timely transition. Essentially if fraud occurs the entity that is using the weaker technology will be held liable. The deadline for this changeover is October 2015 You may or may not be involved with this process Usually it is the IT team and loss prevention that is involved with the overall strategy
  21. The latest PCI DSS version 3.0 has several updates in its guidelines. Including a revision to point 9.9 which now makes it a requirement to physically secure your POS equipment from being physically being tampered with or being substituted.
  22. About 6 or 7 years ago customers began coming to Halo Metrics and asking for POS security solutions. Canada has EMV CHIP and PIN technology but the Skimming attacks were on the rise. For us it started in Quebec where organized crime rings where stealing payment terminals so that they could modify the units and reinstall them to collect consumer banking information. Today we have continued to evolve our solutions to protect a wide range of POS devices and as a security company our solutions are more robust and secure than most that you will find in the marketplace.
  23. In our process you can scale the level of security you need. First pick the POS security platform you require. This will depend on your cash fixtures and if you need to allow for access for physically challenged customers.
  24. In the many years we have been building POS security posts and brackets we have incorporated many security features. We can meet your customized needs. If you don’t see it we can build it.
  25. We have deployed solutions in large grocery store chains to small regional businesses as well. Our product is manufactured in Toronto Canada and can easily be delivered to any point in the US. The advantage of working with Canadian partner right now includes a strong US dollar which helps reduce the costs of bringing in stock from Canada.