Device Hardening and Continuous Compliance Monitoring CONTINUOUS COMPLIANCE

Two separate news items combine to reinforce the unavoidable reality for retailers - if you do not start taking your payment card security seriously, you will be breached.

Its already too late for Bebe Stores - they have now confirmed that they have been subject to a security breach affecting U.S., Puerto Rico and U.S. Virgin Islands stores during November. Data compromised is likely to include cardholder names, account numbers, expiration dates, and verification codes - more than enough to successfully produce cloned cards and make fraudulent transactions with them.

Based on the information provided, it appears that the breach was focused on store POS systems, since on-line transactions are reported to be unaffected.

In separate but related news, new point-of-sale malware known as LusyPOS has been identified. This is reportedly similar in capabilities to the 'Chewbacca' malware discovered this time last year. As new variant malware sample, LusyPOS comfortably evades anti-virus, precisely the reason why PCI DSS requirements mandate the use of hardened POS configurations, 'deny all' firewall settings and regular file integrity monitoring. Using layered, combined security defense measures is the only way to minimize exposure to malware like LusyPOS and limit its capabilities if a breach is successful.

Read more on Bebe Stores breach

Read more on LusyPOS

Share this blog post

USA Offices
New Net Technologies Ltd
9128 Strada Place
Naples, Florida, 34108
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
St Albans


Tel: 08456 585 005
Fax: 08456 122 031
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.