Payment technologies are an integral part of our lives, yet few of us know much about them. What payment security consists of? What careers options it can bring to the table? What exiting security research hackers had come up in the last decade and how can you fit into that? We are not promising to answer all your questions, but we will try to help you with the first steps and give guidelines to move forward.
1 of 31
Download to read offline
More Related Content
Breaking banks or saving them
1. Breaking banks or saving them
Introduction to payment security
Timur Yunusov, Cyber R&D Lab
PaymentVillage.org
2. Payment security domains
Career options and ideas
Personal examples
Industry problems
Q&A
10. Bug
bounty
Low entry barriers
Great way to start learning
Wide options
Can be mentally hard
Needs a lot of stamina
2FA is everywhere
Learns how to write/read
Learns how to look for an impact
Keep an eye on the market
Learn how to do something new
Visa/MC
Square/Clover/Stripe
Starling/N26/TransferWise
14. RE/
HW
Everything is in your scope Years and years of education/training
Ledger - https://wallet.fail/
mPOS, POS, ATM
https://paymentvillage.org
https://leigh-annegalloway.com
Self-checkout kiosks and terminals
Biometric POS, SoftPOS, mPOS
Bitcoin ATMs
Currency exchange (MT4, MT5)
16. RE/
HW
The only way of making changes Not so much glory
MasterCard will integrate support for
cryptocurrencies by the end of the year
Anti-fraud
KYC
DevSecOps
Blue Teams
26. PIN OK
2005
Chip and Spin,
Ross Anderson, Mike Bond, Steven J. Murdoch
Chip and PIN is broken,
Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond
2010 2011 2020
Bypassing of PSD2 Cumulative limits
https://www.cyberdlab.com/research-blog/card-fraud-in-a-psd2-world-a-few-examples
2021 Stay tuned
5 years ago bug bounty and finances never intersected
Now we have visa, mc bb, square, clover, fintech startups with official bb programs, etc, etc
5 years ago bug bounty and finances never intersected
Now we have visa, mc bb, square, clover, fintech startups with official bb programs, etc, etc
Instead of answering the question spear phishing, internal attacks, external attacks, we slowly move to
Instead of answering the question spear phishing, internal attacks, external attacks, we slowly move to industry-specific goals during pentests and application security projects.
For example, we started doing a lot of ATM assessments and questions like ***
Trying to simulate famous SWIFT heist and steal money from such systems. A lot of attention comes to invest banking instruments.