November 16
11:00 — 13:00
For the sake of money. Payment endpoint's vulnerabilities
Hackers all around the world use vulnerabilities of payment terminals and cards
for money laundering and fraudulent payments. However, the actual amount of available
information is quite small, it is fragmentary and incomplete.
How do hackers get access to the terminals, and what happens next?
How and where do hackers use stolen data?
How to make payments with the chip without knowledge of a PIN code?
How are payments with magnetic stripe made (despite the fact that in Russia, cards should only use a chip)?
How do hackers get access to the terminals, and what happens next?
How and where do hackers use stolen data?
How to make payments with the chip without knowledge of a PIN code?
How are payments with magnetic stripe made (despite the fact that in Russia, cards should only use a chip)?