November 16
11:00 — 13:00
For the sake of money. Payment endpoint's vulnerabilities
Hackers all around the world use vulnerabilities of payment terminals and cards for money laundering and fraudulent payments. However, the actual amount of available information is quite small, it is fragmentary and incomplete.
How do hackers get access to the terminals, and what happens next?
How and where do hackers use stolen data?
How to make payments with the chip without knowledge of a PIN code?
How are payments with magnetic stripe made (despite the fact that in Russia, cards should only use a chip)?