<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>scraping &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/scraping/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Thu, 19 Dec 2019 22:43:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>scraping &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Over 267 million Facebook users reportedly had data exposed online</title>
		<link>https://www.efrtechgroup.com/tech/over-267-million-facebook-users-reportedly-had-data-exposed-online/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Thu, 19 Dec 2019 22:43:00 +0000</pubDate>
				<category><![CDATA[bob diachenko]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[comparitech]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[names]]></category>
		<category><![CDATA[phone numbers]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[scraping]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security researcher]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[unsecured]]></category>
		<category><![CDATA[user id]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/over-267-million-facebook-users-reportedly-had-data-exposed-online/</guid>

					<description><![CDATA[[ad_1] Dianchenko says he reported the database to the service provider managing the IP address of the server, but the database was exposed for nearly two weeks. In the meantime, he says, the data was posted as a download in a hacker forum. That&#8217;s a lot of personal data to be floating around in the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>Dianchenko says he reported the database to the service provider managing the IP address of the server, but the database was exposed for nearly two weeks. In the meantime, he says, the data was posted as a download in a hacker forum.</p>
<p>That&#8217;s a lot of personal data to be floating around in the wild, and as C<em>omparitech</em> notes, it could be used to carry out phishing scams and other foul play.</p>
<p>&#8220;We are looking into this issue, but believe this is likely information obtained before changes we made in the past few years to better protect people&#8217;s information,&#8221; a Facebook spokesperson told Engadget.</p>
<p>Unfortunately, this is far from the first time that millions of Facebook users have had their data exposed online. In September, a security researcher found another database with <a href="https://www.engadget.com/2019/09/04/facebook-privacy-databases-phone-numbers/">419 million records</a> tied to Facebook accounts. One year prior, a hack exposed private info belonging to <a href="https://www.engadget.com/2018/10/12/facebook-hack-exposed-private-information-29-million-users/">29 million users</a>. Third-party errors have left <a href="https://www.engadget.com/2019/04/03/facebook-data-exposed-by-third-parties/">540 million Facebook records</a> exposed, and earlier this year, over 20,000 Facebook employees had <a href="https://www.engadget.com/2019/03/21/facebook-user-passwords-plain-text/">access to 600 million users passwords</a>. While Facebook&#8217;s <a href="https://www.engadget.com/2019/05/01/facebooks-the-future-is-private-mantra-doesnt-exonerate-it/">future may be private</a>, its present is apparently not.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/12/19/facebook-data-exposed-online/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Visa warns that hackers are scraping card details at gas pumps</title>
		<link>https://www.efrtechgroup.com/tech/visa-warns-that-hackers-are-scraping-card-details-at-gas-pumps/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Mon, 16 Dec 2019 10:40:00 +0000</pubDate>
				<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[gas stations]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[point of sale]]></category>
		<category><![CDATA[pos malware]]></category>
		<category><![CDATA[scraping]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[visa]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/visa-warns-that-hackers-are-scraping-card-details-at-gas-pumps/</guid>

					<description><![CDATA[[ad_1] The hack doesn&#8217;t appear to affect more security chip-and-pin cards, but not all consumers have those, so service stations often work with mag stripe readers, too. The data is apparently sent in an unencrypted form to the vendor&#8217;s main network, where the thieves have figured out how to intercept it. The other problem is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>The hack doesn&#8217;t appear to affect more security chip-and-pin cards, but not all consumers have those, so service stations often work with mag stripe readers, too. The data is apparently sent in an unencrypted form to the vendor&#8217;s main network, where the thieves have figured out how to intercept it. The other problem is that the POS systems aren&#8217;t firewalled off from other, less critical parts of the network, allowing thieves to gain lateral access once the network is breached.</p>
<p>There&#8217;s not much cardholders can do to avoid the attacks, but Visa has advised fuel merchants to encrypt data while it&#8217;s transferred or use a chip-and-PIN policy. &#8220;Fuel dispenser merchants should take note of this activity and deploy devices that support chip-and-pin wherever possible, as this will significantly lower the likelihood of these attacks,&#8221; it <a href="http://click.broadcasts.visa.com/xfm/?30761/0/0624013ddc6f39785bf56d504f3b812e/lonew">advised</a> in the December security alert.</p>
<p>Earlier this year, Visa <a href="https://business.hughes.com/resources/blog/outdoor-emv-liability-shift-train-wreck-we-will-all-see-coming">announced</a> that fuel merchants must deploy chip-and-PIN readers by October 2020. After that, any service stations without the new tech will be liable for any fraud. The problem is, many such businesses have very old technology and must replace the entire pump at an estimated cost of up to $250,000 per station. Spread across all the convenience stores in the US, the total hit has been estimated at around $22.5 billion.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/12/16/visa-gas-station-fraud-malware/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
