How do our sites use Cookies and Other Tracking Technologies? The information provided below about cookies also applies to these other tracking technologies. This allows our sites to recognize your device from those of other users on our sites. The other tracking technologies work similarly to cookies and place small data files on your devices or monitor your website activity to enable us to collect information about how you use our sites. What are Cookies and Other Tracking Technologies?Ī cookie is a small text file that can be stored on and accessed from your device when you visit one of our sites, to the extent you agree. This cookie policy should be read together with our Privacy Policy.īy continuing to browse or use our sites, you agree that we can store and access cookies and other tracking technologies as described in this policy. This cookie policy explains how and why cookies and other similar technologies may be stored on and accessed from your device when you use or visit websites that posts a link to this Policy (collectively, “the sites”). understands that your privacy is important to you and we are committed for being transparent about the technologies we use. Check Business Breaking News Live on Zee Business Twitter and Facebook. Get Latest Business News, Stock Market Updates and Videos Check your tax outgo through Income Tax Calculator and save money through our Personal Finance coverage. Regular network and server evaluation, proactive detection of zero-day vulnerabilities and patching them immediately, launching attractive bug-bounty programmes and promptly informing the users of a potential leak are some of the "mandatory steps that large enterprises and institutions should follow in order to stay away from cybercriminals and save their reputation," he added. However, they tend to overlook the internal vulnerabilities that can prove to be very damaging to their reputation and business if exploited by the bad guys," Sharma told IANS. "Enterprises and institutions have begun to understand the importance of having a strong security framework to save themselves from an external attack by a cybercriminal. We have also made two-factor authentication (2FA) mandatory for all the tools accessed by our teams," the company said.Īccording to Saurabh Sharma, Senior Security Researcher (GReAT), Kaspersky (APAC), data leaks due to internal vulnerabilities has become a common instance in India, especially in the last two years.
"We did identify gaps in some of the older access keys and moved them to non-access key-based authentication supported by hosting providers. JusPay said that it has made significant investments in security and data governance and its policies are aligned to globally accepted data protection standards. "In this condition, all 10 crore cardholders are at risk," Rajaharia noted.
"For this data, hackers are also contacting via Telegram," Rajaharia said, adding that if the hackers can find out the Hash algorithm used to generate the card fingerprint, they will be able to decrypt the masked card number.
Rajaharia had told IANS that the data was being sold on the Dark Web for an undisclosed amount via cryptocurrency Bitcoin. "We can confirm that the compromised data does not contain any transaction or order information, as the intrusion was terminated before such an access." The cyberattack was identified in an isolated/separate system," JusPay elaborated. "We conducted a thorough audit on the day of the incident which confirmed that our `Secure Data Store` which hosts the 16-digit encrypted card numbers was not accessed and remains secure.
LEAKED WORKING DEBIT CARD NUMBERS FULL
"On August 18, 2020, an unauthorised attempt on our servers was detected and terminated when in progress," it added.Īccording to JusPay, no full card numbers, order information, card PINs and passwords were leaked.