PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

PCI DSS 4.0 Compliance: A Guide to Requirements 6 & 11

| | Blog
In the ever-evolving landscape of cybersecurity, staying ahead of threats and ensuring the safety of sensitive customer data is paramount. For organizations that handle payment card information, complying with industry standards like PCI DSS (Payment Card Industry Data Security Standard) is not only a best practice, but a compliance requirement ... Read More
Presence of pixels/trackers on websites - by sector

Pixels & trackers are present on mission-critical webpages and thereby increasing the likelihood of risks

| | Blog
In an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) found pixels/trackers on 95% of their websites.  Each website in the study corresponds to an unique organization (company, non-profit, or government agency). The high 95% reflects the extent of ... Read More
US States with Bans on ByteDance/TikTok

Independent of their Apps, bad actors banned by various executive orders have pixels/trackers on everyday websites 

| | Blog
“[China can] manipulate content, and if they want to, to use it for influence operations” – FBI Director Chris Wray  “To maintain the security of data owned by the state of Nebraska, and to safeguard against the intrusive cyber activities of China’s communist government, we’ve made the decision to ban ... Read More
Percentage of ownership of pixels/trackers by platform owner

Pixels/Trackers Can Collect & Transfer Data Without Consent

| | Blog
Analysis on 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) revealed that pixels/trackers are collecting and/or transferring data prior to the explicit consent (e.g., cookie acceptance) of a website user. (While some do not require actual consent for one reason or another, ... Read More
Presence of pixels/trackers on websites by sector

Why Pixels/Trackers are Common and Abundant 

| | Blog
As part of a detailed study of pixels/trackers, an analysis of over 3,000 websites and over 100,000 associated webpages (using the client-side security scanning feature of Feroot Inspector) found pixels/trackers on 95% of their websites.  Each website in the study corresponds to an unique organization (company, non-profit, or government agency) ... Read More
Malicious code can lie undetected right under the users' fingertips. Meanwhile, it captures their data from form fills, chatbots, and financial transaction pages.

Magecart Attack: Hacker steals credit card info from Canada’s largest alcohol retailer

| | Blog
The LCBO, a major Canadian retailer, recently experienced a cybersecurity breach that compromised the personal information of thousands of customers. The incident, which was discovered on January 10th, affected the client-side of the company’s website through which LCBO conducts online sales. It resulted in the unauthorized access of sensitive information ... Read More