• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Timur Yunusov

First Contact: Attacks on Google Pay, Samsung Pay, and Apple Pay
Security

First Contact: Attacks on Google Pay, Samsung Pay, and Apple…

13.02.202308/04/2025Timur Yunusov1700
Electronic wallets, such as Google Pay, Samsung Pay, and Apple Pay, are considered the most advanced and secure payment tools. However, these systems are also plagued by vulnerabilities because they use technologies created thirty years ago. This article describes techniques…
CONTINUE READING 🡒
First contact. Attacks on chip-based cards
Security

First contact. Attacks on chip-based cards

01.06.202208/04/2025Timur Yunusov750
Virtually all modern bank cards are equipped with a special chip that stores data required to make payments. This article discusses fraud techniques used to compromise such cards and methods used by banks to protect cardholders against attackers.
CONTINUE READING 🡒
First contact: How hackers steal money from bank cards
Security

First contact: How hackers steal money from bank cards

15.02.202215/02/2022Timur Yunusov791
Network fraudsters and carders continuously invent new ways to steal money from cardholders and card accounts. This article discusses techniques used by criminals to bypass security systems protecting bank cards.
CONTINUE READING 🡒
First contact: An introduction to credit card security
Security

First contact: An introduction to credit card security

09.02.202208/04/2025Timur Yunusov670
I bet you have several cards issued by international payment systems (e.g. Visa or MasterCard) in your wallet. Do you know what algorithms are used in these cards? How secure are your payments? People pay with such cards every day…
CONTINUE READING 🡒
First contact. Attacks against contactless cards
Security

First contact. Attacks against contactless cards

12.01.202208/04/2025Timur Yunusov950
Contactless payment cards are very convenient: you just tap the terminal with your card, and a few seconds later, your phone rings indicating that the transaction is completed. But this convenience has a downside: malefactors can steal money from such cards. This…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com